Professional Documents
Culture Documents
India’s Digital
What is the name of the IT Information The
law that India is having in the India’s Technology Technology (DIT) Technology
16 Indian legislature? (IT) Act, 2000 Act, 2000 Act, 2008
Under which section of IT Act,
In which any
stealing yeardigital
India’s IT Act
asset or
17 came into existence?
information is written a cyber- 2000 2001 2002
18 crime. 65 65-D 67
Information
Information Tech Act
Technology Act - Indian
-2000 Technology
2000
19 What is the full form of ITA-2000? Act -2000
Advanced IT Act,
What is the updated version of IT Act, 2008
2007
21 the IT Act, 2000? IT Act, 2007
In which year the Indian IT Act, 2006 2008
22 2000 got updated? 2010
__________ is a popular
38 command-line packet analyser. Wireshark Snort Tcpdump
________________ is a platform
that essentially keeps the log of
data from networks, devices as
well as applications in a single
39 location. NordVPN Wireshark PacketFilter An
______________ is competent
to restore corrupted Exchange
Server Database files as well as Mailbox
recovering unapproachable Exchange
40 mails in mailboxes. Outlook Nessus Recovery
________________ helps in
protecting businesses against Mailbox
data breaches that may make Exchange
41 threats to cloud. Centrify Recovery Nessus
__________ is a popular
corporate security tool that is
used to detect the attack on email
42 with cloud only services. Cain and Abel Angry IP Scanner Ettercap
_____________ helps in
protecting corporate data,
43 communications and other assets. Snort CipherCloud Burp Suit
________________ are
unnecessary software which
infiltrates user’s system, spy on
user’s activities, stealing internet
usage data & sensitive
44 information of that user. Shareware Spyware Ransomware
user’s
Which of the following activity is capture credit personal
47 not done by spyware? sell internet usage datacard details identity
Track user’s
Which of the following activity is Uninstalls your Spy on sensitive login details
48 not done by spyware? mobile browser information and passwords
spyware actually infects your
device easily & makes it hard to
49 _____________ identify delete modify
C
Worms 1 MARK UNIT 4
D
Ethical hacki 1 MARK UNIT 4
A
not so good 1 MARK UNIT 4
To hack a
network A
that is
vulnerable 1 MARK UNIT 4
D
disclosure 1 MARK UNIT 4
Know the
nature of A
the
organization 1 MARK UNIT 4
Credit card
details leak D
in deep web
1 MARK UNIT 4
A
6 1 MARK UNIT 4
Pornograph B
y 1 MARK UNIT 4
Email
spoofing B
and
spamming 1 MARK UNIT 4
India’s
Informatio
n D
Technolog
y (IT) Act,
2000 1 MARK UNIT 4
A
2003 1 MARK UNIT 4
70 A 1 MARK UNIT 5
Internationa
l
B
Technology
Act -2000 1 MARK UNIT 5
3 years of
imprisonme
nt and a fine D
of Rs.
500,000
1 MARK UNIT 5
Advanced
IT Act, C
2008 1 MARK UNIT 5
B
2012 1 MARK UNIT 5
Stealing
hardware A
components
1 MARK UNIT 5
Section 70 B
1 MARK UNIT 5
Section 70 B
1 MARK UNIT 5
cyber-crime D
1 MARK UNIT 5
4 years C
1 MARK UNIT 5
section 67-
A
D
1 MARK UNIT 5
5 D
1 MARK UNIT 5
Section 69 B
1 MARK UNIT 5
5 years B
1 MARK UNIT 5
Section 72 D
1 MARK UNIT 5
D
5 lacs 1 MARK UNIT 5
C
Maltego 1 MARK UNIT 6
B
BackTrack 1 MARK UNIT 6
C
Metasploit 1 MARK UNIT 6
Mail C
Exchange
Recovery
toolkit 1 MARK UNIT 6
A
Dashline 1 MARK UNIT 6
B
Wireshark 1 MARK UNIT 6
A
share market 1 MARK UNIT 6
steal
signature of D
the different
virus 1 MARK UNIT 6
Monitors
your A
internet
activity 1 MARK UNIT 6
A
copy 1 MARK UNIT 6