1. Use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization.
a) email bombing b) spamming c) Cyberstalking d) Phishing d) None of these
a) Section 66 b) Section 67 c)Section 73 d) Section 74 e) None of these
3. Section 66F of IT Act deals with
a)Cyberstalking b) email bombing c) child pornography d) cyber terrorism e) DoS
4. The crime child pornography comes under
a) Section 66F b) Section 67B c)Section 67A d) Section 66 e) None of these
5. India's First case of cyber stalking registered at
a) Delhi b) Bangalore c) Chennai d) Mumbai e) Kochi
6. use of electronic messaging systems to send unsolicited bulk messages is called
a) email bombing b) spamming c) Cyberstalking d) Phishing e) None of these
7.India's first cyber police station
a) Delhi b) Bangalore c) Chennai d) Mumbai e) Kochi
8.Term used for a process to verify the validity of stolen card
a) skimming b) bullying c) carding d) Phishing e) sneaking
9.First Cyber Crime Police Station of Kerala state started functioning at
a) Kannur b) Thiruvananthapuram c) Kozhikode d) Malappuram e) Kochi
10.Act of attempting to acquire information such as usernames,passwords, and credit card details by masquerading as a trustworthy entity is called
a) email bombing b) spamming c) Cyberstalking d) Phishing e) None of these
11. A challenge-response test used in computing as an attempt to ensure that the response is generated by a human being
a) skimmer b) captcha c) doodle d) Phishing e) None of these
12.sending numerous duplicate mails to the same email address
a) email bombing b) spamming c) Cyberstalking d) Phishing e) None of these
13. The famous personality Ankit Fadia is associated with
a) ethical hacking b) anti virus programs c) doodle d) Phishing e) None of these
14. person who attracts users to spam related websites by loading hidden copies of popular keywords
a) hacker b) cracker c) spammer d) spamdexter e) doodler
15. What SEO means
a) Software engineering object b) Search Engine Optimization c) Search Engine Output d) Software estimate optimizer e) None of these.
16.The practice of making a transmission appear to come from an authorized user.
a) hacking b) spoofing c) spamming d) spamdexing e) sneaking
17. The science of secret writing is called
a) cryptography b) Ergonomics c) steganography d) optics e) none of these
18. " Do no evil " is the motto of
a) Yahoo b) Google c) Microsoft d) Adobe e) Intel
19.A mathematical scheme for demonstrating the authenticity of a digital message or document
a) encryption b) Decryption c) cryptograph d) Ergonomics e) Digital Signature
20. Video sharing website recently launched by Iran
5. India's First case of cyber stalking registered at
a) Delhi b) Bangalore c) Chennai d) Mumbai e) Kochi
6. use of electronic messaging systems to send unsolicited bulk messages is called
a) email bombing b) spamming c) Cyberstalking d) Phishing e) None of these
7.India's first cyber police station
a) Delhi b) Bangalore c) Chennai d) Mumbai e) Kochi
8.Term used for a process to verify the validity of stolen card
a) skimming b) bullying c) carding d) Phishing e) sneaking
9.First Cyber Crime Police Station of Kerala state started functioning at
a) Kannur b) Thiruvananthapuram c) Kozhikode d) Malappuram e) Kochi
10.Act of attempting to acquire information such as usernames,passwords, and credit card details by masquerading as a trustworthy entity is called
a) email bombing b) spamming c) Cyberstalking d) Phishing e) None of these
11. A challenge-response test used in computing as an attempt to ensure that the response is generated by a human being
a) skimmer b) captcha c) doodle d) Phishing e) None of these
12.sending numerous duplicate mails to the same email address
a) email bombing b) spamming c) Cyberstalking d) Phishing e) None of these
13. The famous personality Ankit Fadia is associated with
a) ethical hacking b) anti virus programs c) doodle d) Phishing e) None of these
14. person who attracts users to spam related websites by loading hidden copies of popular keywords
a) hacker b) cracker c) spammer d) spamdexter e) doodler
15. What SEO means
a) Software engineering object b) Search Engine Optimization c) Search Engine Output d) Software estimate optimizer e) None of these.
