You are on page 1of 16

GK On Cyber Security: Cyber Crime, Cyber

Attack (Question And Answer)

Last Updated: 18 June 2022

Cyber Security is the Protection of Your’s, Your Family, Your


Client’s Computer System, and the Network associated with it.

It is the protection of the Computer System from the theft of


Passwords, Documents, Files, etc, and damage to the Hardware,
Software, and Electronic data.

As we get more into the Digital World every day, Cyber Security
has become a very important part of the Internet today and a
major challenge to make it secure.

In this article, you will learn about Cyber Attacks, Cyber Crimes,
and we also included Cyber Security Exam Questions and
Answers.

Read all the GK On Cyber Security, Cyber Crime, Cyber Law,


Cyber Attacks, and the current affairs of Cyber Security. A list of
Cyber Offenses with Penalties is mentioned on the last page.


Page Contents

GK On Cyber Security

Types Of Security And Privacy

List Of Offenses And Corresponding Penalties

GK On Cyber Security

1. What are the 5 Major Types of Cyber Security?


Answer:

1) Critical Infrastructure Security

2) Cloud Security

3) Network Security

4) Application Security

5) Internet of Things Security (IoT)

2. What are the 10 Common Types of Cyber Attacks?


Answer:

1) Malware

2) Denial-Of-Service

3) Man-In-The-Middle

4) Phishing

5) SQL Injection

6) Zero-Day Exploit

7) DNS Tunneling

8) Eavesdropping

9) Direct-Access

10) Cross-Site Scripting

3. What does VPN stand for?


Answer: Virtual Private Network

4. What is the full form of DOS and DDoS?


Answer:

DoS: Denial of Service

DDoS: Distributed Denial of Service

5. What is the full form of IP Address?


Answer: Internet Protocol Address

6. Which is more secure HTTP or HTTPS?


Answer: HTTPS

7. What is the full form of HTTPS?


Answer: Hypertext Transfer Protocol Secure

8. What does HTML stand for?


Answer: Hypertext Markup Language

9. What does XML stand for?


Answer: eXtensible Markup Language

10. Which programs are used by the FBI and NSA to Eavesdrop
on the systems of ISPs?
Answer: Carnivore and NarusInSight

Related: Computer General Knowledge Questions And


Answers: Basic To Advanced

11. What does ISP stand for?


Answer: Internet Service Provider

12. Which Law was introduced in India to deal with Cyber


Crime and Electronic Commerce?
Answer: The Information Technology Act (2000)

13. Who Signed The Information Technology Act?


Answer: President K. R. Narayanan (9 May 2000)

14. Full-Form of MeitY?


Answer: Ministry of Electronics and Information Technology


15. When was the Ministry of Electronics and Information
Technology Founded?
Answer: 19 July 2016

16. Where is the Headquarters of the Ministry of Electronics


and Information Technology?
Answer: New Delhi

17. What is the Penalty for Hacking with Computer Systems in


India?
Answer: Imprisonment up to 3 Years, or/and with Fine up
to ₹500,000

18. What is the name of a Cyber Attack where sensitive


information such as usernames, passwords, and credit card
details are acquired directly from users by deceiving them?
Answer: Phishing

19. What is Tampering in Cyber Attack?


Answer: Malicious Modification and Alteration of Data

20. What are the different Channels used by Cyber Attackers?


Answer:

1) Email

2) Phone Call

3) SMS

4) Pop-ups

5) DNS

Related: 100+ Maths General Knowledge Questions And


Answers PDF

21. What is the Full Form of CSAM?


Answer: Child Sexual Abuse Material

22. What are the Major Types of Cyber Attackers?


Answer:

1) Cyber Criminals

2) Hacktivists

3) State-Sponsored Attackers

4) Insider Threats

23. What is the full form of NSA?


Answer: National Security Agency

24. What are the Major Insider Threats?


Answer:

1) Accidental Leaks

2) Malicious

3) Data Theft

4) Negligent

5) Compromised Users

25. What does MAC Address stand for?


Answer: Media Access Control Address

26. What is the full form of DNS?


Answer: Domain Name System

27. What is the full form of SIEM?


Answer: Security Information and Event Management

28. What are some of the Major Cyber Security Job Titles?
Answer:

1) Security Analyst

2) Security Engineer

3) Security Architect

4) Security Administrator

5) Chief Information Security Officer (CISO)

6) Chief Security Officer (CSO)

7) Security Consultant

8) Security Specialist

9) Security Intelligence

29. What does FTP stand for?


Answer: File Transfer Protocol

30. What is the use of Anti Virus?
Answer:

1) Data Security

2) Protection from Viruses, Spyware, Malware

3) Protection from Rootkits, Trojans, Phishing Attacks, Spam


Attack

4) Protection from Cyber Threats

Related: List Of All Apple iOS Version History And The First
iPhone (2022)

