Cyber Security
Cyber Security
Cyber Security
UNIT 1:
1. What term is used to describe the unlawful activities conducted over the internet?
A) Digital misconduct
B) Cybercrime
C) Virtual hacking
D) Online mischief
7. Which cybercrime involves stealing tiny amounts of money from large numbers of transactions,
gradually accumulating substantial profits?
A) E-Mail Spoofing
B) Spamming
C) Internet Time Theft
D) Salami Attack/Salami Technique
8. The Salami Attack/Salami Technique primarily targets:
A) Bank accounts
B) Email servers
C) Network firewalls
D) Credit card information
UNIT 2:
1. What is the term for unauthorized access and control over a website by exploiting vulnerabilities in
its web server?
A) Web Spoofing
B) Web Hijacking
C) Web Jacking
D) Web Phishing
10. How are insurgents and extremist groups often perceived in the realm of cybercrime?
A) As cyber defenders protecting against malicious attacks
B) As cybercriminals engaging in illegal activities for political or ideological motives
C) As cybersecurity experts providing services to businesses and governments
D) As ethical hackers helping organizations identify vulnerabilities
UNIT 3:
1. Which legislation in India addresses cyber crimes and provides legal provisions for dealing with
them?
A) Cyber Security Act
B) IT Act, 2000
C) Cybercrime Prevention Act
D) Digital Crimes Act
7. What type of cybercrime involves persistent, unwanted, and abusive messages sent via email?
A) Hacking
B) Cyber fraud
C) Defamation
D) Email abuse
8. What are some of the penalties prescribed under the IT Act, 2000 for cyber crimes?
A) Imprisonment
B) Fine
C) Both A and B
D) None of the above
UNIT 4:
1. What is the primary difference between the Indian Evidence Act of 1872 and the Information
Technology Act, 2000 regarding electronic records?
A) The Indian Evidence Act does not recognize electronic records as evidence, whereas the IT Act
does.
B) The Indian Evidence Act provides stricter regulations for electronic records compared to the IT
Act.
C) The Indian Evidence Act only applies to physical documents, while the IT Act only applies to
electronic records.
D) Both acts treat electronic records similarly.
2. What is the status of electronic records as evidence under the Indian Evidence Act of 1872?
A) Electronic records are not admissible as evidence.
B) Electronic records are admissible as primary evidence.
C) Electronic records are admissible as secondary evidence.
D) Electronic records are admissible only if certified by a government authority.
3. Under the Information Technology Act, 2000, what is the status of electronic records as evidence?
A) Electronic records are not admissible as evidence.
B) Electronic records are admissible as primary evidence.
C) Electronic records are admissible as secondary evidence.
D) Electronic records are admissible only if certified by a government authority.
4. What is the term used to describe the process of proving the authenticity and integrity of a digital
signature?
A) Digital authentication
B) Digital verification
C) Digital certification
D) Digital attestation
6. Under the Indian Evidence Act of 1872, what factors determine the admissibility and probative value
of electronic evidence?
A) Its relevance to the case and authenticity
B) Its source and monetary value
C) Its length and complexity
D) Its popularity on social media platforms
8. How can the relevancy and admissibility of electronic messages be established in court?
A) By demonstrating the authenticity of the messages and relevance to the case
B) By obtaining a court order for access to the sender's electronic devices
C) By presenting witness testimony from the sender and recipient
D) By comparing the messages with handwritten notes
9. What role does the concept of "chain of custody" play in the admissibility of electronic evidence?
A) It ensures the integrity and authenticity of the evidence from its creation to presentation in court.
B) It determines the monetary value of the evidence.
C) It establishes the legal ownership of the evidence.
D) It governs the jurisdiction where the evidence can be presented.
10. What measures can be taken to ensure the proper management and admissibility of electronic
records in legal proceedings?
A) Implementing secure storage and retrieval systems
B) Maintaining detailed audit trails of electronic transactions
C) Obtaining digital certificates from licensed certifying authorities
D) All of the above
UNIT 5:
1. What is the primary purpose of proxy servers and anonymizers in cybercrime?
A) To encrypt internet traffic for enhanced security
B) To hide the identity and location of the user
C) To provide faster internet access
D) To block access to specific websites
10. What method of cyber attack involves sending fraudulent emails to deceive individuals into
revealing sensitive information?
A) Spoofing
B) Phishing
C) Pharming
D) Skimming