You are on page 1of 10

Que No Question Option A Option B Option C

___________ has now evolved


to be one of the most popular
automated tools for unethical
1 hacking. Database software Automated apps Malware

_____________ is the technique


used in business organizations
2 and firms to protect IT assets. Unethical hacking Fixing bugs Internal data-br
Performing a shoulder surfing in very good
order to check other’s password social
is ____________ ethical engineering
3 practice. a bad a good practice
To corrupt
To think like hackers To hack a system software or
What is the ethics behind and know how to without the service using
4 training how to hack a system? defend such attacks permission malware
The legal risks of ethical hacking
include lawsuits due to
5 __________ of personal data. hacking stealing deleting

Before performing any


penetration test, through legal Type of broadband Characteristics
procedure, which key points company used by the of work done
6 listed below is not mandatory? firm System and netwoin the firm

After performing ____________


the ethical hacker should never
disclose client information to penetration
7 other parties. hacking testing exploiting

__________ is the branch of


cyber security that deals with
morality and provides different
theories and a principle
regarding the view-points about Ethics in black hat
8 what is right and wrong. hacking Corporate ethics Ethics in cyber-
________ helps to classify
arguments and situations, better
understand a cyber-crime and
helps to determine appropriate Cyber-
9 actions. Cyber-ethics Social ethics bullying
A penetration tester must identify
and keep in mind the
___________ & ___________
requirements of a firm while rules and hacking
10 evaluating the security postures. privacy and security regulations techniques
Installing
Which of the following is not a antivirus for
11 type of cyber crime? Data theft Forgery protection

Which of the following is not a Phishing Injecting Trojans


type of peer-to-peer cyber- to a target victim
12 crime? MiTM

Cyber-crime can be categorized


13 into ________ types. 2 4 3
Which of the following is not an
example of a computer as Spying someone
14 weapon cyber-crime? Credit card fraudulent using keylogger IPR Violation

Which of the following is not Report Mass attack


done by cyber criminals? Unauthorized vulnerability in using Trojans
15 account access any system as botnets

India’s Digital
What is the name of the IT Information The
law that India is having in the India’s Technology Technology (DIT) Technology
16 Indian legislature? (IT) Act, 2000 Act, 2000 Act, 2008
Under which section of IT Act,
In which any
stealing yeardigital
India’s IT Act
asset or
17 came into existence?
information is written a cyber- 2000 2001 2002
18 crime. 65 65-D 67

Information
Information Tech Act
Technology Act - Indian
-2000 Technology
2000
19 What is the full form of ITA-2000? Act -2000

What is the punishment in India


1 year of 2 years of
for stealing computer 6 months of
documents, assets or any
imprisonment and imprisonment
imprisonment and a
software’s source code from any fine of Rs. 50,000 a fine of Rs. and a fine of
organization, individual, or from 100,000 Rs. 250,000
20 any other means?

Advanced IT Act,
What is the updated version of IT Act, 2008
2007
21 the IT Act, 2000? IT Act, 2007
In which year the Indian IT Act, 2006 2008
22 2000 got updated? 2010

What type of cyber-crime, its


Cracking or illegally
laws and punishments does Stealing data
section 66 of the Indian IT Act hack into any system Putting antivirus
23 holds? into the victim

Accessing computer without Section 65


prior authorization is a cyber-
24 crimes that come under _______ Section 66 Section 68
Cracking digital identity of any
individual or doing identity theft, Section 65
comes under __________ of IT
25 Act. Section 66 Section 68
Download copy, extract data
from an open system done cyber-warfare cyber-security act data-backup
fraudulently is treated as
26 _________

How many years of


imprisonment can an accused
person face, if he/she comes 1 year 2 years 3 years
under any cyber-crime listed in
section 66 of the Indian IT Act,
27 2000?

Any digital content which any


individual creates and is not
acceptable to the society, it’s a Section 68
cyber-crime that comes under
28 _________ of IT Act. Section 66 Section 67

IT Act 2008 make cyber-crime


details more precise where it
mentioned if anyone publishes section 67-A section 67-B section 67-C
sexually explicit digital content
then under ___________ of IT
Act, 2008 he/she has to pay a
29 legitimate amount of fine.

