Multiple Choice Questions-societal Impact

20 Questions | Total Attempts: 2466

SettingsSettingsSettings
Please wait...
Multiple Choice Questions-societal Impact

.


Questions and Answers
  • 1. 
    Which of the following is not a type of cyber crime?
    • A. 

      Data theft

    • B. 

      Forgery

    • C. 

      Damage to data and systems

    • D. 

      Installing antivirus for protection

  • 2. 
    Which of the following is not a typical characteristic of an ethical hacker?
    • A. 

      Excellent knowledge of Windows

    • B. 

      Understands the process of exploiting network vulnerabilities

    • C. 

      Patience, persistence and perseverance

    • D. 

      Has the highest level of security for the organization

  • 3. 
    What is the most important activity in system hacking?
    • A. 

      Information gathering

    • B. 

      Cracking passwords

    • C. 

      Escalating privileges

    • D. 

      Covering tracks

  • 4. 
    Which of the following is not done by cyber criminals?
    • A. 

      Unauthorized account access

    • B. 

      Mass attack using Trojans as botnets

    • C. 

      Email spoofing and spamming

    • D. 

      Report vulnerability in any system

  • 5. 
    What is the name of the IT law that India is having in the Indian legislature?
    • A. 

      India’s Technology (IT) Act, 2000

    • B. 

      India’s Digital Information Technology (DIT) Act, 2000

    • C. 

      India’s Information Technology (IT) Act, 2000

    • D. 

      The Technology Act, 2008

  • 6. 
    What is the full form of ITA-2000?
    • A. 

      Information Tech Act -2000

    • B. 

      Indian Technology Act -2000

    • C. 

      International Technology Act -2000

    • D. 

      Information Technology Act -2000

  • 7. 
    All of the following are examples of real security and privacy threats except:
    • A. 

      Hackers

    • B. 

      Virus

    • C. 

      Spam

    • D. 

      Worm

  • 8. 
    It is stealing ideas or creations of others.
    • A. 

      Plagiarism

    • B. 

      Intellectual Property Rights

    • C. 

      Piracy

    • D. 

      All of the above

  • 9. 
    Passwords are used to improve the ……….. of a network
    • A. 

      Performance

    • B. 

      Reliability

    • C. 

      Security

    • D. 

      Longevity

  • 10. 
    By encryption of a text we mean
    • A. 

      Compressing it

    • B. 

      Expanding it

    • C. 

      Scrambling it to preserve its security

    • D. 

      Hashing it

  • 11. 
    A digital signature is
    • A. 

      A bit string giving identity of a correspondent

    • B. 

      A unique identification

    • C. 

      An authentication of an electronic record by trying it uniquely to a key only a sender knows

    • D. 

      An encrypted signature of a sender

  • 12. 
    Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a system are termed as ________
    • A. 

      Black Hat hackers

    • B. 

      White Hat Hackers

    • C. 

      Grey Hat Hackers

    • D. 

      Red Hat Hackers

  • 13. 
    Which is the legal form of hacking based on which jobs are provided in IT industries and firms?
    • A. 

      Cracking

    • B. 

      Non ethical Hacking

    • C. 

      Ethical hacking

    • D. 

      Hactivism

  • 14. 
    They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here?
    • A. 

      Gray Hat Hackers

    • B. 

      White Hat Hackers

    • C. 

      Hactivists

    • D. 

      Black Hat Hackers

  • 15. 
    The full form of Malware is ________
    • A. 

      Malfunctioned Software

    • B. 

      Multipurpose Software

    • C. 

      Malicious Software

    • D. 

      Malfunctioning of Security

  • 16. 
    An attempt to harm, damage or cause threat to a system or network is broadly termed as ______
    • A. 

      Cyber-crime

    • B. 

      Cyber Attack

    • C. 

      System hijacking

    • D. 

      Digital crime

  • 17. 
    ________ is any action that might compromise cyber-security.
    • A. 

      Threat

    • B. 

      Vulnerability

    • C. 

      Exploit

    • D. 

      Attack

  • 18. 
    An/A ________ is an act that violates cyber-security.
    • A. 

      Threat

    • B. 

      Vulnerability

    • C. 

      Exploit

    • D. 

      Attack

  • 19. 
    ____________ is an attempt to steal, spy, damage or destroy computer systems, networks or their associated information.
    • A. 

      Cyber-security

    • B. 

      Cyber attack

    • C. 

      Digital hacking

    • D. 

      Computer security

  • 20. 
    A computer ________ is a malicious code which self-replicates by copying itself to other programs.
    • A. 

      Program

    • B. 

      Virus

    • C. 

      Application

    • D. 

      Worm

Back to Top Back to top