Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

A zero-day vulnerability is a type of vulnerability unknown to the creator or vendor of the system or software.(a) True(b) FalseThe question was asked during an online exam.Origin of the question is Bugs and Vulnerabilities topic in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Right CHOICE is (a) True

The best I can EXPLAIN: Zero-day vulnerability is a type of vulnerability UNKNOWN to the creator or vendor of the SYSTEM or SOFTWARE. Until such bugs get fixed, hackers take advantage of these vulnerabilities to exploit the system.

2.

__________ is the timeframe from when the loophole in security was introduced till the time when the bug was fixed.(a) Time-frame of vulnerability(b) Window of vulnerability(c) Time-lap of vulnerability(d) Entry-door of vulnerabilityI got this question in an international level competition.This interesting question is from Bugs and Vulnerabilities in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

The CORRECT option is (b) Window of vulnerability

The BEST EXPLANATION: Window of vulnerability is the timeframe from when the loophole in security was INTRODUCED or RELEASED till the time when the bug was fixed, or the illicit access was removed or the attacker was disabled.

3.

ISMS is abbreviated as __________(a) Information Server Management System(b) Information Security Management Software(c) Internet Server Management System(d) Information Security Management SystemI got this question during an online interview.Question is taken from Bugs and Vulnerabilities in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

The correct OPTION is (d) Information Security Management System

Best explanation: ISMS (Information Security Management System) is a set of policies concerning various information security management. ISMS (Information Security Management System) was developed for MANAGING risk management principles and COUNTERMEASURES for ENSURING security through rules and REGULATIONS.

4.

Security bugs are also known as _______(a) security defect(b) security problems(c) system defect(d) software errorI have been asked this question during an interview.Origin of the question is Bugs and Vulnerabilities topic in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Correct option is (a) SECURITY defect

The explanation: A security BUG also known as security defect is a SOFTWARE bug that attackers can TAKE advantage to gain unauthorized access in a system. They can harm legitimate users, compromise data CONFIDENTIALITY and integrity.

5.

A _________ is a software bug that attackers can take advantage to gain unauthorized access in a system.(a) System error(b) Bugged system(c) Security bug(d) System virusThe question was asked during an interview for a job.My doubt stems from Bugs and Vulnerabilities topic in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Right answer is (c) Security bug

The BEST EXPLANATION: A security bug is a SOFTWARE bug that ATTACKERS can take advantage to gain unauthorized access in a SYSTEM. They can harm all legitimate users, compromise data confidentiality and integrity.

6.

___________ is a technique used by penetration testers to compromise any system within a network for targeting other systems.(a) Exploiting(b) Cracking(c) Hacking(d) PivotingI got this question during an interview.I'd like to ask this question from Bugs and Vulnerabilities topic in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Correct answer is (d) PIVOTING

To elaborate: Pivoting is a technique used by penetration testers to compromise any system WITHIN a NETWORK for targeting other systems. They test systems within the same network for VULNERABILITIES using this technique.

7.

________ type of exploit requires accessing to any vulnerable system for enhancing privilege for an attacker to run the exploit.(a) Local exploits(b) Remote exploits(c) System exploits(d) Network exploitsI had been asked this question in final exam.The question is from Bugs and Vulnerabilities in section Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Right option is (a) LOCAL exploits

The best explanation: Local exploits are those type of exploit requires accessing to any vulnerable SYSTEM for enhancing PRIVILEGE for an attacker to run the exploit. They’ve to pass through granted system ADMINISTRATION in order to HARM the system.

8.

Remote exploits is that type of exploits acts over any network to exploit on security vulnerability.(a) True(b) FalseThis question was addressed to me during an interview.Asked question is from Bugs and Vulnerabilities in section Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

The CORRECT choice is (a) True

The explanation is: REMOTE exploits is that type of exploits which uses internet for exploiting on SECURITY vulnerability without gaining any prior access to the TARGET system.

9.

A/An __________ is a piece of software or a segment of command that usually take advantage of a bug to cause unintended actions and behaviors.(a) malware(b) trojan(c) worms(d) exploitI got this question during an interview for a job.My question is from Bugs and Vulnerabilities topic in section Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Right choice is (d) exploit

Explanation: An exploit is a piece of software or a segment of command that USUALLY take advantage of a bug to CAUSE unintended actions and behaviors. Using exploits, attackers can GAIN access in a system or allow privilege escalation also.

10.

