1.
Which of the following is not a type of cyber crime?
Correct Answer
D. Installing antivirus for protection
Explanation
Installing antivirus for protection is not a type of cyber crime because it is a preventive measure taken to safeguard against cyber crimes. Cyber crimes involve illegal activities such as data theft, forgery, and damage to data and systems. However, installing antivirus software is a proactive step to protect against these crimes rather than an actual criminal activity.
2.
Which of the following is not a typical characteristic of an ethical hacker?
Correct Answer
D. Has the highest level of security for the organization
Explanation
An ethical hacker is someone who is authorized to hack into a system to identify and fix security vulnerabilities. They typically have excellent knowledge of Windows, understand the process of exploiting network vulnerabilities, and possess qualities such as patience, persistence, and perseverance. However, having the highest level of security for the organization is not a characteristic of an ethical hacker, as their role is to identify and fix security flaws, not necessarily to have the highest level of security in place.
3.
What is the most important activity in system hacking?
Correct Answer
B. Cracking passwords
Explanation
Cracking passwords is the most important activity in system hacking because it allows the hacker to gain unauthorized access to a system or network. By cracking passwords, the hacker can bypass security measures and gain control over the system, potentially allowing them to steal sensitive information, install malicious software, or cause other types of damage.
4.
Which of the following is not done by cyber criminals?
Correct Answer
D. Report vulnerability in any system
Explanation
Cyber criminals engage in various illegal activities to exploit vulnerabilities and gain unauthorized access to accounts, launch mass attacks using Trojans as botnets, and engage in email spoofing and spamming. However, reporting vulnerabilities in any system is not something that cyber criminals typically do. Instead, ethical hackers or security researchers report vulnerabilities to help improve the security of systems and protect against potential cyber threats.
5.
What is the name of the IT law that India is having in the Indian legislature?
Correct Answer
C. India’s Information Technology (IT) Act, 2000
Explanation
India's Information Technology (IT) Act, 2000 is the correct answer because it is the legislation in India that governs all electronic communications and transactions, as well as cybercrimes and cybersecurity. This act was enacted to provide a legal framework for e-commerce, electronic records, and digital signatures in India. It also addresses issues related to data protection, privacy, and cyber offenses.
6.
What is the full form of ITA-2000?
Correct Answer
D. Information Technology Act -2000
Explanation
The correct answer is "Information Technology Act -2000". The ITA-2000 refers to the Information Technology Act of the year 2000. This act is a legislation in India that provides legal recognition to electronic transactions and governs various aspects of cyberspace, including digital signatures, cybercrime, data protection, and electronic governance.
7.
All of the following are examples of real security and privacy threats except:
Correct Answer
C. Spam
Explanation
Spam is not an example of a real security and privacy threat because it refers to unsolicited and unwanted emails, messages, or advertisements. While spam can be annoying and time-consuming, it does not pose a direct threat to the security or privacy of individuals or organizations. On the other hand, hackers, viruses, and worms are all examples of real threats that can compromise the security and privacy of systems, networks, and personal information. Hackers can gain unauthorized access, viruses can infect and damage files, and worms can replicate and spread malicious code.
8.
It is stealing ideas or creations of others.
Correct Answer
A. Plagiarism
Explanation
Plagiarism refers to the act of stealing ideas or creations of others without giving proper credit or permission. It involves copying someone else's work and presenting it as one's own. Intellectual Property Rights and Piracy are related concepts but not specific to the act of stealing ideas or creations. Therefore, the correct answer is Plagiarism.
9.
Passwords are used to improve the ……….. of a network
Correct Answer
C. Security
Explanation
Passwords are used to improve the security of a network. By requiring users to enter a password, it adds an extra layer of protection and ensures that only authorized individuals can access the network. Passwords help prevent unauthorized access, data breaches, and protect sensitive information from being compromised. They are an essential component of network security measures and play a crucial role in safeguarding the network and its resources.
10.
By encryption of a text we mean
Correct Answer
C. Scrambling it to preserve its security
Explanation
Encryption of a text refers to the process of scrambling it in order to protect its confidentiality and security. This involves transforming the original text into an unreadable format using various algorithms and keys. The purpose of encryption is to ensure that only authorized individuals can access and understand the information, while preventing unauthorized users from deciphering the encrypted text. Encryption is widely used in various applications such as secure communication, data storage, and online transactions to safeguard sensitive information from potential threats and unauthorized access.
11.
A digital signature is
Correct Answer
C. An authentication of an electronic record by trying it uniquely to a key only a sender knows
Explanation
A digital signature is an authentication mechanism used to verify the integrity and authenticity of an electronic record. It is created by encrypting the record using a private key that only the sender knows. The recipient can then use the corresponding public key to decrypt the signature and verify that it matches the original record. This ensures that the record has not been tampered with and that it was indeed sent by the claimed sender.
