Cyber Crime Quiz | Cyber Crime Objective Type Questions and Answers

Sports GK Questions and Answers 2024 (Latest Updated)

Awards & Honours GK Questions 2024 (Latest Updated)

Questions
21 What are hybrid attacks?
A An attempt to crack passwords using words that can be found in dictionary
B An attempt to crack passwords by replacing characters of a dictionary word with numbers and symbols
C An attempt to crack passwords using a combination of characters, numbers, and symbols
D An attempt to crack passwords by replacing characters with numbers and symbols

Answer: An attempt to crack passwords by replacing characters of a dictionary word with numbers and symbols
22 Which database is queried by Whois?
A ICANN
B ARIN
C APNIC
D DNS

Answer: ICANN
Advertisement
Article and Schedule Quiz Start Test!
DOWNLOAD CURRENT AFFAIRS PDF FROM APP
23 Which of the following is not a type of cyber crime?
A Data theft
B Forgery
C Damage to data and systems
D Installing antivirus for protection

Answer: Installing antivirus for protection
24 Which of the following is not an example of a computer as weapon cyber-crime?
A Credit card fraudulent
B Spying someone using keylogger
C IPR Violation
D None of the above

Answer: Spying someone using keylogger
25 Which of the following is not done by cyber criminals?
A Unauthorized account access
B Mass attack using Trojans as botnets
C Email spoofing and spamming
D Report vulnerability in any system

Answer: Report vulnerability in any system
26 What is the name of the IT law that India is having in the Indian legislature?
A India’s Technology (IT) Act, 2000
B India’s Digital Information Technology (DIT) Act, 2000
C India’s Information Technology (IT) Act, 2000
D The Technology Act, 2008

Answer: India’s Information Technology (IT) Act, 2000
27 What is the full form of ITA-2000?
A Information Tech Act -2000
B Indian Technology Act -2000
C International Technology Act -2000
D Information Technology Act -2000

Answer: Information Technology Act -2000
28 What is the punishment in India for stealing computer documents, assets or any software’s source code from any organization, individual, or from any other means?
A 6 months of imprisonment and a fine of Rs. 50,000
B 1 year of imprisonment and a fine of Rs. 100,000
C 2 years of imprisonment and a fine of Rs. 250,000
D 3 years of imprisonment and a fine of Rs. 500,000

Answer: 3 years of imprisonment and a fine of Rs. 500,000
29 What is the updated version of the IT Act, 2000?
A IT Act, 2007
B Advanced IT Act, 2007
C IT Act, 2008
D None of the Above

Answer: IT Act, 2008
30 In which year the Indian IT Act, 2000 got updated?
A 2006
B 2008
C 2010
D 2012

Answer: 2008
31 Which of the following is not a factor in securing the environment against an attack on security?
A The education of the attacker
B The system configuration
C The network architecture
D The business strategy of the company

Answer: To identify live systems
32 To hide information inside a picture, what technology is used?
A Rootkits
B Bitmapping
C Steganography
D Image Rendering

Answer: Steganography
33 Which phase of hacking performs actual attack on a network or system?
A Reconnaissance
B Maintaining Access
C Scanning
D Gaining Access

Answer: Gaining Access
34 Attempting to gain access to a network using an employee’s credentials is called the _____________ mode of ethical hacking.
A Local networking
B Social engineering
C Physical entry
D Remote networking

Answer: Local networking
35 Which Federal Code applies the consequences of hacking activities that disrupt subway transit systems?
A Electronic Communications Interception of Oral Communications
B 18 U.S.C. § 1029
C Cyber Security Enhancement Act 2002
D 18 U.S.C. § 1030

Answer: Cyber Security Enhancement Act 2002
36 What type of attack uses a fraudulent server with a relay address?
A NTLM
B MITM
C NetBIOS
D None of the above

Answer: MITM
37 What type of symmetric key algorithm using a streaming cipher to encrypt information?
A RC4
B Blowfish
C SHA
D MD5

Answer: RC4
38 Why would a hacker use a proxy server?
A To create a stronger connection with the target
B To create a ghost server on the network
C To obtain a remote access connection
D To hide malicious activity on the network

Answer: To hide malicious activity on the network
39 What type of cyber-crime, its laws and punishments does section 66 of the Indian IT Act holds?
A Cracking or illegally hack into any system
B Putting antivirus into the victim
C Stealing data
D Stealing hardware components

Answer: Cracking or illegally hack into any system
40 In which year India’s IT Act came into existence?
A 2000
B 2001
C 2002
D 2003

Answer: 2000
Assam Direct Recruitment Test Series

Teacher Eligibility Test

Assam Direct Recruitment Test Series