Answer Key - CyberSecurity
Answer Key - CyberSecurity
Answer Key
Unit 1: Introduction of Cyber Crime and its Classifications:
1. B) Cybercrime
2. C) Lack of skilled cybercriminals
3. A) Identity theft
4. B) To steal sensitive information by impersonating a legitimate email sender
5. A) Phishing
6. A) Unauthorized use of an organization's internet connection or computer resources for personal
purposes
7. D) Salami Attack/Salami Technique
8. B) Email servers
9. C) Manipulating financial transactions by siphoning off small amounts of money
10. C) Implementing email authentication protocols like SPF and DKIM
1. C) Cyber fraud
2. B) To gain unauthorized access to computer networks
3. B) Secondary evidence
4. D) By comparing the signature with handwritten samples
5. B) False and damaging information about individuals online
6. C) Sending offensive or threatening messages via email
7. C) Strengthening cybersecurity measures
8. A) Web Jacking
9. B) Deceiving individuals or organizations for financial gain using the internet
10. B) As cybercriminals engaging in illegal activities for political or ideological motives
Unit 3: Indian Evidence Act of 1872 vs. Information Technology Act, 2000:
1. A) The Indian Evidence Act does not recognize electronic records as evidence, whereas the IT Act
does.
2. C) Electronic records are admissible as secondary evidence.
3. B) Electronic records are admissible as primary evidence.
4. A) Digital verification
5. B) Presenting a digital certificate issued by a licensed certifying authority
6. A) Its relevance to the case and authenticity
7. D) Producing a printed copy of the agreement with digital signatures
8. A) Spoofing
9. A) It ensures the integrity and authenticity of the evidence from its creation to presentation in court.
10. D) All of the above
Unit 5:
3. A) Keylogger
9. B) Distributed Denial-of-Service
10. B) Phishing