12.
Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a system are termed as ________
Correct Answer
B. White Hat Hackers
Explanation
White Hat hackers are individuals who use their hacking skills to identify and fix security vulnerabilities in systems. They do not have malicious intentions and work with the permission of the system owners to improve security. Unlike Black Hat hackers who exploit vulnerabilities for personal gain and Red Hat hackers who seek revenge, White Hat hackers are ethical hackers who aim to protect systems and prevent cyber attacks. Grey Hat hackers fall in between, as they may exploit vulnerabilities without permission but with good intentions to expose weaknesses and prompt fixes.
13.
Which is the legal form of hacking based on which jobs are provided in IT industries and firms?
Correct Answer
C. Ethical hacking
Explanation
Ethical hacking is the correct answer because it refers to the practice of intentionally and legally hacking into computer systems to identify vulnerabilities and improve their security. In the IT industry and firms, ethical hackers are hired to assess the security of their systems and networks, identify potential threats, and provide recommendations to enhance security measures. This form of hacking is legal and authorized, as it is conducted with the consent of the system owner and aims to protect against malicious attacks.
14.
They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here?
Correct Answer
D. Black Hat Hackers
Explanation
Black Hat Hackers are referred to as nefarious hackers who engage in cyber crimes with the main motive of gaining financial profit. They use their hacking skills for malicious purposes, such as stealing personal information, conducting fraud, or launching cyber attacks. Unlike White Hat Hackers who use their skills for ethical purposes and to improve security, Black Hat Hackers operate outside the boundaries of the law and are motivated by personal gain rather than ethical considerations.
15.
The full form of Malware is ________
Correct Answer
C. Malicious Software
Explanation
The correct answer is "Malicious Software." Malware refers to any software intentionally designed to cause damage, disrupt, or gain unauthorized access to computer systems or networks. It includes various types of harmful programs such as viruses, worms, trojans, ransomware, spyware, and adware. The term "malicious" implies the harmful intent behind the software, highlighting its malicious nature.
16.
An attempt to harm, damage or cause threat to a system or network is broadly termed as ______
Correct Answer
B. Cyber Attack
Explanation
A cyber attack refers to an intentional and malicious attempt to harm, damage, or pose a threat to a system or network. It involves unauthorized access, disruption, or manipulation of computer systems, networks, or digital devices. Cyber attacks can take various forms, such as malware infections, phishing scams, denial-of-service attacks, or data breaches. The objective of these attacks can range from stealing sensitive information, causing financial loss, or disrupting operations. Therefore, cyber attack is the most appropriate term to describe the broad concept of attempting to harm or threaten a system or network.
17.
________ is any action that might compromise cyber-security.
Correct Answer
A. Threat
Explanation
A threat refers to any action or event that has the potential to compromise cyber-security. It can include activities such as hacking, malware attacks, unauthorized access, or any other malicious intent that can cause harm to computer systems, networks, or data. Threats can come from external sources such as hackers or internal sources such as disgruntled employees. It is important to identify and mitigate threats to ensure the security and integrity of digital assets.
18.
An/A ________ is an act that violates cyber-security.
Correct Answer
D. Attack
Explanation
An attack is an act that violates cyber-security. It refers to any deliberate action or attempt to compromise the confidentiality, integrity, or availability of computer systems, networks, or data. Attacks can range from malware infections and phishing attempts to hacking, denial-of-service attacks, and social engineering tactics. These actions are intended to exploit vulnerabilities or weaknesses in the system or network, causing harm or unauthorized access.
19.
____________ is an attempt to steal, spy, damage or destroy computer systems, networks or their associated information.
Correct Answer
B. Cyber attack
Explanation
A cyber attack refers to an intentional act of stealing, spying, damaging, or destroying computer systems, networks, or their associated information. It involves unauthorized access or manipulation of digital devices or networks with the aim of causing harm or extracting valuable data. Cyber attacks can take various forms, such as malware infections, phishing scams, denial-of-service attacks, or hacking into databases. Protecting against cyber attacks is a crucial aspect of cyber-security measures, which involve implementing preventive measures, detecting and responding to threats, and recovering from any damages caused.
20.
A computer ________ is a malicious code which self-replicates by copying itself to other programs.
Correct Answer
B. Virus
Explanation
A computer virus is a type of malicious code that is capable of replicating itself by copying its code to other programs. Unlike other options such as program, application, and worm, a virus specifically refers to a self-replicating code that infects other programs on a computer system. This self-replication allows the virus to spread and potentially cause harm to the infected system.