Cyber Security

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

CS- 503 (C) Cyber Security

UNIT 1:
1. What term is used to describe the unlawful activities conducted over the internet?
A) Digital misconduct
B) Cybercrime
C) Virtual hacking
D) Online mischief

2. Which of the following is NOT a challenge associated with combating cybercrime?


A) International jurisdictional issues
B) Rapid advancements in technology
C) Lack of skilled cybercriminals
D) Difficulty in attributing cyber attacks

3. E-Mail Spoofing is an example of which classification of cybercrime?


A) Identity theft
B) Financial fraud
C) Data manipulation
D) Unauthorized access

4. What is the primary goal of E-Mail Spoofing?


A) To send unsolicited emails
B) To steal sensitive information by impersonating a legitimate email sender
C) To create a backup of emails
D) To encrypt email communications

5. Spamming is an example of which type of cybercrime?


A) Phishing
B) Data breach
C) Denial-of-service attack
D) Unauthorized access

6. Internet Time Theft involves:


A) Unauthorized use of an organization's internet connection or computer resources for personal
purposes
B) Manipulating system clocks to extend trial periods of software
C) Stealing confidential data during specific time intervals
D) Hacking into a time server to alter global time settings

7. Which cybercrime involves stealing tiny amounts of money from large numbers of transactions,
gradually accumulating substantial profits?
A) E-Mail Spoofing
B) Spamming
C) Internet Time Theft
D) Salami Attack/Salami Technique
8. The Salami Attack/Salami Technique primarily targets:
A) Bank accounts
B) Email servers
C) Network firewalls
D) Credit card information

9. How does the Salami Attack/Salami Technique work?


A) By bombarding a victim with numerous emails containing malicious attachments
B) By intercepting and altering communications to divert funds or resources
C) By manipulating financial transactions by siphoning off small amounts of money
D) By flooding a network with traffic to disrupt normal operations

10. Which of the following is a preventive measure against E-Mail Spoofing?


A) Using strong passwords
B) Encrypting email communications
C) Implementing email authentication protocols like SPF and DKIM
D) Installing antivirus software on email servers

UNIT 2:
1. What is the term for unauthorized access and control over a website by exploiting vulnerabilities in
its web server?
A) Web Spoofing
B) Web Hijacking
C) Web Jacking
D) Web Phishing

2. Which of the following is an example of online fraud?


A) Installing unlicensed software
B) Altering system settings
C) Sending fake emails to steal personal information
D) Sharing copyrighted material without permission

3. What is software piracy?


A) Illegally copying and distributing software without permission
B) Using software to detect and prevent cyber attacks
C) Hacking into software companies' servers
D) Creating and distributing malicious software

4. Computer network intrusions involve:


A) Sending unsolicited emails to deceive individuals
B) Gaining unauthorized access to computer networks
C) Altering website content to mislead visitors
D) Intercepting online transactions to steal financial data

5. What is password sniffing?


A) Intercepting network traffic to capture plaintext passwords
B) Guessing passwords through trial and error
C) Using brute force attacks to crack password hashes
D) Impersonating legitimate users to gain access to systems

6. Identity theft involves:


A) Hacking into financial institutions' databases
B) Stealing personal information to impersonate someone else
C) Encrypting sensitive data to prevent unauthorized access
D) Manipulating online transactions to transfer funds illegally

7. What is cyber terrorism?


A) Using technology to spread political propaganda
B) Launching cyber attacks to disrupt critical infrastructure
C) Stealing intellectual property for financial gain
D) Selling counterfeit goods online

8. How do hackers typically gain unauthorized access to systems?


A) By exploiting security vulnerabilities
B) By social engineering techniques
C) By brute force attacks
D) All of the above

9. What is session hijacking?


A) Manipulating data packets to intercept sensitive information
B) Taking control of a user's session after authentication
C) Redirecting users to fake websites to steal their credentials
D) Spoofing IP addresses to evade detection

10. How are insurgents and extremist groups often perceived in the realm of cybercrime?
A) As cyber defenders protecting against malicious attacks
B) As cybercriminals engaging in illegal activities for political or ideological motives
C) As cybersecurity experts providing services to businesses and governments
D) As ethical hackers helping organizations identify vulnerabilities

UNIT 3:
1. Which legislation in India addresses cyber crimes and provides legal provisions for dealing with
them?
A) Cyber Security Act
B) IT Act, 2000
C) Cybercrime Prevention Act
D) Digital Crimes Act

2. What does the IT Act, 2000 primarily aim to regulate?


A) Traditional crimes such as theft and fraud
B) Cyber crimes and electronic commerce
C) National security threats
D) Intellectual property rights

3. Hacking is defined as:


A) Gaining unauthorized access to computer systems or networks
B) Illegally distributing copyrighted content online
C) Using social engineering techniques to manipulate individuals
D) Sending unsolicited emails to deceive recipients

4. Teenage Web Vandals are individuals who:


A) Engage in cyber bullying
B) Exploit security vulnerabilities for fun or mischief
C) Commit financial fraud online
D) Distribute illegal content on the internet

5. Cyber fraud and cheating involve:


A) Illegally accessing computer systems or networks
B) Deceiving individuals or organizations for financial gain using the internet
C) Sending offensive or threatening messages via email
D) Distributing malicious software to compromise systems

6. Defamation in the context of cybercrime refers to:


A) Illegally copying and distributing software
B) Spreading false and damaging information about individuals online
C) Gaining unauthorized access to confidential information
D) Intercepting online transactions to steal financial data