If anyone publishes sexually


explicit type digital content, it
will cost that person 2 3 4
imprisonment of _________
30 years.
Using spy cameras in malls and
shops to capture private parts of Section 67 Section 68
any person comes under _______
31 of IT Act, 2008. Section 66

Using of spy cameras in malls


and shops to capture private parts
of any person comes under 2 years 3 years 4 years
section 67 of IT Act, 2008 and is
punished with imprisonment of
32 ___________

Misuse of digital signatures for Section 67 Section 68


fraudulent purposes comes
33 under __________ of IT Act. Section 66
Any cyber-crime that comes
under section 66 of IT Act, the 2 lacs 3 lacs
accused person gets fined of
34 around Rs ________ 4 lacs

____________ is the world’s


most popular vulnerability
scanner used in companies for Wireshark Snort
checking vulnerabilities in the
35 network. Nessus
LANguard
_____________ is a tool which Network
can detect registry issues in an Security
36 operating system. Network Stumbler Ettercap Scanner
__________ is a debugger and
37 exploration tool. Netdog Netcat Tcpdump

__________ is a popular
38 command-line packet analyser. Wireshark Snort Tcpdump

________________ is a platform
that essentially keeps the log of
data from networks, devices as
well as applications in a single
39 location. NordVPN Wireshark PacketFilter An

______________ is competent
to restore corrupted Exchange
Server Database files as well as Mailbox
recovering unapproachable Exchange
40 mails in mailboxes. Outlook Nessus Recovery
________________ helps in
protecting businesses against Mailbox
data breaches that may make Exchange
41 threats to cloud. Centrify Recovery Nessus
__________ is a popular
corporate security tool that is
used to detect the attack on email
42 with cloud only services. Cain and Abel Angry IP Scanner Ettercap

_____________ helps in
protecting corporate data,
43 communications and other assets. Snort CipherCloud Burp Suit

________________ are
unnecessary software which
infiltrates user’s system, spy on
user’s activities, stealing internet
usage data & sensitive
44 information of that user. Shareware Spyware Ransomware

They spy on our digital habits


and spy on which data is more
sensitive or useful for its creator.
45 Who are ‘they’ referring to here? Shareware Spyware Ransomware
Spyware collects user’s personal
data & spreads it
to______________ data-firms,
46 or its creator. advertisers dark-market antivirus comp

user’s
Which of the following activity is capture credit personal
47 not done by spyware? sell internet usage datacard details identity

Track user’s
Which of the following activity is Uninstalls your Spy on sensitive login details
48 not done by spyware? mobile browser information and passwords
spyware actually infects your
device easily & makes it hard to
49 _____________ identify delete modify

_____________ track the user’s


online activities like search
queries, history pages &
downloads, for selling purposes.
50 Ad-based spyware System Monitors Tracking cookie
Option D Answer weightage Unit

C
Worms 1 MARK UNIT 4

D
Ethical hacki 1 MARK UNIT 4

A
not so good 1 MARK UNIT 4
To hack a
network A
that is
vulnerable 1 MARK UNIT 4

D
disclosure 1 MARK UNIT 4

Know the
nature of A
the
organization 1 MARK UNIT 4

cracking 1 MARK UNIT 4

Social ethics 1 MARK UNIT 4

Corporate be 1 MARK UNIT 4


A
ethics to
talk to
seniors 1 MARK UNIT 4
Damage to
data and C
systems 1 MARK UNIT 4

Credit card
details leak D
in deep web
1 MARK UNIT 4

A
6 1 MARK UNIT 4

Pornograph B
y 1 MARK UNIT 4
Email
spoofing B
and
spamming 1 MARK UNIT 4

India’s
Informatio
n D
Technolog
y (IT) Act,
2000 1 MARK UNIT 4
A
2003 1 MARK UNIT 4
70 A 1 MARK UNIT 5
Internationa
l
B
Technology
Act -2000 1 MARK UNIT 5

3 years of
imprisonme
nt and a fine D
of Rs.
500,000
1 MARK UNIT 5
Advanced
IT Act, C
2008 1 MARK UNIT 5
B
2012 1 MARK UNIT 5

Stealing
hardware A
components
1 MARK UNIT 5

Section 70 B
1 MARK UNIT 5

Section 70 B
1 MARK UNIT 5

cyber-crime D
1 MARK UNIT 5

4 years C

1 MARK UNIT 5

Section 69 1 MARK UNIT 5

section 67-
A
D

1 MARK UNIT 5

5 D

1 MARK UNIT 5
Section 69 B
1 MARK UNIT 5

5 years B

1 MARK UNIT 5

Section 72 D
1 MARK UNIT 5

D
5 lacs 1 MARK UNIT 5

WebInspect 1 MARK UNIT 6

C
Maltego 1 MARK UNIT 6
B
BackTrack 1 MARK UNIT 6

C
Metasploit 1 MARK UNIT 6

EventLog Ana 1 MARK UNIT 6

Mail C
Exchange
Recovery
toolkit 1 MARK UNIT 6
A
Dashline 1 MARK UNIT 6

Proofpoint 1 MARK UNIT 6

B
Wireshark 1 MARK UNIT 6

Freeware 1 MARK UNIT 6

Freeware 1 MARK UNIT 6

A
share market 1 MARK UNIT 6
steal
signature of D
the different
virus 1 MARK UNIT 6
Monitors
your A
internet
activity 1 MARK UNIT 6

A
copy 1 MARK UNIT 6

Spy-trojans 1 MARK UNIT 6

You might also like