InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Observe the following picture and give your opinion about it by responding to the following question:i. Is ‘B’s response correct or not?ii. What will be the consequences of ‘B’s reply?iii. Which type of cybercrime does the picture depict? |
|
Answer» i. No B’s response is not correct. ii. With all such crucial information like OTP in hand, the fraudster can easily carry out illegal financial transactions using B’s identity. iii. Fake Call Frauds |
|
| 2. |
True or False:1. Information Technology Act, 2000 aims to provide the legal infrastructure for ECommerce in India.2. Cyber laws have a major impact on EBusinesses and the new economy in India. |
|
Answer» 1. True 2. True |
|
| 3. |
Hacker is a person intensely interested in the deep and hidden or concealed working of any computer __________ and __________(A) Operating System (B) Programming Language (C) Individual (D) Institution |
|
Answer» (A) Operating System, (B) Programming Language |
|
| 4. |
__________ is nothing but copyright violation of software created originally by an individual or an institution. (A) Software piracy (B) Unauthorized access (C) Authorization (D) Copyright |
|
Answer» (A) Software piracy |
|
| 5. |
__________ is the area of law that deals with the Internet’s relationship to technological and electronic elements. (A) Cyberlaw (B) Criminal Law (C) Business Law (D) Internet Law |
|
Answer» (A) Cyberlaw |
|
| 6. |
Explain software piracy and Hacking. |
|
Answer» Software piracy: Software piracy is the illegal copying, distribution, or use of the software. It 15 such a profitable “business” that it has caught the attention of organized crime groups in a number of countries. According to the Business Software Alliance (BSA), about 36% of all software in current use is stolen. Hacking: Hacking refers to unauthorized intrusion into a computer or a network. Hacker is a person intensely interested in the deep and hidden or concealed working of any computer operating system and programming language. They might discover loopholes within systems and reasons for such loopholes. |
|
| 7. |
__________ covers a fairly broad area, encompassing several subtopics including freedom of expression, access to and usage of the Internet, and online privacy. (A) Cyberlaw (B) Criminal Law (C) Business Law (D) Internet Law |
|
Answer» (A) Cyberlaw |
|
| 8. |
__________ is the area of law that deals with the Internet’s relationship to technological and electronic elements. |
|
Answer» Correct Answer is Cyberlaw |
|
| 9. |
__________ covers a fairly broad area, encompassing several subtopics including freedom of expression, access to and usage of the Internet, and online privacy. |
|
Answer» Correct Answer is Cyberlaw |
|
| 10. |
__________ is the part of the overall legal system that deals with the Internet, cyberspace, and their respective legal issues. |
|
Answer» Correct Answer is Cyberlaw |
|
| 11. |
__________ is the part of the overall legal system that deals with the Internet, cyberspace, and their respective legal issues. (A) Cyberlaw (B) Criminal Law (C) Business Law (D) Internet Law |
|
Answer» (A) Cyberlaw (A) Cyber Law |
|
| 12. |
The Information Technology Act has also proposed a legal framework for the __________ and origin of __________ (A) Authentication (B) Laws (C) Electronic record (D) Cybercrimes (E) Morals |
|
Answer» (A) Authentication, (C) Electronic recorda |
|
| 13. |
Phishing is a technique of extracting confidential information such as __________ and __________ combos by pretending as a legal enterprise. a(A) Computer (B) Credit Card Numbers (C) Network (D) Username Password (E) Programming Language |
|
Answer» (B) Credit Card Numbers, (D) Username Password |
|
| 14. |
__________ can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief. |
|
Answer» Correct Answer is Cybercrimes |
|
| 15. |
__________ includes stealing of codes/programs and other information illegally and creating the imitated copy by unauthorized means. |
|
Answer» Correct Answer is Software piracy |
|
| 16. |
Activity such as decipher codes or passwords and breaking security systems for illegal reasons is called __________(A) Cracking (B) Crack (C) Cyberstalking (D) Phishing |
|
Answer» (A) Cracking |
|
| 17. |
Activity such as decipher codes or passwords and breaking security systems for illegal reasons is called __________ |
|
Answer» Correct Answer is Cracking |
|
| 18. |
True or False:1. The cracker will use a program or script known as a Crack.2. Cyberstalking is a criminal practice where an individual uses the Internet to systematically harass or threaten someone. |
|
Answer» 1. True 2. True |
|
| 19. |
True or False:1. Authorization means granting access rights to resources.2. Cracking is a legal right that gives the creator of a literary, artistic, musical, or other creative work. |
|
Answer» 1. True 2. False |
|
| 20. |
__________ owners have the right to control the reproduction of their work, including the right to receive the royalty payment for that reproduction.(A) Software piracy (B) Unauthorized access(C) Authorization (D) Copyright |
|
Answer» (D) Copyright |
|
| 21. |
Encryption is a method of converting the __________ message into __________ text. (A) Original (B) Random (C) Hardware (D) Software (E) Electronic communication |
