Cyber Security Quiz Question and Answers

Cyber Security MCQ Quiz

Hello Students, Today We came up with the Cyber Security MCQ Quiz with Answers.

This MCQ PDF is helpful for the students of Class 9 and Competitive Exams like UPSC. The main motive for providing this MCQ with Answers is that the Student can be aware of Cyber Security and Cyber Crime. We will be soon coming with the MCQ Quiz on Data Security.

Check out this quick quiz to see how much you know about cyber security and whether you’re prepared for an interview on the subject.

Cyber Security MCQ Quiz With Answers

Question 1: Many Cyber Crimes come under the Indian Penal Code Which one of the following is an example?

(A) Sending a Threatening message by Email

(B) Forgery of Electronic Record

(C) Bogus Website

(D) All of above

View Answer

(D) All of above

Question 2: The investigator has to take the following precautions while collecting evidence (which option is incorrect):

(A) seeks Magistrate’s permission before investigating a cognizable offence

(B) videotaping the scene, to document the system configuration and the initial condition of the site before arrival

(C) photograph the equipment with its serial number, model number & writing schemes.

(D) labelling the evidence

View Answer

(A) seeks Magistrate’s permission before investigating a cognizable offence

Question 3: The Information Technology Act 2000 is an Act of Indian Parliament notified on ___________.

(A) 27th October 2000

(B) 17th October 2000

(C) 15th December 2000

(D) 17th November 2000

View Answer

(B) 17th October 2000

Question 4: Section 70 – Access or attempt to access by any unauthorized person, a protected computer system as notified by the Government in the Official Gazette where the punishment may extend up to 10 yrs. and fine is ____________.

(A) Cognizable, Bailable

(B) Cognizable, Non-Bailable

(C) Non-Cognizable, Bailable

(D) Non- Cognizable, Non-Bailable

View Answer

(B) Cognizable, Non-Bailable

Question 5: Digital Signature Certificate is ____________ requirement under various applications

(A) Legislative

(B) Statutory

(C) Voluntary

(D) Govenmental

View Answer

(B) Statutory

Question 6: Section 74 – Publication of Digital Signature Certificate for a fraudulent purpose, where imprisonment may extend to 2 yrs. or with fine which may extend to Rs. 1 lakh or both is __________.

(A) Non-Cognizable, Non-Bailable

(B) Cognizable, Non-Bailable

(C) Cognizable, Bailable

(D) Non-Cognizable, Bailable

View Answer

(D) Non-Cognizable, Bailable

Question 7:  Assessing Computer without prior authorization is a cyber crime that comes under ________.

(A) Section 68

(B) Section 65

(C) Section 66

(D) Section 70

View Answer

(C) Section 66

Question 8: When to start investigation __________.

(A) after receiving permission from Cyber Cell

(B) in case of cognizable offence after lodging of the FIR under Section 154 of Cr. P. C.

(C) after receiving authority from Sr. Inspector of Police

(D) as soon as the non-cognizable offence is brought to the notice of the Police

View Answer

(B) in case of cognizable offence after lodging of the FIR under Section 154 of Cr. P. C.

Question 9:  ____________ means a person who has been granted a licence to issue a electronic signature certificate.

(A) Certifying Private Key Authority

(B) Certifying system controller

(C) Appropriate Authority

(D) Certifying Authority

View Answer

(D) Certifying Authority

Question 10: Hacking means ___________.

(A) use of information and communication technologies to support deliberate, repeated and hostile behaviour

(B) without the permission of the owner to download computer data.

(C) a form of fraud or cheating of another person’s identity in which someone pretends to be someone else by assuming that person’s identity.

(D) unauthorized attempts to bypass the security mechanisms of an information system or network.

View Answer

(D) unauthorized attempts to bypass the security mechanisms of an information system or network.

Question 11: ________ is data that has been organized or presented in a meaningful manner.

(A) A process

(B) Information

(C) Software

(D) Storage

View Answer

(B) Information

Question 12: Data theft includes ___________.

(A) without the permission of the person who is in charge of the computer, to download, copy or extract any data, computer database or information from the computer.

(B) use of information and communication technologies to support hostile behaviour

(C) unauthorized attempts to bypass the security mechanisms of an information system or network.

(D) a form of fraud or cheating of another person’s identity

View Answer

(A) without the permission of the person who is in charge of the computer, to download, copy or extract any data, computer database or information from the computer.

Question 13: _______ is an application of information and communication technology (ICT) for delivering Government Service.

(A) Risk and Governance.

(B) Electronic Governance

(C) Governance and Ethics

(D) Governance

View Answer

(B) Electronic Governance

Question 14: In the following case the Hon’ble Supreme Court struck down Section 66 A of eh I.T. Act ___________.

(A) Kartar Singh v/s State of Punjab

(B) Shreya Singhal v/s UOI

(C) Maneka Gandhi v/s UOI

(D) K. A. Abbas v/s UOI

View Answer

(B) Shreya Singhal v/s UOI

Question 15: The Altering of data so that it is not usable unless the changes are undone is _______.

(A) Encryption

(B) Biometrics

(C) Compression

(D) Ergonomics

View Answer

(A) Encryption

Question 16: The following laws / sections were amended / passed to combat pornography of an aggravated form ___________.

(A) Section 134 of the Indian Evidence Act, 1872

(B) Section 376 of the Indian Penal Code

(C) Section 13 of the POCSO Act, 2012 was passed to deal with such offences

(D)  Sections 66 A and 66 B of the I.T. (Amendment) Act, 2008

View Answer

(D)  Sections 66 A and 66 B of the I.T. (Amendment) Act, 2008

Question 17: Authentication is _________.

(A) Insertion

(B) Modification

(C) To assure identity of user on a remote system

(D) Integration

View Answer

(C) To assure identity of user on a remote system

Question 18: Prosecution has to give copies of __________.

(A) only those copies of the electronic records which are contained external hard disks, pen drives, CDs, etc.

(B) all electronic records relied upon by the prosecution to the Accused

(C) non-electronic records involved in the case to the Accused

(D) only certain electronic documents to the Accused

View Answer

(A) only those copies of the electronic records which are contained external hard disks, pen drives, CDs, etc.

Question 19: The following cannot be exploited by assigning or by licensing the rights of others ____________.

(A) Trademark

(B) Patent

(C) Design

(D) All of the above

View Answer

(A) Trademark

Question 20:  The following Section draws a presumption that a secure electronic record has not been altered since the point of time to which the secure status relates ___________.

(A) Section 3 of the I.T. Act, 2000

(B) Section 200 of Cr. P. C.

(C) Section 192 of the Indian Penal Code, 1860

(D) Section 85 B of the Indian Evidence Act, 1872

View Answer

(D) Section 85 B of the Indian Evidence Act, 1872

Download the Cyber Security MCQ Quiz from the link given below:

Thank You Students for Solving the MCQ Quiz given above. We hope that this Cyber Security MCQ Quiz has increased your knowledge and awareness of the Crimes that are being done nowadays.

Go to Main Computer Quiz Topics