Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

1. Which of the following is not a type of cyber crime?

a) Data theft
b) Forgery
c) Damage to data and systems
d) Installing antivirus for protection

2. Cyber-laws are incorporated for punishing all criminals only.


a) True
b) False

3. Cyber-crime can be categorized into ________ types.


a) 4
b) 3
c) 2
d) 6

4. Which of the following is not a type of peer-to-peer cyber-crime?


a) Phishing
b) Injecting Trojans to a target victim
c) MiTM
d) Credit card details leak in deep web

5. Which of the following is not an example of a computer as weapon cyber-crime?


a) Credit card fraudulent
b) Spying someone using keylogger
c) IPR Violation
d) Pornography

6. Which of the following is not done by cyber criminals?


a) Unauthorized account access
b) Mass attack using Trojans as botnets
c) Email spoofing and spamming
d) Report vulnerability in any system

7. What is the name of the IT law that India is having in the Indian legislature?
a) India’s Technology (IT) Act, 2000
b) India’s Digital Information Technology (DIT) Act, 2000
c) India’s Information Technology (IT) Act, 2000
d) The Technology Act, 2008

8. In which year India’s IT Act came into existence?


a) 2000
b) 2001
c) 2002
d) 2003

OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA


+91 95555 49577
9. What is the full form of ITA-2000?
a) Information Tech Act -2000
b) Indian Technology Act -2000
c) International Technology Act -2000
d) Information Technology Act -2000

10. The Information Technology Act-2000 bill was passed at the time when K. R. Narayanan was President
of India.
a) True
b) False

11. Under which section of IT Act, stealing any digital asset or information is written a cyber-crime.
a) 65
b) 65-D
c) 67
d) 70

12. What is the punishment in India for stealing computer documents, assets or any software’s source code
from any organization, individual, or from any other means?
a) 6 months of imprisonment and a fine of Rs. 50,000
b) 1 year of imprisonment and a fine of Rs. 100,000
c) 2 years of imprisonment and a fine of Rs. 250,000
d) 3 years of imprisonment and a fine of Rs. 500,000

13. What is the updated version of the IT Act, 2000?


a) IT Act, 2007
b) Advanced IT Act, 2007
c) IT Act, 2008
d) Advanced IT Act, 2008

14. In which year the Indian IT Act, 2000 got updated?


a) 2006
b) 2008
c) 2010
d) 2012

15. What type of cyber-crime, its laws and punishments does section 66 of the Indian IT Act holds?
a) Cracking or illegally hack into any system
b) Putting antivirus into the victim
c) Stealing data
d) Stealing hardware components

16. Accessing computer without prior authorization is a cyber-crimes that come under _______
a) Section 65
b) Section 66
c) Section 68
OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA
+91 95555 49577
d) Section 70

17. Cracking digital identity of any individual or doing identity theft, comes under __________ of IT Act.
a) Section 65
b) Section 66
c) Section 68
d) Section 70

18. Accessing Wi-Fi dishonestly is a cyber-crime.


a) True
b) False

19. Download copy, extract data from an open system done fraudulently is treated as _________
a) cyber-warfare
b) cyber-security act
c) data-backup
d) cyber-crime

20. Any cyber-crime that comes under section 66 of IT Act, the accused person gets fined of around Rs
________
a) 2 lacs
b) 3 lacs
c) 4 lacs
d) 5 lacs

21. How many years of imprisonment can an accused person face, if he/she comes under any cyber-crime
listed in section 66 of the Indian IT Act, 2000?
a) 1 year
b) 2 years
c) 3 years
d) 4 years

22. Any digital content which any individual creates and is not acceptable to the society, it’s a cyber-crime
that comes under _________ of IT Act.
a) Section 66
b) Section 67
c) Section 68
d) Section 69

23. IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually
explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of
fine.
a) section 67-A
b) section 67-B
c) section 67-C

OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA


+91 95555 49577
d) section 67-D

24. If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of
_________ years.
a) 2
b) 3
c) 4
d) 5

25. Using spy cameras in malls and shops to capture private parts of any person comes under _______ of IT
Act, 2008.
a) Section 66
b) Section 67
c) Section 68
d) Section 69

26. Using spy cameras in malls and shops to capture private parts of any person comes under section 67 of
IT Act, 2008 and is punished with a fine of Rs. 5 Lacs.
a) True
b) False

27. Using of spy cameras in malls and shops to capture private parts of any person comes under section 67
of IT Act, 2008 and is punished with imprisonment of ___________
a) 2 years
b) 3 years
c) 4 years
d) 5 years

28. Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act.
a) section 65
b) section 66
c) section 71
d) section 72

