Subscribe this Blog

Enter your email address:

Delivered by FeedBurner

Followers

Monday, October 21, 2013

Cyber Law and Cyber Crime : SB CID PSC EXam

1. Act of attempting to acquire information such as usernames,passwords, and credit card details by masquerading as a trustworthy entity is
a) email bombing b) spamming c) Cyberstalking d) Phishing e) None of these

2. Which section of IT Act covers most of the common crimes arising out of “Unauthorised Access”
a) Section 66  b) Section 67 c)Section 73 d) Section 74 e) None of these

3. Section 66F of IT Act deals with
a)Cyberstalking b) email bombing c) child pornography  d) cyber terrorism  e) DoS

4. The crime child pornography comes under
a) Section 66F  b) Section 67B c)Section 67A d) Section 66 e) None of these

5. India's First case of cyber stalking registered at
a) Delhi b) Bangalore c) Chennai d) Mumbai e) Kochi

6. use of electronic messaging systems to send unsolicited bulk messages is called
a) email bombing b) spamming c) Cyberstalking d) Phishing e) None of these

7.India's first cyber police station
a) Delhi b) Bangalore c) Chennai d) Mumbai e) Kochi

8.Term used for a process to verify the validity of stolen card
a) skimming b) bullying c) carding d) Phishing e) sneaking

9.First Cyber Crime Police Station of Kerala state started functioning at
a) Kannur b) Thiruvananthapuram c) Kozhikode d) Malappuram e) Kochi

10. Use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization.
a) email bombing b) spamming c) Cyberstalking d) Phishing d) None of these

11. A challenge-response test used in computing as an attempt to ensure that the response is generated by a human being
a) skimmer b) captcha c) doodle d) Phishing e) None of these

12.sending numerous duplicate mails to the same email address
a) email bombing b) spamming c) Cyberstalking d) Phishing e) None of these

13. The famous personality Ankit Fadia is associated with
a) ethical hacking b) anti virus programs c) doodle d) Phishing e) None of these

14. person who attracts users to spam related websites by loading hidden copies of popular keywords
a) hacker b) cracker c) spammer d) spamdexter e) doodler

15. What SEO means
a) Software engineering object b) Search Engine Optimization c) Search Engine Output d) Software estimate optimizer e) None of these.

No comments:

Total Pageviews

Disclaimer : Blog Policies

This blog publishes various general knowledge. errors and omissions expected. The Knowledge documents in this blog meant only to increase the general awareness of the readers. If any of the information available on this blog violates or infringes any of your copyright protection, leave a comment . This blog makes no representations as to accuracy, completeness, correctness or validity of any information on this site and will not be liable for any errors, or delays in this information. The information contained in this blog is subject to change without notice. You may use contents in this blog only for personal use. Reproduction and republishing of any contents from here to any other websites or blogs is strictly prohibited.