100 multiple-choice questions (MCQs) on Cyber Law
MCQs on Cyber Law
1. What is the primary legislation governing cyber crimes in India?
a) The Indian Penal Code
b) The Information Technology Act, 2000
c) The Cyber Security Act, 2021
d) The Data Protection Act, 2018
2. Which section of the Information Technology Act, 2000 deals with the hacking of
computers?
a) Section 43
b) Section 66
c) Section 72
d) Section 69
3. What is 'phishing'?
a) A type of online fraud where personal information is stolen
b) Unauthorized access to a computer system
c) Spamming email accounts
d) Creating counterfeit currency
4. Which act regulates the protection of personal data in India?
a) The Information Technology Act, 2000
b) The Personal Data Protection Bill
c) The Cyber Crime Act
d) The Data Protection Act
5. What is 'cyber bullying'?
a) Harassment or intimidation through online means
b) Unauthorized access to computer systems
c) Sending spam emails
d) Theft of online identities
6. Which section of the Information Technology Act, 2000 provides for the
punishment of cyber terrorism?
a) Section 66F
b) Section 67
c) Section 72
d) Section 43
7. What does 'denial of service attack' (DoS) refer to?
a) An attack aimed at shutting down a network or service
b) Unauthorized data access
c) Stealing sensitive information
d) Installing malware on a system
8. Which organization is responsible for implementing cybersecurity policies in
India?
a) Indian Computer Emergency Response Team (CERT-In)
b) National Cyber Security Centre (NCSC)
c) National Security Agency (NSA)
d) Cyber Crime Investigation Bureau (CCIB)
9. What does 'data encryption' do?
a) Protects data by converting it into a secure format
b) Deletes data from a system
c) Identifies and removes malware
d) Recovers lost data
10. What is 'identity theft'?
a) Stealing personal information to commit fraud
b) Hacking into online accounts
c) Accessing restricted data
d) Creating counterfeit documents
11. Which section of the Information Technology Act, 2000 addresses the issue of
'cyber squatting'?
a) Section 43
b) Section 66
c) Section 66A
d) Section 69A
12. What is 'cyber stalking'?
a) Repeated and unwanted online harassment
b) Hacking into social media accounts
c) Stealing personal information
d) Installing spyware on a computer
13. Which of the following is a method used to protect online communications?
a) Firewalls
b) Encryption
c) Antivirus software
d) All of the above
14. Under the Information Technology Act, 2000, what is 'digital signature'?
a) An electronic method of verifying the identity of the sender
b) A type of password
c) An online authentication method
d) A digital certificate
15. What is the main purpose of the 'Cyber Appellate Tribunal'?
a) To resolve disputes related to cyber crimes and offences
b) To enforce cybersecurity regulations
c) To provide cybersecurity training
d) To regulate internet service providers
16. Which section of the Information Technology Act, 2000 deals with
'misrepresentation' in electronic records?
a) Section 65
b) Section 66
c) Section 72
d) Section 73
17. What does 'spam' refer to in the context of email?
a) Unsolicited and often irrelevant messages sent to multiple recipients
b) A type of virus
c) A fraudulent message
d) A security breach
18. Which international agreement deals with the cybercrime convention?
a) Budapest Convention
b) Geneva Convention
c) Hague Convention
d) Vienna Convention
19. What is the function of 'firewalls' in cybersecurity?
a) To monitor and control incoming and outgoing network traffic
b) To scan for viruses
c) To encrypt data
d) To recover lost data
20. Which act governs the legal aspects of electronic contracts in India?
a) The Information Technology Act, 2000
b) The Indian Contract Act, 1872
c) The Consumer Protection Act, 2019
d) The Companies Act, 2013
21. What does 'malware' stand for?
a) Malicious software designed to damage or disrupt systems
b) A type of firewall
c) A method of encryption
d) A cybersecurity protocol
22. What is 'pharming'?
a) Redirecting users to fraudulent websites to steal personal information
b) A type of malware
c) Unauthorized access to online accounts
d) Sending spam emails
23. Which section of the Information Technology Act, 2000 deals with 'cyber
pornography'?
a) Section 67
b) Section 66A
c) Section 66F
d) Section 69
24. What is 'cyber espionage'?
a) Stealing sensitive information through cyber means
b) Hacking into personal email accounts
c) Sending unsolicited emails
d) Creating counterfeit digital identities
25. What is the purpose of 'data backup'?
a) To create a duplicate copy of data to prevent loss
b) To encrypt data
c) To remove malware
d) To restore deleted files
26. Which section of the Information Technology Act, 2000 provides for 'interception
of communication'?
