Explore topic-wise MCQs in Cyber Security.

This section includes 15 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.

1.

WHAT_IS_THE_FULL_FORM_OF_ITA-2000??$

A. Information Tech Act -2000
B. Indian Technology Act -2000
C. International Technology Act -2000
D. Information Technology Act -2000
Answer» E.
2.

Under which section of IT Act, stealing any digital asset or information is written a cyber-crime.$

A. 65
B. 65-D
C. 67
D. 70
Answer» B. 65-D
3.

The Information Technology Act -2000 bill was passed by K. R. Narayanan.$

A. True
B. False
Answer» C.
4.

What type of cyber-crime, its laws and punishments does section 66 of the Indian IT Act holds?

A. Cracking or illegally hack into any system
B. Putting antivirus into the victim
C. Stealing data
D. Stealing hardware components
Answer» B. Putting antivirus into the victim
5.

In which year the Indian IT Act, 2000 got updated?

A. 2006
B. 2008
C. 2010
D. 2012
Answer» C. 2010
6.

What is the updated version of the IT Act, 2000?

A. IT Act, 2007
B. Advanced IT Act, 2007
C. IT Act, 2008
D. Advanced IT Act, 2008
Answer» D. Advanced IT Act, 2008
7.

What is the punishment in India for stealing computer documents, assets or any software’s source code from any organization, individual, or from any other means?$

A. 6 months of imprisonment and a fine of Rs. 50,000
B. 1 year of imprisonment and a fine of Rs. 100,000
C. 2 years of imprisonment and a fine of Rs. 250,000
D. 3 years of imprisonment and a fine of Rs. 500,000
Answer» E.
8.

In which year India’s IT Act came into existence?#

A. 2000
B. 2001
C. 2002
D. 2003
Answer» B. 2001
9.

What is the name of the IT law that India is having in the Indian legislature?

A. India’s Technology (IT) Act, 2000
B. India’s Digital Information Technology (DIT) Act, 2000
C. India’s Information Technology (IT) Act, 2000
D. The Technology Act, 2008
Answer» D. The Technology Act, 2008
10.

Which of the following is not done by cyber criminals?

A. Unauthorized account access
B. Mass attack using Trojans as botnets
C. Email spoofing and spamming
D. Report vulnerability in any system
Answer» E.
11.

Which of the following is not an example of a computer as weapon cyber-crime?

A. Credit card fraudulent
B. Spying someone using keylogger
C. IPR Violation
D. Pornography
Answer» C. IPR Violation
12.

Which of the following is not a type of peer-to-peer cyber-crime?

A. Phishing
B. Injecting Trojans to a target victim
C. MiTM
D. Credit card details leak in deep web
Answer» E.
13.

Cyber-crime can be categorized into ________ types.

A. 4
B. 3
C. 2
D. 6
Answer» D. 6
14.

Cyber-laws are incorporated for punishing all criminals only.

A. True
B. False
Answer» C.
15.

Which of the following is not a type of cyber crime?

A. Data theft
B. Forgery
C. Damage to data and systems
D. Installing antivirus for protection
Answer» E.