|
Answer» (A) Original, (B) Random |
|
| 22. |
__________ refers to a network security (Hardware and Software) system which blocks certain types of information. |
|
Answer» Correct Answer is Firewall |
|
| 23. |
__________ refers to a network security (Hardware and Software) system which blocks certain types of information. (A) Encryption (B) Secure Socket Layer (C) Firewall (D) Hardware |
|
Answer» Correct option is (C) Firewall |
|
| 24. |
A __________ is a legal right that gives the creator of a literary, artistic, musical, or other creative work. |
|
Answer» Correct Answer is Copyright |
|
| 25. |
__________ is presenting someone else’s work or idea as your own without their consent. (A) Plagiarism (B) Hacking (C) Hacker (D) A. Cracking |
|
Answer» (A) Plagarism |
|
| 26. |
__________ is a person intensely interested in the deep and hidden or concealed working of any computer operating system and programming language. (A) Plagiarism (B) Hacking (C) Hacker (D) Cracking |
|
Answer» Correct option is (C) Hacker |
|
| 27. |
State true or false.i. A firewall is used to encrypt the transmission of data.ii. The standards of behaviour; the principle of right or wrong are referred to as moral.iii. Hacking bank account-related information is an example of software piracy.iv. Phishing is representing someone else’s work as own without permission. |
|
Answer» i. True ii. True iii. False iv. True |
|
| 28. |
__________ is the standards of behaviour; principles of right and wrong behaviour. |
|
Answer» Correct Answer is Morals |
|
| 29. |
Match the following:(A)(B)(1) Copying a game file(a) Firewall(2) Law related to internet(b) Cyberthreat(3) Network security(c) Software piracy(4) System crashes suddenly(d) Cyber Law |
||||||||||
Answer»
|
|||||||||||
| 30. |
__________ is the standards of behaviour; principles of right and wrong behaviour. (A) Ethics (B) Morals (C) Society (D) Culture |
|
Answer» Correct option is (B) Morals |
|
| 31. |
__________ is a method of converting the original message into random text. (A) Encryption (B) Secure Socket Layer (C) Firewall(D) Hardware |
|
Answer» (A) Encryption |
|
| 32. |
__________ is a person intensely interested in the deep and hidden or concealed working of any computer operating system and programming language. |
|
Answer» Correct Answer is Hacker |
|
| 33. |
__________ is presenting someone else’s work or idea as your own without their consent. |
|
Answer» Correct Answer is Plagarism |
|
| 34. |
Full form of SSL is __________ (A) Secure Socket Layer (B) Secure Switch Layer (C) Secure Session Lesson (D) System Secure Layer |
|
Answer» (A) Secure Socket Layer |
|
| 35. |
Through the __________, transmission of data is encrypted. (A) Secure Socket Layer (B) Secure Switch Layer (C) Secure Session Lesson (D) System Secure Layer |
|
Answer» (A) Secure Socket Layer |
|
| 36. |
__________ is a method of converting the original message into random text. |
|
Answer» Correct Answer is Encryption |
|
| 37. |
__________ is an Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication. |
|
Answer» Information Technology Act, 2000 |
|
| 38. |
__________ is an Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication. (A) Information Technology Act, 2000 (B) Cyber laws (C) Digital Signature (D) Digital Certificate |
|
Answer» (A) Information Technology Act, 2000 |
|
| 39. |
Full form of SSL is __________ |
|
Answer» Secure Socket Layer |
|
| 40. |
The __________ Act offers the much-needed legal framework so that information is not denied. (A) Cyber Rule (B) Information Technology (C) Computer Act (D) Legal Act |
|
Answer» (B) Information Technology |
|
| 41. |
__________ is also called moral philosophy is the discipline concerned with what is morally good and bad, right or wrong. (A) Ethics (B) Morals (C) Society (D) Culture |
|
Answer» Correct option is (A) Ethics |
|
| 42. |
The Act has also proposed a legal framework for the authentication and origin of an electronic records. |
|
Answer» Information Technology |
|
| 43. |
The __________ also aims to provide for the legal framework. |
|
Answer» Information Technology Act, 2000 |
|
| 44. |
True or False:1. Unauthorized access includes stealing of codes/programs and other information illegally and creating the imitated copy by unauthorized means.2. Gaining access without the user’s permission is known as Software piracy. |
|
Answer» 1. False 2. .False |
|
| 45. |
__________ is typically carried out by email spoofing. (A) Cracking(B) Crack (C) Cyberstalking (D) Phishing |
|
Answer» (D) Phishing |
|
| 46. |
__________ is typically carried out by email spoofing. |
|
Answer» Correct Answer is Phishing |
|
| 47. |
True or False:1. Computer crime is an act performed by a knowledgeable computer user, sometimes referred to as a Hacker.2. A Cybercrime who illegally browses or steals a company’s or individual’s private information. |
|
Answer» 1. True 2. False |
|
| 48. |
The Act offers the much-needed legal framework so that information is not denied. |
|
Answer» Information Technology |
|
| 49. |
Computer crime is an act performed by a knowledgeable computer user, sometimes referred to as a __________ |
|
Answer» Correct Answer is Hacker |
|
| 50. |
Computer Crime is alternatively referred to as __________ |
|
Answer» Correct Answer is Cybercrime |
|