1. World Computer Security Day:
(a)October 30 (b) November 30
(c) December 30 (d) January 30
Answer: (b)
2. Many cyber crimes come under the Indian Penal Code. Which one of the following is an example?
(a) Sending threatening messages by email
(b) Forgery of electronic records
(c) Bogus websites
(d) All of these
Answer: (d)
3. Information Technology Act, 2000 made amendment to which of the following existing laws?
(a) Indian Penal Code (b) Indian Evidence Act
(c) Bankers Book Evidence Act (d) All of these
Answer: (d)
4. A ____ is a set of exclusive rights granted by a state to an inventor or his assignee for a limited period of time in exchange for a disclosure of an invention:
(a) Copyright (b) Blog
(c) Patent (d) Trademark
Answer: (c)
5. ____ gives the author of an original work exclusive right for a certain time period in relation to that work, including its publication, distribution and adaptation:
(a) Copyright (b) Copy left
(c) Patent (d) Trademark
Answer: (a)
6. The rental of software to consumers without the permission of the copyright holder known as
(a) Unbundling (b) Renting
(c) Counter Felting (d) Soft loading
Answer: (b)
7. Copying the materials published on the internet as one’s own without proper acknowledgement is called _____:
(a) Internet Plagiarism (b) Internet reference
(c) Internet surfing (d) Internet publishing
Answer: (a)
8. Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit
of:
(a) Software Piracy (b) Cyber Crime
(c) Conventional Crime (d) None of these
Answer: (b)
9. _______ are a bundle of exclusive rights over creations of the mind, both artistic and commercial:
(a) Intellectual property rights (b) Copyright
(c) Patent (d) Trademark
Answer: (a)
10. Which of the following come under cyber crime?
(a) Intellectual Property Crime (b) Pornography
(c) Online Gambling (d) All the above
Answer: (d)
11. Under the I.T. Act, whoever commits or conspires to commit cyber terrorism shall be punishable with imprisonment which may extend to ____.
(a) two years (b) five years
(c) ten years (d) imprisonment for life
Answer: (d)
12. An unauthorized program which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing:
(a) Trojan Horse (b) Voyeur
(c) Diddling (d) Spamming
Answer: (a)
13. As per the IT (Amendment) Act 2008, Tampering with Computer Source Documents shall be punishable with imprisonment up to years, or with
fine which may extend up to _____rupees, or with both.
(a) two lakh (b) three lakh
(c) four lakh (d) five lakh
Answer: (a)
14. Which of the following is a cyber crime against individual?
(a) Email spoofing (b) Cyber Defamation
(c) Cyber stalking (d) All of these
Answer: (d)
15. The first cyber police station in Kerala was inagurated in:
(a) 2009 (b) 2010 (c) 2011 (d) 2012
Answer: (a)
16. Which of the following is an Intellectual Property crime?
(a) Theft of computer source code
(b) Trademarks violations
(c) Software piracy
(d) All of these
Answer: (d)
17. Altering raw data just before it is processed by a computer and then changing it back after the processing is completed, is termed:
(a) Salami Attack (b) Data diddling
(c) Computer voyeur (d) none of these
Answer: (b)
18. Use of computer resources to intimidate or coerce others, is termed:
(a) Cybernetics (b) Cyber terrorism
(c) Web hosting (d) none of these
Answer: (b)
19. The criminal reads or copies confidential or proprietary information,but the data is neither deleted nor changed- This is termed:
(a) Computer voyeur (b) Spamming
(c) Data diddling (d) None of these
Answer: (a)
20. India’s first cyber police station was started at:
(a) Chennai (b) Bangalore
(c) New Delhi (d) Mumbai
Answer: (b)
21. Posting derogatory remarks about the employer on a social networking site is an example of:
(a) Hacking (b) Spamming
(c) Cyber defamation (d) Spoofing
Answer: (c)
22. The president of India who gave assent to Information Technology Act 2000:
(a) APJ Abdul Kalam (b) K.R.Narayanan
(c) Pratibha Patil (d) None of these
Answer: (b)
23. The IT (Amendment) Bill 2008 was passed by the two houses of the Indian Parliament on_____ 2008.
(a) December 23 and 24 (b) February 7 and 8
(c) October 26 and 27 (d) Decemeber 30 and 31
Answer: (a)
24.Cyber crime can be defined as:
(a) A crime committed online
(b) Stealing of a computer
(c) Organising theft in a computer shop
(d) None of these
Answer: (a)
25. Cyber Laws are included in:
(a) Union List (b) State List
(c) Residuary Powers (d) Concurrent List
Answer: (c)
26. The seat of the Asian School of Cyber Laws:
(a)New Delhi (b) Pune
(c) Chennai (d) Mumbai
Answer: (b)
27. The explicit portrayal of sexual subject matter is termed:
(a) Pornography (b) Spamming
(c) Junking (d) None of these
Answer: (a)
28. _____refers to email that appears to have been originated from one source when it was actually sent from another source.