31. What does CAPTCHA stand for?


Answer: Completely Automated Public Turing (test to tell)
Computers and Humans Apart

32. When was the Major Amendment made for the Indian
Information Technology Act?
Answer: 2008

33. What is Section 67?


Answer: Offence for publishing information that is obscene in
electronic form

34. What is the penalty for Section 67 Offence?


Answer: Imprisonment for 5 Years with ₹1,000,000 Fine

35. Which Cyber Offence is Imprisonment for Lifetime?


Answer: Acts of Cyber Terrorism (Section 66F)

36. Which Cyber Offence is Imprisonment for 10 Years?


Answer: Securing access or attempting to secure access to a
protected system (Section 70)

37. Which Indian Non-Profit Organisations Works on Cyber


Safety?
Answer:

1) Information Sharing and Analysis Center (ISAC)

2) End Now Foundation



3) Incognito Forensic Foundation

4) Filternet Foundation

38. What is the name of the Cyber-Attack that targets the


vulnerabilities on the Databases?
Answer: SQL Injection

39. What are the 3 Main Types of Vulnerability in Cyber


Security?
Answer:

1) Porous Defenses

2) Risky Resource Management

3) Insecure Interaction Between Components

40. What is the name of the Famous Operating System majorly


developed for Hackers and Software Testers?
Answer: Kali Linux

Related: List Of All macOS Version History (1997 to 2022)

41. What is Machine Code written in?


Answer: Machine Language

42. What is the X in Email X, MAC X, Biometric X?


Answer: Spoofing

43. What does SSL Stand for?


Answer: Secure Sockets Layer

44. What does TLS Stand for?


Answer: Transport Layer Security

45. Nonprofit Organisations that safeguard public and private


organizations against Cyber Threats?
Answer: Center for Internet Security (CIS)

46. The Technique to obtain sensitive information such as


username and passwords of Facebook? 
Answer: Phishing

47. The other name of Poké Virus?


Answer: Pikachu virus

48. What is the Name of the First Personal Computer Virus?


Answer: Elk Cloner (1982)

49. Name of the First Computer virus for MS-DOS?


Answer: Brain (1986)

50. Who is known for the Invention of Computer


Virus Defense Techniques?
Answer: Fred Cohen

Related: List of Programming Languages and Their


Developers

Types Of Security And Privacy

No. Type No. Type


1 Access Control 11 Firewall
Intrusion Detection
2 Anti-Keyloggers 12
System (IDS)
Intrusion Prevention
3 Anti-Malware 13
System (IPS)
Log Management
4 Anti-Spyware 14
Software
Anti-Subversion
5 15 Parental Control
Software

No. Type No. Type
6 Anti-Tamper Software 16 Records Management
7 Anti-Theft 17 Sandbox
Security Information
8 Antivirus Software 18
Management
Cryptographic
9 19 SIEM
Software
Computer-Aided Software and Operating
10 20
Dispatch (CAD) System Update

51. Who made McAfee Antivirus?

Answer: John McAfee

52. Which Company developed Norton Antivirus?

Answer: Symantec Corporation

53. Who coined the term “Computer Virus”?

Answer: Fred Cohen

54. What does the term Threat, Vulnerability, and Risk mean?

Answer:

1) Threat: The Potential to cause harm by destroying the data of


a system

2) Vulnerability: Weaknesses in a Computer System

3) Risk: Potential Damage when threat exploits the vulnerability

55. What are the full forms of IDS and IPS?

Answer:

IDS: Intrusion Detection Systems

IPS: Intrusion Prevention Systems

56. What is CDN?

Answer: Content Delivery Network

57. What is Error 404 Not Found?

Answer: HTTP response code where the browser was able to 


communicate with a given server, but the server could not find
the requested webpage.

58. What is XSS?

Answer: Cross-Site Scripting

59. What is CSRF?

Answer: Cross-Site Request Forgery

60. What does BIOS stand for?

Answer: Basic Input/Output System

Related: Qualcomm Snapdragon Processor List (2022


Updated)

61. What is the CIA in Cyber Security?

Answer: Confidentiality, Integrity, and Availability

62. What does WWW stand for?

Answer: World Wide Web

63. What is the full form of Malware?

Answer: Malicious Software

64. Which attacks take place when there is an excessive


amount of data flow which the system cannot handle?

Answer: The Buffer Overflow Attack

65. An example of Physical Hacking?

Answer: Inserting Malware loaded USB to a Computer System

66. Which method of Cyber Attack will record all your


Keystrokes?

Answer: keylogging 
67. What is a Computer Worm?

Answer: It is a Malware that spreads copies of itself without any


human interaction from computer to computer.

68. What is Stuxnet?

Answer: Computer Worm

69. A program used for recording and tracking users’


keystrokes?