29. Sending offensive message to someone comes under _____________ of the Indian IT Act ______
a) section 66-A, 2000
b) section 66-B, 2008
c) section 67, 2000
d) section 66-A, 2008

30. Stealing of digital files comes under __________ of the Indian IT Act.
a) section 66-A
b) section 66-B
c) section 66-C
d) section 66-D

OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA


+91 95555 49577
31. Section 79 of the Indian IT Act declares that any 3rd party information or personal data leakage in
corporate firms or organizations will be a punishable offense.
a) True
b) False

32. Which of the following attach is not used by LC4 to recover Windows password?
a) Brute-force attack
b) Dictionary attack
c) MiTM attack
d) Hybrid attacks

33. ____________ is the world’s most popular vulnerability scanner used in companies for checking
vulnerabilities in the network.
a) Wireshark
b) Nessus
c) Snort
d) WebInspect

34. _____________ is a tool which can detect registry issues in an operating system.
a) Network Stumbler
b) Ettercap
c) Maltego
d) LANguard Network Security Scanner

35. Network Stumbler is a Windows Wi-Fi monitoring tool.


a) True
b) False

36. ToneLoc is abbreviated as __________


a) Tone Locking
b) Tone Locator
c) Tone Locker
d) Tune Locator

37. __________ is a debugger and exploration tool.


a) Netdog
b) Netcat
c) Tcpdump
d) BackTrack

38. __________ is a popular command-line packet analyser.


a) Wireshark
b) Snort
c) Metasploit
d) Tcpdump

OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA


+91 95555 49577
39. ________________ is a platform that essentially keeps the log of data from networks, devices as well
as applications in a single location.
a) EventLog Analyser
b) NordVPN
c) Wireshark
d) PacketFilter Analyzer

40. ______________ is competent to restore corrupted Exchange Server Database files as well as
recovering unapproachable mails in mailboxes.
a) Outlook
b) Nessus
c) Mailbox Exchange Recovery
d) Mail Exchange Recovery toolkit

41. ________________ helps in protecting businesses against data breaches that may make threats to
cloud.
a) Centrify
b) Mailbox Exchange Recovery
c) Nessus
d) Dashline

42. __________ is a popular corporate security tool that is used to detect the attack on email with cloud
only services.
a) Cain and Abel
b) Proofpoint
c) Angry IP Scanner
d) Ettercap

43. _____________ helps in protecting corporate data, communications and other assets.
a) Snort
b) CipherCloud
c) Burp Suit
d) Wireshark

44. _________ framework made cracking of vulnerabilities easy like point and click.
a) .Net
b) Metasploit
c) Zeus
d) Ettercap

45. Nmap is abbreviated as Network Mapper.


a) True
b) False

46. __________ is a popular tool used for discovering networks as well as in security auditing.
a) Ettercap
OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA
+91 95555 49577
b) Metasploit
c) Nmap
d) Burp Suit

47. Which of this Nmap do not check?


a) services different hosts are offering
b) on what OS they are running
c) what kind of firewall is in use
d) what type of antivirus is in use

48. Which of the following deals with network intrusion detection and real-time traffic analysis?
a) John the Ripper
b) L0phtCrack
c) Snort
d) Nessus

49. Wireshark is a ____________ tool.


a) network protocol analysis
b) network connection security
c) connection analysis
d) defending malicious packet-filtering

50. Which of the below-mentioned tool is used for Wi-Fi hacking?


a) Wireshark
b) Nessus
c) Aircrack-ng
d) Snort

51. Aircrack-ng is used for ____________


a) Firewall bypassing
b) Wi-Fi attacks
c) Packet filtering
d) System password cracking

52. _____________ is a popular IP address and port scanner.


a) Cain and Abel
b) Snort
c) Angry IP Scanner
d) Ettercap

53. _______________ is a popular tool used for network analysis in multiprotocol diverse network.
a) Snort
b) SuperScan
c) Burp Suit
d) EtterPeak

OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA


+91 95555 49577
54. ____________ scans TCP ports and resolves different hostnames.
a) SuperScan
b) Snort
c) Ettercap
d) QualysGuard

55. ___________ is a web application assessment security tool.


a) LC4
b) WebInspect
c) Ettercap
d) QualysGuard

56. Which of the following attack-based checks WebInspect cannot do?


a) cross-site scripting
b) directory traversal
c) parameter injection
d) injecting shell code

57. ________ is a password recovery and auditing tool.


a) LC3
b) LC4
c) Network Stumbler
d) Maltego

58. L0phtCrack is formerly known as LC3.


a) True
b) False

OBJECTIVE QUESTIONS OF : INFORMATION & CYBER SECURITY BY : MR. AYUSH SHUKLA


+91 95555 49577

You might also like