a) Section 69
b) Section 66
c) Section 72
d) Section 43
27. What is 'social engineering' in the context of cyber security?
a) Manipulating people into divulging confidential information
b) Installing malware on a system
c) Encrypting sensitive data
d) Unauthorized access to a computer system
28. What does 'data breach' mean?
a) Unauthorized access or disclosure of sensitive data
b) A method of data encryption
c) A type of computer virus
d) A network security tool
29. Which section of the Information Technology Act, 2000 addresses 'identity
theft'?
a) Section 66C
b) Section 66D
c) Section 72
d) Section 69
30. What is 'cybercrime'?
a) Criminal activity that involves computers or the internet
b) Theft of physical property
c) Fraudulent activities involving paper documents
d) Breach of physical security
31. Which of the following is a common type of cyber attack?
a) Denial of Service (DoS)
b) Identity theft
c) Phishing
d) All of the above
32. What is 'online auction fraud'?
a) Scamming individuals through fraudulent online auctions
b) Hacking online auction sites
c) Phishing for auction details
d) Unauthorized access to auction data
33. What is 'ransomware'?
a) Malware that encrypts files and demands payment for decryption
b) A type of phishing attack
c) A computer virus
d) Unauthorized access to a network
34. Which section of the Information Technology Act, 2000 addresses 'data theft'?
a) Section 66B
b) Section 66C
c) Section 66D
d) Section 66F
35. What is 'cyber terrorism'?
a) Using the internet to conduct acts of terrorism
b) Hacking into government systems
c) Spamming social media platforms
d) Creating counterfeit websites
36. Which of the following best describes 'digital forensics'?
a) The process of collecting and analyzing digital evidence
b) A method of encryption
c) A type of computer virus
d) A network security tool
37. What does 'two-factor authentication' (2FA) provide?
a) An additional layer of security for user accounts
b) A method for data encryption
c) A tool for malware detection
d) A protocol for data backup
38. Which organization in India is tasked with formulating cybersecurity policies
and strategies?
a) National Cyber Security Coordinator
b) Indian Computer Emergency Response Team (CERT-In)
c) Cyber Crime Investigation Bureau
d) National Security Agency
39. What is 'digital signature'?
a) A method of ensuring the authenticity and integrity of digital documents
b) A type of encryption
c) A method of data backup
d) A tool for malware removal
40. What does 'cyber law' primarily deal with?
a) Legal issues related to the use of computers and the internet
b) Physical security measures
c) Traditional contract law
d) Intellectual property rights
41. What is 'cyber defamation'?
a) Making false statements online that damage someone’s reputation
b) Hacking into online accounts
c) Creating counterfeit digital identities
d) Unauthorized access to personal data
42. What does 'computer fraud' involve?
a) Deceptive practices involving computers to gain financial benefit
b) Unauthorized data access
c) Sending spam emails
d) Installing malware
43. Which section of the Information Technology Act, 2000 deals with 'intermediary
liability'?
a) Section 79
b) Section 66
c) Section 43
d) Section 69
44. What is 'electronic evidence'?
a) Data or information stored in electronic form that can be used in legal proceedings
b) Physical evidence from a computer system
c) Printed documents from electronic sources
d) Data encryption methods
45. What is 'unauthorized access' in the context of cyber law?
a) Gaining access to a computer system without permission
b) Installing legal software on a computer
c) Accessing public websites
d) Using secure passwords
46. What does 'cyber fraud' refer to?
a) Fraudulent activities conducted through digital means
b) Hacking into government databases
c) Spamming email accounts
d) Creating counterfeit digital currency
47. What is the role of 'CERT-In' in cybersecurity?
a) To provide early warning of cyber threats and incidents
b) To enforce legal actions against cyber criminals
c) To provide cybersecurity training
d) To regulate internet service providers
48. Which of the following is a type of malware that spreads through email
attachments?