Answer: keylogger

70. Which Cyber Attack is not wireless?

Answer: Phishing

Related: List Of All Social Networking Sites And Their


Founders 2022

71. How many key elements constitute the Security Structure?

Answer: 4 (Four)

72. What is Integrity in Cyber Security?

Answer: Protection of your data from modification by unknown


users

73. What is Confidentiality in Cyber Security?

Answer: Protection of your information from being accessed by


unknown users

74. When does Data Tampering occur in Cyber Security?

Answer: Lack of Integrity in a Security System

75. Expert groups, that handle Computer Security Incidents?

Answer: Computer emergency response team (CERT)



76. Name the technical Intelligence Agency that acts under the
National Security Advisor of India in the Prime Minister
Office?

Answer: National Technical Research Organisation (NTRO)

77. When was NTRO founded?

Answer: 2004

78. Which Database is used by Google?

Answer: Bigtable

79. What is the name of the First Computer Virus that fills up


the hard drive until a Computer could not operate any further?

Answer: Creeper System

80. What Is Data Encryption?

Answer: Convert Data into another form so that only people


with a secret key or password can read it.

Related: List Of Top Websites On the Internet And Their


Founders

81. Full form of Computer “VIRUS”?

Answer: Vital Information Resources Under Seize

82. What is a Trojan Horse?

Answer: A Computer Virus

83. What is a Code Red?

Answer: Computer Worm

84. Which hacker was arrested in 1995 and Prisoned for 5


Years?

Answer: Kevin Mitnick 


85. What is the name of the Act that governs Internet usage in
India?

Answer: Information Technology Act (2000)

86. What are the Top 5 Cyber Crimes?

Answer:

1) Phishing scams

2) Online Harassment

3) Identity Theft scam

4) Invasion of privacy

5) Cyberstalking

87. How can I report Cyber Crime?

Answer: Filing a Complaint on National Cyber Crime


Reporting Portal

88. Plan of Actions designed to improve the security and


resilience of national infrastructures and services in India?

Answer: National Cyber Security Strategy (NCSS)

89. What Technology is used for Hiding Information inside a


picture?

Answer: Steganography

90. What is the name of the Attack that uses a Fraudulent


Server with a relay address?

Answer: Man-In-The-Middle Attack (MITM)

Related: Android Operating System History: Version, Name,


Release Date

91. Why would a Hacker use a Proxy Server?

Answer: To hide Malicious Activity on the Internet



92. What is the Penalty for Publishing Child Porn?

Answer: ₹1,000,000 Fine and 5 Years Prison

93. Name the response protocol that is widely used for


querying databases?

Answer: WHOIS

94. What is the name of the tool that can be used for SNMP
Enumeration?

Answer: IP Network Browser

95. What is the full form of SNMP?

Answer: Simple Network Management Protocol

96. Which form of Encryption does WPA use?

Answer: Temporal Key Integrity Protocol (TKIP)

97. What does URL Stand for?

Answer: Uniform Resource Locator

98. Who manages the Domain Name registration process and


the assignment of IP) addresses to the ISPs?

Answer: Internet Corporation for Assigned Names and


Numbers (ICANN)

99. Which type of scan contains a Sequence Number of 0 and


sets NO flags?

Answer: Null Scan

100. What is a Proxy Server?

Answer: Server that acts as a gateway between You and the


Internet

List Of Offenses And Corresponding


Penalties

Section Offense Penalty Prison
Tampering with
65 Computer Source ₹200,000 3 Years
Documents
Hacking with Computer
66 ₹500,000 3 Years
System
Receiving Stolen Computer
66B ₹100,000 3 Years
or Communication Device
Using the Password of
66C ₹100,000 3 Years
Another Person
Cheating using Computer
66D ₹100,000 3 Years
Resource
Publishing Private Images of
66E ₹200,000 3 Years
Others
66F Acts of Cyber Terrorism – Lifetime
Publishing Information
67 which is Obscene in ₹1,000,000 5 Years
Electronic Form
Publishing Images
67A ₹1,000,000 7 Years
Containing Sexual Acts
Publishing Child
67B Porn or Predating ₹1,000,000 5 Years
Children Online
67C Failure to Maintain Records – 3 Years
Failure/Refusal to Comply
68 ₹100,000 2 Years
with Orders
Failure/Refusal to Decrypt
69 – 7 Years
Data
Securing Access or
70 Attempting to Secure Access – 10 Years
to a Protected System
71 Misrepresentation ₹100,000 2 Years


Read More

 General Knowledge On Cryptocurrency: Bitcoin,


BlockChain (QnA)
 List Of Top Indian Websites And Their Founders: A to Z
Startups
 Computer General Knowledge Questions And Answers:
Basic To Advanced

You might also like