16.The practice of making a transmission appear to come from an authorized user.
a) hacking b) spoofing c) spamming d) spamdexing e) sneaking
17. The science of secret writing is called
a) cryptography b) Ergonomics c) steganography d) optics e) none of these
18. " Do no evil " is the motto of
a) Yahoo b) Google c) Microsoft d) Adobe e) Intel
19.A mathematical scheme for demonstrating the authenticity of a digital message or document
a) encryption b) Decryption c) cryptograph d) Ergonomics e) Digital Signature
20. Video sharing website recently launched by Iran
a) utube b) itube c) mehr d) ivideos e) none of these
21. Which of the following is a cyber crime?
a)Hacking b)Worm attack c)Virus attack d) spamming (e)All of these
22.In cyber law terminology ‘DoS’ means:
a)Denial of Service b)Disk operating System c)Distant operator Service d)None of these
23. By hacking web server taking control on another persons website called as web ..........
a)Spoofing b)Hijacking c)Spamming d) Hosting e) None of these
24.The seat of the Asian School of Cyber Laws:
a)New Delhi b)Pune c)Chennai d)Hyderabad e)Thiruvananthapuram
25. The Indian Parliament passed the Information Technology Bill, which is regarded as the mother legislation regulating the use of computers, computer systems and computer networks as also data and information in the electronic format, in the year:
(a)2000 b)2001 c)2002 d)2003 e)2004
26. .......... Is a computer connected to the internet that has been compromised by a hacker, computer virus or jrojan horse and can be used to perform malicious tasks of one sort of another under remote direction.
a)Server b)Zombie c)Symbian d)None of these
27. Programs that multiply like viruses but spread from computer to computer are called as:
a)Worms b)Virus c)Boot d)None of these
28.According to a report on crimes in India in 2011, published by the National Crime Records Bureau, the largest number of cyber crimes were registered in:
(a)Maharashtra b)Uttar Pradesh c)Karnataka d)Andra Pradesh
29. A type of cyber crime that occurs in pay per click online advertising when a person, automated script or computer program imitates a legitimate user of a web browser clicking on an ad, for the purpose of generating a charge per click without having actual interest in the target of the ad’s link.
(a)Phishing(b)Zombie(c)Click fraud(d)None of these
30. process of transforming plain text to unreadable scrambled text
a) encryption b) Decryption c) cryptograph d) Ergonomics e) None of these
http://www.cyberpolicebangalore.nic.in/pdf/Cyber%20law%20IPC.pdf
http://www.cyberlaws4cxo.com/april_2010/questions.htm
http://www.keralapolice.org/newsite/pdfs/it_rules.pdf
21. Which of the following is a cyber crime?
a)Hacking b)Worm attack c)Virus attack d) spamming (e)All of these
22.In cyber law terminology ‘DoS’ means:
a)Denial of Service b)Disk operating System c)Distant operator Service d)None of these
23. By hacking web server taking control on another persons website called as web ..........
a)Spoofing b)Hijacking c)Spamming d) Hosting e) None of these
24.The seat of the Asian School of Cyber Laws:
a)New Delhi b)Pune c)Chennai d)Hyderabad e)Thiruvananthapuram
25. The Indian Parliament passed the Information Technology Bill, which is regarded as the mother legislation regulating the use of computers, computer systems and computer networks as also data and information in the electronic format, in the year:
(a)2000 b)2001 c)2002 d)2003 e)2004
26. .......... Is a computer connected to the internet that has been compromised by a hacker, computer virus or jrojan horse and can be used to perform malicious tasks of one sort of another under remote direction.
a)Server b)Zombie c)Symbian d)None of these
27. Programs that multiply like viruses but spread from computer to computer are called as:
a)Worms b)Virus c)Boot d)None of these
28.According to a report on crimes in India in 2011, published by the National Crime Records Bureau, the largest number of cyber crimes were registered in:
(a)Maharashtra b)Uttar Pradesh c)Karnataka d)Andra Pradesh
29. A type of cyber crime that occurs in pay per click online advertising when a person, automated script or computer program imitates a legitimate user of a web browser clicking on an ad, for the purpose of generating a charge per click without having actual interest in the target of the ad’s link.
(a)Phishing(b)Zombie(c)Click fraud(d)None of these
30. process of transforming plain text to unreadable scrambled text
a) encryption b) Decryption c) cryptograph d) Ergonomics e) None of these
Source :
http://www.cyberpolicebangalore.nic.in/pdf/Cyber%20law%20IPC.pdf
http://www.cyberlaws4cxo.com/april_2010/questions.htm
http://www.keralapolice.org/newsite/pdfs/it_rules.pdf
1 comment:
Answer to question 17 seems to be steganography and not cryptography
Post a Comment