a) Virus
b) Firewall
c) Encryption
d) Phishing
49. What is 'online harassment'?
a) Unwanted and abusive behavior conducted through digital platforms
b) Unauthorized access to social media accounts
c) Spamming email addresses
d) Creating fake websites
50. Which of the following is an example of a cybersecurity threat?
a) Phishing
b) Ransomware
c) Denial of Service (DoS)
d) All of the above
51. What is 'internet censorship'?
a) Restricting access to certain online content
b) Installing security updates
c) Encrypting sensitive information
d) Performing digital forensics
52. Which section of the Information Technology Act, 2000 deals with 'unauthorized
access to computer systems'?
a) Section 66
b) Section 43
c) Section 72
d) Section 69A
53. What is 'digital piracy'?
a) The illegal copying and distribution of digital content
b) Hacking into online accounts
c) Sending unsolicited emails
d) Unauthorized access to personal data
54. Which section of the Information Technology Act, 2000 provides for 'cyber
offences related to obscene material'?
a) Section 67
b) Section 66A
c) Section 66F
d) Section 72
55. What does 'data integrity' ensure?
a) The accuracy and consistency of data over its lifecycle
b) The speed of data transfer
c) The encryption of data
d) The recovery of lost data
56. Which of the following is a characteristic of 'phishing'?
a) Pretending to be a trustworthy entity to obtain sensitive information
b) Unauthorized access to a computer system
c) Sending spam emails
d) Installing malware
57. What is the main purpose of 'antivirus software'?
a) To detect and remove malicious software from a computer system
b) To encrypt sensitive data
c) To monitor network traffic
d) To back up data
58. What is 'electronic funds transfer fraud'?
a) Illegally transferring money from one account to another using digital means
b) Hacking into online banking systems
c) Sending fraudulent emails to obtain financial information
d) Creating counterfeit credit cards
59. Which of the following best describes 'cybersecurity'?
a) The practice of protecting computers, servers, and networks from digital attacks
b) The process of creating digital content
c) The management of physical security measures
d) The process of data encryption
60. What is 'network intrusion'?
a) Unauthorized access to a computer network
b) Sending unsolicited messages to network users
c) Installing antivirus software
d) Encrypting network data
61. What is 'electronic signature'?
a) A method of verifying the authenticity of digital documents
b) A type of password
c) A method of data encryption
d) A tool for malware removal
62. Which of the following is a type of 'computer virus'?
a) Worm
b) Trojan Horse
c) Ransomware
d) All of the above
63. What is 'data theft'?
a) Illegally acquiring sensitive or confidential information
b) Unauthorized access to a computer system
c) Sending fraudulent emails
d) Installing malware
64. Which section of the Information Technology Act, 2000 deals with 'privacy
violations'?
a) Section 72
b) Section 66
c) Section 69A
d) Section 43
65. What is 'cybercrime'?
a) Criminal activity conducted using digital technologies
b) Theft of physical property
c) Fraud involving paper documents
d) Breach of physical security
66. Which section of the Information Technology Act, 2000 provides for 'punishment
for cyber terrorism'?
a) Section 66F
b) Section 67
c) Section 66C
d) Section 69
67. What is 'data encryption'?
a) Converting data into a secure format to prevent unauthorized access
b) Deleting sensitive data
c) Creating backup copies of data
d) Scanning for viruses
68. Which section of the Information Technology Act, 2000 deals with 'unauthorized
disclosure of information'?
a) Section 72
b) Section 66
c) Section 69
d) Section 43
69. What does 'cyberlaw' primarily address?
a) Legal issues related to the use of the internet and digital technology
b) Traditional contract law
c) Intellectual property rights
d) Physical security measures
70. What is 'identity theft'?
a) Stealing personal information to commit fraud
b) Hacking into online accounts
c) Creating counterfeit documents
d) Unauthorized access to personal data
71. Which section of the Information Technology Act, 2000 deals with 'fraudulent
electronic transactions'?
a) Section 66D
b) Section 66C
c) Section 66B
d) Section 66F
72. What is 'cyberstalking'?
a) Repeated and unwanted online harassment
b) Unauthorized access to online accounts
c) Installing spyware on a computer
d) Creating counterfeit digital identities
73. Which of the following is a common cyber security practice?
a) Using strong, unique passwords
b) Ignoring software updates
c) Clicking on suspicious links
d) Sharing personal information openly
74. What is the purpose of 'network security'?
a) To protect the integrity, confidentiality, and accessibility of computer networks
b) To manage physical security measures
c) To create digital content
d) To install malware
75. Which section of the Information Technology Act, 2000 provides for 'cyber
offences related to online bullying'?
