121
85.8k
Chapter:

30+ Cyber Crime Solved MCQs

in E-Business

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Bachelor of Science in Information Technology TY (BSc IT) , Bachelor of Science in Information Technology (BSc IT) .

Chapters

Chapter: Cyber Crime
1.

What is the primary target of a cybercrime classified as a crime against an individual?

A. Financial data
B. Personal privacy and safety
C. Government infrastructure
D. Corporate websites
Answer» B. Personal privacy and safety
Explanation: Crimes against individuals in the digital realm often involve direct harm or intrusion upon a person's well-being or rights.
2.

Which of the following is a commonly used term for cybercrime?

A. Computer crime
B. Internet offense
C. Digital delinquency
D. Electronic mischief
Answer» A. Computer crime
Explanation: Cybercrime and computer crime are often used interchangeably to describe illegal activities involving computers.
3.

The Information Technology Act, 2000 aims to replace which traditional method of communication in legal transactions?

A. Verbal agreements
B. Telegraphic messages
C. Paper-based communication
D. Registered mail
Answer» C. Paper-based communication
Explanation: The IT Act 2000 was enacted to transition from paper-based legal processes to electronic ones.
4.

Which of the following is NOT a primary objective of the Information Technology Act, 2000?

A. Legalizing electronic transactions
B. Authenticating information using digital signatures
C. Enabling electronic filing of documents
D. Mandating online dispute resolution for cybercrime
Answer» D. Mandating online dispute resolution for cybercrime
Explanation: While the IT Act promotes secure electronic transactions, it doesn't specifically mandate online dispute resolution mechanisms.
5.

Under Section 43 of the IT Act 2000, what is the penalty for unauthorized access to a computer system?

A. Imprisonment up to three years
B. Fine up to five lakh rupees
C. Compensation to the affected party
D. Mandatory community service
Answer» C. Compensation to the affected party
Explanation: Section 43 focuses on compensation to the affected party rather than a predetermined fine.
6.

Which section of the IT Act 2000 specifically addresses compensation for neglecting to protect sensitive personal data?

A. Section 43A
B. Section 44
C. Section 65
D. Section 66
Answer» A. Section 43A
Explanation: Section 43A highlights the responsibility of entities handling sensitive data to implement proper security measures.
7.

What is the maximum penalty for failing to furnish information or returns as required by the IT Act 2000?

A. Imprisonment for one year
B. Fine up to one lakh fifty thousand rupees
C. Suspension of online business operations
D. Confiscation of computer equipment
Answer» B. Fine up to one lakh fifty thousand rupees
Explanation: Section 44 outlines the penalty for non-compliance with requests for information or reports.
8.

Which section of the IT Act 2000 deals with the act of tampering with computer source documents?

A. Section 66
B. Section 67
C. Section 65
D. Section 69
Answer» C. Section 65
Explanation: Section 65 criminalizes the act of intentionally altering or destroying computer code or programs.
9.

What is the punishment for a second conviction under Section 67 of the IT Act 2000, related to publishing obscene material?

A. Fine up to five lakh rupees
B. Imprisonment up to three years
C. Community service and mandatory counseling
D. Imprisonment up to five years and fine up to ten lakh rupees
Answer» D. Imprisonment up to five years and fine up to ten lakh rupees
Explanation: Section 67 outlines escalating penalties for repeat offenders involved in the distribution of obscene content.
10.

Under which section of the IT Act 2000 does the government have the power to intercept or monitor computer information?

A. Section 69
B. Section 71
C. Section 72
D. Section 73
Answer» A. Section 69
Explanation: Section 69 grants the government the authority to access and monitor digital information under specific circumstances.
11.

What is the punishment for misrepresenting information to obtain a license or digital signature certificate under the IT Act 2000?

A. Revocation of license and a fine up to five lakh rupees
B. Imprisonment up to two years or fine up to one lakh rupees, or both
C. Mandatory training on ethical digital conduct
D. Community service and a public apology
Answer» B. Imprisonment up to two years or fine up to one lakh rupees, or both
Explanation: Section 71 emphasizes the importance of honesty and transparency when applying for licenses or digital certificates.
12.

