Cyber Laws and Security Tools set 1

Que.Which of the following is not a type of cyber crime?
a. Data theft
b. Forgery
c. Damage to data and systems
d. Installing antivirus for protection
Que.Cyber-laws are incorporated for punishing all criminals only.
a. True
b. False
c. May be True or False
d. Can’t say
Que.Cyber-crime can be categorized into ________ types.
a. 4
b. 3
c. 2
d. 6
Que.Which of the following is not a type of peer-to-peer cyber-crime?
a. Phishing
b. Injecting Trojans to a target victim
c. MiTM
d. Credit card details leak in deep web
Que.Which of the following is not an example of a computer as weapon cyber-crime?
a. Credit card fraudulent
b. Spying someone using keylogger
c. IPR Violation
d. Pornography
Que.Which of the following is not done by cyber criminals?
a. Unauthorized account access
b. Mass attack using Trojans as botnets
c. Email spoofing and spamming
d. Report vulnerability in any system
Que.What is the name of the IT law that India is having in the Indian legislature?
a. India’s Technology (IT) Act, 2000
b. India’s Digital Information Technology (DIT) Act, 2000
c. India’s Information Technology (IT) Act, 2000
d. The Technology Act, 2008
Que.In which year India’s IT Act came into existence?
a. 2000
b. 2001
c. 2002
d. 2003
Que.What is the full form of ITA-2000?
a. Information Tech Act -2000
b. Indian Technology Act -2000
c. International Technology Act -2000
d. Information Technology Act -2000
Que.The Information Technology Act -2000 bill was passed by K. R. Narayanan.
a. True
b. False
c. May be True or False
d. Can’t say