a) Section 66A
b) Section 66F
c) Section 67
d) Section 72
76. What does 'cyber terrorism' involve?
a) Using the internet to commit acts of terrorism
b) Hacking into personal email accounts
c) Sending unsolicited messages
d) Creating counterfeit websites
77. What is 'social media fraud'?
a) Deceptive practices conducted through social media platforms
b) Unauthorized access to social media accounts
c) Sending spam messages
d) Installing malware on social media sites
78. Which section of the Information Technology Act, 2000 deals with 'punishment
for cyber crimes'?
a) Section 66
b) Section 66F
c) Section 66C
d) Section 66D
79. What is 'cyber liability insurance'?
a) Insurance coverage for losses related to cyber incidents
b) Insurance for physical damages
c) Coverage for traditional fraud
d) A type of health insurance
80. Which section of the Information Technology Act, 2000 deals with 'cyber offences
related to hacking'?
a) Section 43
b) Section 66
c) Section 69A
d) Section 66A
81. What does 'electronic contract' refer to?
a) A contract that is created and executed electronically
b) A traditional paper contract
c) A verbal agreement
d) A physical document signed electronically
82. What is 'cyber law'?
a) The body of law that governs the use of computers and the internet
b) Traditional criminal law
c) Laws related to physical property
d) Environmental laws
83. Which section of the Information Technology Act, 2000 deals with 'unauthorized
access to personal data'?
a) Section 66
b) Section 43
c) Section 72
d) Section 69
84. What is 'online fraud'?
a) Fraudulent activities conducted over the internet
b) Unauthorized access to online accounts
c) Installing malware on a system
d) Sending spam emails
85. Which section of the Information Technology Act, 2000 provides for 'punishment
for identity theft'?
a) Section 66C
b) Section 66D
c) Section 66B
d) Section 66F
86. What is 'data breach'?
a) Unauthorized access or disclosure of confidential data
b) A method of data encryption
c) A type of computer virus
d) A network security tool
87. What is 'cyber extortion'?
a) Using threats to demand money or information from victims online
b) Hacking into government systems
c) Sending fraudulent messages
d) Creating counterfeit digital identities
88. Which section of the Information Technology Act, 2000 deals with 'misuse of
electronic records'?
a) Section 65
b) Section 66A
c) Section 67
d) Section 72
89. What is 'digital forensics'?
a) The process of collecting, preserving, and analyzing digital evidence
b) A type of malware
c) A method of encryption
d) A network security tool
90. What is the role of 'CERT-In'?
a) To provide early warning of cyber threats and incidents
b) To enforce legal actions against cyber criminals
c) To provide cybersecurity training
d) To regulate internet service providers
91. Which section of the Information Technology Act, 2000 deals with 'punishment
for cyber terrorism'?
a) Section 66F
b) Section 66C
c) Section 66D
d) Section 66B
92. What is 'computer trespass'?
a) Unauthorized access to computer systems
b) Sending unsolicited emails
c) Creating counterfeit digital identities
d) Installing malware
93. What does 'electronic evidence' refer to?
a) Data stored electronically that can be used as evidence in legal proceedings
b) Physical evidence from a computer system
c) Printed documents from electronic sources
d) Data encryption methods
94. Which section of the Information Technology Act, 2000 deals with 'privacy
violations'?
a) Section 72
b) Section 66
c) Section 69
d) Section 43
95. What is 'cyber stalking'?
a) Repeated and unwanted online harassment
b) Unauthorized access to online accounts
c) Creating counterfeit digital identities
d) Installing spyware on a computer
96. Which section of the Information Technology Act, 2000 provides for 'cyber
offences related to obscene material'?
a) Section 67
b) Section 66A
c) Section 66F
d) Section 69
97. What is 'network security'?
a) Measures taken to protect a computer network from cyber threats
b) Creating digital content
c) Managing physical security measures
d) Performing data encryption
98. What does 'cyber espionage' involve?
a) Stealing confidential information through digital means
b) Hacking into personal email accounts
c) Creating counterfeit documents
d) Sending unsolicited messages
99. What is 'data recovery'?
a) The process of restoring lost or damaged data
b) Encrypting sensitive data
c) Scanning for viruses
d) Backing up data
100. Which section of the Information Technology Act, 2000 deals with
'punishment for sending offensive messages'?
a) Section 66A
b) Section 66F
c) Section 66C
d) Section 66D