Cyber Crime Quiz | Cyber Crime Objective Type Questions and Answers

(21) What are hybrid attacks?
[A] An attempt to crack passwords using words that can be found in dictionary
[B] An attempt to crack passwords by replacing characters of a dictionary word with numbers and symbols
[C] An attempt to crack passwords using a combination of characters, numbers, and symbols
[D] An attempt to crack passwords by replacing characters with numbers and symbols
Answer: An attempt to crack passwords by replacing characters of a dictionary word with numbers and symbols
(22) Which database is queried by Whois?
[A] ICANN
[B] ARIN
[C] APNIC
[D] DNS
Answer: ICANN

DOWNLOAD CURRENT AFFAIRS PDF FROM APP

Article and Schedule Quiz Start Test!
(23) Which of the following is not a type of cyber crime?
[A] Data theft
[B] Forgery
[C] Damage to data and systems
[D] Installing antivirus for protection
Answer: Installing antivirus for protection
(24) Which of the following is not an example of a computer as weapon cyber-crime?
[A] Credit card fraudulent
[B] Spying someone using keylogger
[C] IPR Violation
[D] None of the above
Answer: Spying someone using keylogger
(25) Which of the following is not done by cyber criminals?
[A] Unauthorized account access
[B] Mass attack using Trojans as botnets
[C] Email spoofing and spamming
[D] Report vulnerability in any system
Answer: Report vulnerability in any system
(26) What is the name of the IT law that India is having in the Indian legislature?
[A] India’s Technology (IT) Act, 2000
[B] India’s Digital Information Technology (DIT) Act, 2000
[C] India’s Information Technology (IT) Act, 2000
[D] The Technology Act, 2008
Answer: India’s Information Technology (IT) Act, 2000
(27) What is the full form of ITA-2000?
[A] Information Tech Act -2000
[B] Indian Technology Act -2000
[C] International Technology Act -2000
[D] Information Technology Act -2000
Answer: Information Technology Act -2000
(28) What is the punishment in India for stealing computer documents, assets or any software’s source code from any organization, individual, or from any other means?
[A] 6 months of imprisonment and a fine of Rs. 50,000
[B] 1 year of imprisonment and a fine of Rs. 100,000
[C] 2 years of imprisonment and a fine of Rs. 250,000
[D] 3 years of imprisonment and a fine of Rs. 500,000
Answer: 3 years of imprisonment and a fine of Rs. 500,000
(29) What is the updated version of the IT Act, 2000?
[A] IT Act, 2007
[B] Advanced IT Act, 2007
[C] IT Act, 2008
[D] None of the Above
Answer: IT Act, 2008
(30) In which year the Indian IT Act, 2000 got updated?
[A] 2006
[B] 2008
[C] 2010
[D] 2012
Answer: 2008
31 Which of the following is not a factor in securing the environment against an attack on security?
[A] The education of the attacker
[B] The system configuration
[C] The network architecture
[D] The business strategy of the company
Answer: To identify live systems
32 To hide information inside a picture, what technology is used?
[A] Rootkits
[B] Bitmapping
[C] Steganography
[D] Image Rendering
Answer: Steganography
33 Which phase of hacking performs actual attack on a network or system?
[A] Reconnaissance
[B] Maintaining Access
[C] Scanning
[D] Gaining Access
Answer: Gaining Access
34 Attempting to gain access to a network using an employee’s credentials is called the _____________ mode of ethical hacking.
[A] Local networking
[B] Social engineering
[C] Physical entry
[D] Remote networking
Answer: Local networking
35 Which Federal Code applies the consequences of hacking activities that disrupt subway transit systems?
[A] Electronic Communications Interception of Oral Communications
[B] 18 U.S.C. § 1029
[C] Cyber Security Enhancement Act 2002
[D] 18 U.S.C. § 1030
Answer: Cyber Security Enhancement Act 2002
36 What type of attack uses a fraudulent server with a relay address?
[A] NTLM
[B] MITM
[C] NetBIOS
[D] None of the above
Answer: MITM
37 What type of symmetric key algorithm using a streaming cipher to encrypt information?
[A] RC4
[B] Blowfish
[C] SHA
[D] MD5
Answer: RC4
38 Why would a hacker use a proxy server?
[A] To create a stronger connection with the target
[B] To create a ghost server on the network
[C] To obtain a remote access connection
[D] To hide malicious activity on the network
Answer: To hide malicious activity on the network
39 What type of cyber-crime, its laws and punishments does section 66 of the Indian IT Act holds?
[A] Cracking or illegally hack into any system
[B] Putting antivirus into the victim
[C] Stealing data
[D] Stealing hardware components
Answer: Cracking or illegally hack into any system
40 In which year India’s IT Act came into existence?
[A] 2000
[B] 2001
[C] 2002
[D] 2003
Answer: 2000

Take Mock Tests

Missiles Mock Test Start Test!
SSC MTS Mock Test Start Test
IBPS CLERK MOCK TEST Start Test
SSC MTS 2022 JULY 26 Shift 1 (ENGLISH) Start Test!
SSC GD Previous Year Paper 2021 Nov 17 Shift - I (Hindi) Start Test!
SSC CGL Tier - 1 PYP 2022 April 21 Shift- 1 (ENGLISH) Start Test!
MPSC PAPER I MOCK TEST 1 (ENGLISH) Start Test!
IB Security Assistant Mock test 1 (english) Start Test!
UP POLICE CONSTABLE MOCK TEST 1 Start Test!
DELHI POLICE CONSTABLE MOCK TEST 1 (HINDI) Start Test!