Cyber crime is a crime that involves world wide web. It ranges private information intrusion to misusing the public data from official websites.
Q1. Computer crime or Cyber crime is crime that involves:
Q1. Computer crime or Cyber crime is crime that involves:
a) Computer
b) Network
c) Both of Above
d) None of These
Q2. Net crime is criminal exploitation of the ___:
a) Browsers
a) Browsers
b) Servers
c) Internet
d) None of These
Q3. Crime through Internet includes:
a) Telemarketing
b) Internet fraud
c) Identity Theft
d) Credit Card account thefts
e) All of the Above
f) None of These
Q4. Which among the following is correct about "Hacking":
a) Hacking is an illegal intrusion into a computer system and/or network.
b) Cracking term is equivalent to Hacking (In Indian Laws perspective there is no difference between the term hacking and cracking).
c) Every act committed towards breaking into a computer and/or network is hacking.
d) Hacker can hack or personal monetary gains, such as to stealing the credit card information, transferring money from various bank accounts to their own account followed by withdrawal of money.
e) All of the Above
f) None of These
Q5. Which among the following is correct about "Child Pornography":
a) Pedophiles lure the children by distributing pornographic material.
b) Pedophiles falsely represent their selves as of same age and win the confidence of children by chatting and by sending images.
c) Pedophiles after wining the confidence of children then offers then monetary as well as physical awards.
d) Pedophiles may sexually exploit the children by using them as sexual objects or by taking their pornographic pictures, in order to sell those over the internet.
e) All of the Above
f) None of These
Q6. Which among the following characteristics are correct about 'Cyberstalking':
a) Cyberstalking is the use of the internet or electronics to stalk or harass an individual or any group.
b) It includes making harassing phone calls, killing the victims pet, vandalizing victims property, leaving written messages or objects
c) It may be offline as well as online
d) All of the Above
e) None of These
Q7. Denial - of - service attack includes:
a) a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic
b) DoS attacks are included in it.
c) Both of Above
d) None of These
Q8. Which among the following is wrong characteristic of "Phishing":
a) Fakers, by offering special rewards or money prize etc asked for personal information such as passwords, credit card information, social security and bank account numbers or other material information.
b) Main purpose is theft or misuse the acquired material
c) Both of Above
d) None of These
Q9. Credit Card Fraud includes:
a) Credit cards are illegally get and used to get movable or immovable property
b) Unauthorized and illegal use of credit cards
c) Both of Above
d) None of These
Q10. Punishment for Hacking in Inida is:
a) Imprisonment up to 3 years only
b) Fine (Depend on case to case) only
c) Both of Above
d) None of These
Q11. Which among the following is best suitable for term "Software Piracy":
a) Counterfeiting original products
b) Illegal copying of genuine program
c) Both of Above
d) None of These
Q12. Which among the following are Malicious Softwares:
a) Virus and Worms
b) Trojan Horse and Time Bomb
c) Logic Bomb and Rabbit and Bacterium
d) None of These
e) All of the Above
Q13. IRC stands for:
a) Internet Relay Chat
b) Internal Rely Chat
c) Information Relay Chat
d) None of These
Q14 MOD refers to:
a) Monitor of Deception
b) Master of Deception
c) Management of Deception
d) None of These
Q15. INTER POL stands for:
a) International Police
b) Internal Polythims
c) Internet Protocol
d) None of These
Take previous Quiz
Computer awareness Quiz 1, 2, 3, 4, 5, 6, 7, 8 , 9 , 10, 11 , 12, 13, 14, 15, 16, 17, 18 and 19. Take Database quiz , MS-Word quiz, PowerPoint quiz, network security quiz. Computer memory Computer languages, Software , Cryptography and IP.