7. What type of cybercrime involves persistent, unwanted, and abusive messages sent via email?
A) Hacking
B) Cyber fraud
C) Defamation
D) Email abuse

8. What are some of the penalties prescribed under the IT Act, 2000 for cyber crimes?
A) Imprisonment
B) Fine
C) Both A and B
D) None of the above

9. Jurisdiction in cyber crimes refers to:


A) The geographical area where a cyber crime is committed
B) The legal authority to prosecute cyber criminals
C) The technical expertise required to investigate cyber crimes
D) The financial resources available for cyber crime investigations

10. What strategies can be employed to tackle cyber crime?


A) Strengthening cybersecurity measures
B) Raising awareness among internet users
C) Improving law enforcement capabilities
D) All of the above

UNIT 4:
1. What is the primary difference between the Indian Evidence Act of 1872 and the Information
Technology Act, 2000 regarding electronic records?
A) The Indian Evidence Act does not recognize electronic records as evidence, whereas the IT Act
does.
B) The Indian Evidence Act provides stricter regulations for electronic records compared to the IT
Act.
C) The Indian Evidence Act only applies to physical documents, while the IT Act only applies to
electronic records.
D) Both acts treat electronic records similarly.

2. What is the status of electronic records as evidence under the Indian Evidence Act of 1872?
A) Electronic records are not admissible as evidence.
B) Electronic records are admissible as primary evidence.
C) Electronic records are admissible as secondary evidence.
D) Electronic records are admissible only if certified by a government authority.

3. Under the Information Technology Act, 2000, what is the status of electronic records as evidence?
A) Electronic records are not admissible as evidence.
B) Electronic records are admissible as primary evidence.
C) Electronic records are admissible as secondary evidence.
D) Electronic records are admissible only if certified by a government authority.

4. What is the term used to describe the process of proving the authenticity and integrity of a digital
signature?
A) Digital authentication
B) Digital verification
C) Digital certification
D) Digital attestation

5. How is the proof of digital signatures typically established in legal proceedings?


A) By presenting the original electronic device used to create the signature
B) By presenting a digital certificate issued by a licensed certifying authority
C) By providing witness testimony confirming the validity of the signature
D) By comparing the signature with handwritten samples

6. Under the Indian Evidence Act of 1872, what factors determine the admissibility and probative value
of electronic evidence?
A) Its relevance to the case and authenticity
B) Its source and monetary value
C) Its length and complexity
D) Its popularity on social media platforms

7. What is the primary method of proving electronic agreements in legal proceedings?


A) Providing witness testimony
B) Presenting a notarized copy of the agreement
C) Demonstrating the parties' intent through email correspondence
D) Producing a printed copy of the agreement with digital signatures

8. How can the relevancy and admissibility of electronic messages be established in court?
A) By demonstrating the authenticity of the messages and relevance to the case
B) By obtaining a court order for access to the sender's electronic devices
C) By presenting witness testimony from the sender and recipient
D) By comparing the messages with handwritten notes

9. What role does the concept of "chain of custody" play in the admissibility of electronic evidence?
A) It ensures the integrity and authenticity of the evidence from its creation to presentation in court.
B) It determines the monetary value of the evidence.
C) It establishes the legal ownership of the evidence.
D) It governs the jurisdiction where the evidence can be presented.

10. What measures can be taken to ensure the proper management and admissibility of electronic
records in legal proceedings?
A) Implementing secure storage and retrieval systems
B) Maintaining detailed audit trails of electronic transactions
C) Obtaining digital certificates from licensed certifying authorities
D) All of the above

UNIT 5:
1. What is the primary purpose of proxy servers and anonymizers in cybercrime?
A) To encrypt internet traffic for enhanced security
B) To hide the identity and location of the user
C) To provide faster internet access
D) To block access to specific websites

2. What is the main objective of password cracking techniques?


A) To create stronger passwords
B) To test the strength of passwords
C) To decrypt encrypted passwords
D) To bypass password authentication

3. What type of software is used to secretly record keystrokes on a computer?


A) Keylogger
B) Firewall
C) Antivirus
D) Encryption software

4. Which of the following is a characteristic of spyware?


A) It protects computers from malware attacks
B) It self-replicates and spreads to other computers
C) It monitors user activity without their knowledge or consent
D) It encrypts files and demands a ransom for decryption

5. What is the primary purpose of a computer virus?


A) To steal sensitive information from computers
B) To damage or disrupt computer operations
C) To track user activity on the internet
D) To provide remote access to infected computers

6. Trojan Horses are malicious software that:


A) Replicate themselves and spread to other computers
B) Perform actions without the user's knowledge or consent
C) Encrypt files and demand a ransom for decryption
D) Block access to certain websites or services

7. What is a backdoor in the context of cyber security?


A) A security vulnerability that allows unauthorized access to a computer system
B) A hardware device used to secure wireless networks
C) A type of encryption algorithm used to protect sensitive data
D) A software tool used to detect and remove malware

8. What is the main objective of Denial-of-Service (DoS) attacks?


A) To gain unauthorized access to a computer system
B) To encrypt files and demand a ransom for decryption
C) To disrupt or disable the normal functioning of a computer network
D) To steal sensitive information from computers

9. What does DDoS stand for?


A) Direct Denial-of-Service
B) Distributed Denial-of-Service
C) Dynamic Denial-of-Service
D) Digital Denial-of-Service

10. What method of cyber attack involves sending fraudulent emails to deceive individuals into
revealing sensitive information?
A) Spoofing
B) Phishing
C) Pharming
D) Skimming

You might also like