(a) Email bombing (b) Email spoofing
(c) Email spamming (d) None of these
Answer: (b)
29. A type of cyber crime that occurs in pay per click onlineadvertising when a person, automated script or computer programimitates a legitimate user of a web browser clicking on an ad, for the purpose of generating a charge per click without having actualinterest in the target of the ad’s link.
(a) Phishing (b) Zombie
(c) Click fraud (d) None of these
Answer: (c)
30. Which of the following is a cyber crime?
( a) Hacking (b) Worm attack
(c) Virus attack (d) All of these
Answer: (d)
31. In cyber law terminology ‘DoS’ means:
(a) Denial of Service (b) Disc operating System
(c) Distant Operator service(d) None of these
Answer: (a)
32. A program that has capability to infect other programs and make copies of itself and spread into other programs is called:
(a) Worm (b) Virus
(c) Trojan (d) None of these
Answer: (b)
33. The Indian Parliament passed the Information Technology Bill , which is regarded as the mother legislation regulating the use of computers, computer systems and computer networks as also data and information in the electronic format , in the year:
(a) 2000 (b) 2001
(c) 2002 (d) 2003
Answer: (a)
34. Which one of the following is an example of ‘denial of serviceattack’?
(a) Attempts to “flood” a network, thereby preventing legitimate network traffic
(b) Attempts to disrupt connections between two machines, thereby preventing access to a service
(c) Attempts to prevent a particular individual from accessing a service
(d) All of these
Answer: (d)
35. The use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization is termed:
(a) Cyberspace (b) Cyberstalking
(c) Pornography (d) None of these
Answer: (b)
36. _____ refers to a code of safe and responsible behavior for the internet community:
(a) Cyber crime (b) Cyber Literacy
(c) Cyber Ethics (d) None of the above
Answer: (c)
37. ____ is a theft in which the internet surfing hours of the victim are used up by another person by gaining access to the login ID and the password:
(a) Logic bombs (b) Salami attacks
(c) Internet Time theft (d) Web jacking
Answer: (c)
38. _____ software programs are designed to keep computers safe from hackers:
(a) Fire Walls (b) Cyber security measure
(c) Cyber laws (d) None of these
Answer: (a)
39. The compulsive use of internet pornography known as :
(a) Cyber Addiction (b) Cyber sex
(c) Information Overload (d) Cyber Crime
Answer: (b)
40. This unlawful act wherein the computer is either a tool or target or both:
(a) cyber ethics (b) Cyber Crimes
(c) Cyber literacy (d)None of these above
Answer: (b)
41. Cryptography is used for ______.
(a) Privacy (b) safety
(c) copyright purpose (d) All of these
Answer: (d)
42. This is the exclusive right granted by statute to the author of the works to reproduce dramatic, artistic, literary or musical work or to authorize its
reproduction by others:
(a) Patent (b) Copy Right
(c)Trade Mark (d) None of the above
Answer: (b)
43. Which of the following is not harmful for computer?
(a) Spyware (b) Cookies
(c) Virus (d) Malware
Answer: (b)
44. Which one of the following is an example of unethical behavior of cyber world?
(a) Communalism (b) Eve teasing
(c) terrorism (d) Pirating Music and Videos
Answer: (d)
45. India passed the IT Act 2000 and notified it for effectiveness on:
(a) 2000 May 17 (b) 2000 June 9
(c) 2000 July 9 (d) 2000 October 17
Answer: (d)
46. Which of the following come under software piracy?
(a) Unbundling (b) Renting
(c)Counter Felting (d) All the above
Answer: (d)
47. Loosely organized groups of Internet criminals are called as:
(a) Cyber Criminals (b) Web Gangs
(c) Organized hackers (d) Crackers
Answer: (b)
48. Cryptography is the practice and study of ———.
(a) Accessing information (b) Hiding information
(c) Distributing information (d) None of the above.
Answer: (b)
49. Feeling guilty or defensive about our internet use is a symptom of ________.
(a) Cyber addiction (b) Net Gaming
(c) Online-Chatting (d) Cyber crime
Answer: (a)
50. Making distributing and selling the software copies those are fake, known as:
(a) Renting (b) Unbundling
(c) Soft Loading (d)Counter felting
Answer: (d)
No comments:
Post a Comment