Which section of the IT Act 2000 specifically addresses the breach of confidentiality and privacy?

A. Section 72
B. Section 73
C. Section 74
D. Section 75
Answer» A. Section 72
Explanation: Section 72 focuses on the repercussions of unauthorized disclosure of electronic information obtained through legal means.
13.

What is the penalty for publishing a digitally signed certificate for fraudulent purposes under the IT Act 2000?

A. Revocation of certificate and a fine up to five lakh rupees
B. Compulsory ethical hacking training
C. Imprisonment up to two years or fine up to one lakh rupees, or both
D. Community service and a public apology
Answer» C. Imprisonment up to two years or fine up to one lakh rupees, or both
Explanation: Section 74 highlights the legal consequences of misusing digital certificates for illegal activities.
14.

Which section of the IT Act 2000 clarifies that the Act is applicable to offenses committed outside India?

A. Section 73
B. Section 74
C. Section 76
D. Section 75
Answer» D. Section 75
Explanation: Section 75 extends the jurisdiction of the IT Act to cover cybercrimes committed by individuals even beyond the geographical boundaries of India.
15.

What is the provision for compounding offenses under sections 77A and 77B of the IT Act 2000?

A. Offenses with three years imprisonment are cognizable.
B. All offenses are compoundable with a fine.
C. Offenses committed outside India are not compoundable.
D. Only offenses against individuals are compoundable.
Answer» A. Offenses with three years imprisonment are cognizable.
Explanation: Sections 77A and 77B provide guidelines for handling offenses, particularly those involving imprisonment of three years or more.
16.

Which rank of police officer is authorized to investigate offenses under the IT Act 2000, as per Section 78?

A. Constable
B. Sub-Inspector
C. Inspector
D. Superintendent of Police
Answer» C. Inspector
Explanation: Section 78 designates the minimum rank required for a police officer to conduct investigations related to cybercrime.
17.

Which of the following is NOT a primary category of cybercrime?

A. Crimes against individuals
B. Crimes against property
C. Crimes against the government
D. Crimes against educational institutions
Answer» D. Crimes against educational institutions
Explanation: Cybercrime is typically categorized based on the target – individuals, property, or government. Educational institutions are not a primary target category.
18.

Which type of cybercrime involves harassing or threatening someone online?

A. Cyberstalking
B. Hacking
C. Online identity theft
D. Ransomware attack
Answer» A. Cyberstalking
Explanation: Cyberstalking is a form of harassment that takes place online, often using electronic communication to threaten or intimidate the victim.
19.

What is the main motive behind most online scams or internet fraud?

A. To spread awareness about social causes
B. To disrupt government websites
C. To steal money or financial information
D. To gain access to personal photos and videos
Answer» C. To steal money or financial information
Explanation: The primary goal of online scams is to deceive individuals into voluntarily giving up their money or financial information.
20.

What type of cybercrime involves gaining unauthorized access to a computer system or network?

A. Cyberstalking
B. Hacking
C. Online identity theft
D. Ransomware attack
Answer» B. Hacking
Explanation: Hacking is the act of exploiting system vulnerabilities to gain unauthorized access to devices or networks.
21.

Which cybercrime involves stealing someone's personal information for financial gain?

A. Cyberstalking
B. Hacking
C. Online identity theft
D. Ransomware attack
Answer» C. Online identity theft
Explanation: Online identity theft occurs when criminals steal personal information, such as social security numbers or bank details, for financial gain.
22.

What type of malware is used in a ransomware attack?

A. Virus
B. Trojan horse
C. Worm
D. Ransomware
Answer» D. Ransomware
Explanation: Ransomware is a specific type of malware that encrypts the victim's data and demands a ransom for its release.
23.

Which of the following is a common method used to carry out online identity theft?

