JOIN ADRE 2.0 Telegram Group

Cyber Crime Quiz | Cyber Crime Objective Type Questions and Answers

Questions
21 What are hybrid attacks?
A An attempt to crack passwords using words that can be found in dictionary
B An attempt to crack passwords by replacing characters of a dictionary word with numbers and symbols
C An attempt to crack passwords using a combination of characters, numbers, and symbols
D An attempt to crack passwords by replacing characters with numbers and symbols

Answer: An attempt to crack passwords by replacing characters of a dictionary word with numbers and symbols
22 Which database is queried by Whois?
A ICANN
B ARIN
C APNIC
D DNS

Answer: ICANN
Advertisement
Article and Schedule Quiz Start Test!

DOWNLOAD CURRENT AFFAIRS PDF FROM APP

23 Which of the following is not a type of cyber crime?
A Data theft
B Forgery
C Damage to data and systems
D Installing antivirus for protection

Answer: Installing antivirus for protection
24 Which of the following is not an example of a computer as weapon cyber-crime?
A Credit card fraudulent
B Spying someone using keylogger
C IPR Violation
D None of the above

Answer: Spying someone using keylogger
25 Which of the following is not done by cyber criminals?
A Unauthorized account access
B Mass attack using Trojans as botnets
C Email spoofing and spamming
D Report vulnerability in any system

Answer: Report vulnerability in any system
26 What is the name of the IT law that India is having in the Indian legislature?
A India’s Technology (IT) Act, 2000
B India’s Digital Information Technology (DIT) Act, 2000
C India’s Information Technology (IT) Act, 2000
D The Technology Act, 2008

Answer: India’s Information Technology (IT) Act, 2000
27 What is the full form of ITA-2000?
A Information Tech Act -2000
B Indian Technology Act -2000
C International Technology Act -2000
D Information Technology Act -2000

Answer: Information Technology Act -2000
28 What is the punishment in India for stealing computer documents, assets or any software’s source code from any organization, individual, or from any other means?
A 6 months of imprisonment and a fine of Rs. 50,000
B 1 year of imprisonment and a fine of Rs. 100,000
C 2 years of imprisonment and a fine of Rs. 250,000
D 3 years of imprisonment and a fine of Rs. 500,000

Answer: 3 years of imprisonment and a fine of Rs. 500,000
29 What is the updated version of the IT Act, 2000?
A IT Act, 2007
B Advanced IT Act, 2007
C IT Act, 2008
D None of the Above

Answer: IT Act, 2008
30 In which year the Indian IT Act, 2000 got updated?
A 2006
B 2008
C 2010
D 2012

Answer: 2008
31 Which of the following is not a factor in securing the environment against an attack on security?
A The education of the attacker
B The system configuration
C The network architecture
D The business strategy of the company

Answer: To identify live systems
32 To hide information inside a picture, what technology is used?
A Rootkits
B Bitmapping
C Steganography
D Image Rendering

Answer: Steganography
33 Which phase of hacking performs actual attack on a network or system?
A Reconnaissance
B Maintaining Access
C Scanning
D Gaining Access

Answer: Gaining Access
34 Attempting to gain access to a network using an employee’s credentials is called the _____________ mode of ethical hacking.
A Local networking
B Social engineering
C Physical entry
D Remote networking

Answer: Local networking
35 Which Federal Code applies the consequences of hacking activities that disrupt subway transit systems?
A Electronic Communications Interception of Oral Communications
B 18 U.S.C. § 1029
C Cyber Security Enhancement Act 2002
D 18 U.S.C. § 1030

Answer: Cyber Security Enhancement Act 2002
36 What type of attack uses a fraudulent server with a relay address?
A NTLM
B MITM
C NetBIOS
D None of the above

Answer: MITM
37 What type of symmetric key algorithm using a streaming cipher to encrypt information?
A RC4
B Blowfish
C SHA
D MD5

Answer: RC4
38 Why would a hacker use a proxy server?
A To create a stronger connection with the target
B To create a ghost server on the network
C To obtain a remote access connection
D To hide malicious activity on the network

Answer: To hide malicious activity on the network
39 What type of cyber-crime, its laws and punishments does section 66 of the Indian IT Act holds?
A Cracking or illegally hack into any system
B Putting antivirus into the victim
C Stealing data
D Stealing hardware components

Answer: Cracking or illegally hack into any system
40 In which year India’s IT Act came into existence?
A 2000
B 2001
C 2002
D 2003

Answer: 2000

ADRE 2.0 FULL LENGTH MOCK TEST

Take Mock Tests

Missiles Mock Test Start Test!
SSC MTS Mock Test Start Test
IBPS CLERK MOCK TEST Start Test
SSC MTS 2022 JULY 26 Shift 1 (ENGLISH) Start Test!
SSC GD Previous Year Paper 2021 Nov 17 Shift - I (Hindi) Start Test!
SSC CGL Tier - 1 PYP 2022 April 21 Shift- 1 (ENGLISH) Start Test!
MPSC PAPER I MOCK TEST 1 (ENGLISH) Start Test!
IB Security Assistant Mock test 1 (english) Start Test!
UP POLICE CONSTABLE MOCK TEST 1 Start Test!
DELHI POLICE CONSTABLE MOCK TEST 1 (HINDI) Start Test!
Advertisement
Assam Direct Recruitment Test Series