A. Phishing emails
B. Social media posts
C. Online surveys
D. Text messages
Answer» A. Phishing emails
Explanation: Phishing emails are designed to trick individuals into revealing their personal information, often by mimicking legitimate institutions.
24.

What is the term for a person who engages in hacking activities?

A. Cyberstalker
B. Hacker
C. Phisher
D. Scammer
Answer» B. Hacker
Explanation: A hacker is an individual who uses their technical skills to gain unauthorized access to computer systems or networks.
25.

What is a common target for cybercriminals committing crimes against property?

A. Personal blogs
B. Social media profiles
C. Organization's website
D. Government databases
Answer» C. Organization's website
Explanation: Cybercriminals often target an organization's website to steal data, disrupt operations, or deface their online presence.
26.

What is the term for cybercrimes that target governments?

A. Cyberwarfare
B. Cyberespionage
C. Cyberattack
D. Cyberterrorism
Answer» D. Cyberterrorism
Explanation: Cyberterrorism involves acts of hacking or disruption targeting government systems or infrastructure.
27.

Which of the following is a potential consequence of a successful cyberterrorism attack?

A. Widespread panic and disruption of essential services
B. Increased funding for cybersecurity research
C. Improved international cooperation in cyberspace
D. Reduced reliance on technology
Answer» A. Widespread panic and disruption of essential services
Explanation: Cyberterrorism can have severe real-world consequences, including widespread panic and disruption of essential services.
28.

What type of cybercrime involves the downloading, selling, or distribution of child pornography?

A. Cyberstalking
B. Online child abuse
C. Internet fraud
D. Ransomware attack
Answer» B. Online child abuse
Explanation: Online child abuse encompasses various activities, including the creation, distribution, and possession of child sexual abuse material.
29.

What is a common payment method demanded by cybercriminals in ransomware attacks?

A. Credit cards
B. Bank transfers
C. Bitcoins
D. Gift cards
Answer» C. Bitcoins
Explanation: Bitcoin and other cryptocurrencies are often demanded in ransomware attacks due to their decentralized and relatively anonymous nature.
30.

What type of cybercrime involves posing as a representative of a charitable organization to solicit donations?

A. Charity fraud
B. Investment fraud
C. Romance scam
D. Job scam
Answer» A. Charity fraud
Explanation: Charity fraud is a specific type of online scam where criminals exploit people's generosity for financial gain.
31.

What is the purpose of the hash function used in digital signatures, as per the IT Act 2000?

A. To encrypt the message
B. To decrypt the message
C. To create a unique digital fingerprint
D. To transmit the message securely
Answer» C. To create a unique digital fingerprint
Explanation: A hash function creates a unique digital fingerprint of a message or document, ensuring its integrity and authenticity.
32.

What type of cryptosystem is mandated for digital signatures in the IT Act 2000?

A. Asymmetric cryptosystem
B. Symmetric cryptosystem
C. Hybrid cryptosystem
D. Elliptic curve cryptosystem
Answer» A. Asymmetric cryptosystem
Explanation: Asymmetric cryptography, using separate keys for encryption and decryption, enhances security in digital signatures.
33.

Which of the following is NOT a feature of the Cyber Regulatory Appellate Tribunal under the IT Act 2000?

A. Handles appeals against orders of the Controller
B. Conducts independent investigations into cybercrimes
C. Hears appeals against orders of the Adjudicating Officer
D. Its decisions can be challenged in the High Court
Answer» B. Conducts independent investigations into cybercrimes
Explanation: The Cyber Regulatory Appellate Tribunal handles appeals related to orders passed by the Controller or Adjudicating Officer. It does not conduct independent investigations.
34.

What is the maximum amount of compensation that can be levied on a body corporate for failing to protect sensitive personal data, as per Section 43A of the IT Act?

A. One crore rupees
B. Two crore rupees
C. Three crore rupees
D. Five crore rupees
Answer» D. Five crore rupees
Explanation: Section 43A specifies a maximum penalty of five crore rupees for negligence in safeguarding sensitive personal data.

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.