There are ________ types of exploit.(a) 3(b) 2(c) 5(d) 4I had been asked this question during an online exam.My question is based upon Bugs and Vulnerabilities topic in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer» RIGHT answer is (b) 2

To explain I WOULD say: Exploits can be categorized based on various criteria. But the most prominent categorization is done by how exploits COMMUNICATE with vulnerable software. These are categorized as local exploits and remote exploits.
11.

_____________ is a special type of vulnerability that doesn’t possess risk.(a) Vulnerabilities without risk(b) Vulnerabilities without attacker(c) Vulnerabilities without action(d) Vulnerabilities no one knowsI got this question in an interview for internship.This question is from Bugs and Vulnerabilities in section Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

The CORRECT OPTION is (a) Vulnerabilities without RISK

To explain I would say: Vulnerabilities is defined as the weakness in a system that can be EXPLOITED by cyber-criminals and attackers. Risk can be defined as the potential of an impact that can grow from EXPLOITING the vulnerability. There is some vulnerability that doesn’t possess risk, known as “Vulnerabilities without risk”.

12.

Risk and vulnerabilities are the same things.(a) True(b) FalseThis question was posed to me in class test.Question is from Bugs and Vulnerabilities in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Right choice is (b) False

Explanation: RISK and vulnerability cannot be used interchangeably. Risk can be DEFINED as the potential of an impact that can GROW from EXPLOITING the vulnerability. There is some vulnerability that doesn’t possess risk, known as “Vulnerabilities without risk”.

13.

____________ is the cyclic practice for identifying & classifying and then solving the vulnerabilities in a system.(a) Bug protection(b) Bug bounty(c) Vulnerability measurement(d) Vulnerability managementThe question was posed to me in quiz.My question comes from Bugs and Vulnerabilities topic in section Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Correct option is (d) VULNERABILITY management

To ELABORATE: Vulnerability management is a cyclic PROCESS for identifying & classifying and then solving the vulnerabilities in a system. This term is generally USED in software vulnerability detection and resolving process.

14.

_________ is the sum of all the possible points in software or system where unauthorized users can enter as well as extract data from the system.(a) Attack vector(b) Attack surface(c) Attack point(d) Attack arenaThe question was asked in unit test.This interesting question is from Bugs and Vulnerabilities in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Correct OPTION is (b) Attack surface

The best I can explain: Attack surface can be defined as the sum of all the possible points in SOFTWARE or system where unauthorized users can enter as well as extract DATA from the system. More the SECURITY, lesser is the attack surface.

15.

___________ is a weakness that can be exploited by attackers.(a) System with Virus(b) System without firewall(c) System with vulnerabilities(d) System with a strong passwordThis question was addressed to me in examination.This intriguing question originated from Bugs and Vulnerabilities topic in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer» RIGHT choice is (C) System with vulnerabilities

To explain: In cyber-security, a system having vulnerabilities is defined as the weakness in a system that can be exploited by cyber-criminals and ATTACKERS for their own benefit. For this, they use special tools and techniques in order to CRACK into the system through the vulnerabilities.
16.

________ is a password recovery and auditing tool.(a) LC3(b) LC4(c) Network Stumbler(d) MaltegoI had been asked this question during an internship interview.I need to ask this question from Popular Tools used in Security in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

The correct option is (b) LC4

To elaborate: LC4 which was PREVIOUSLY known as L0phtCrack is a password auditing and recovery tool; used for TESTING strength of a password and ALSO helps in RECOVERING lost Microsoft Windows PASSWORDS.

17.

L0phtCrack is formerly known as LC3.(a) True(b) FalseThe question was asked by my college professor while I was bunking the class.The doubt is from Popular Tools used in Security in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Right OPTION is (b) False

Best explanation: L0phtCrack is now COMMONLY known as LC4 is a password AUDITING and recovery tool; used for testing strength of a password and also helps in recovering lost MICROSOFT Windows passwords.

18.

___________ is a web application assessment security tool.(a) LC4(b) WebInspect(c) Ettercap(d) QualysGuardThis question was posed to me during an interview.My enquiry is from Popular Tools used in Security topic in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Right answer is (b) WebInspect

To EXPLAIN: WebInspect is a popular web application security tool used for identifying KNOWN vulnerabilities RESIDING in web-application layer. It also HELPS in penetration testing of web servers.

19.

Which of the following attack-based checks WebInspect cannot do?(a) cross-site scripting(b) directory traversal(c) parameter injection(d) injecting shell codeThe question was posed to me by my school principal while I was bunking the class.I'm obligated to ask this question of Popular Tools used in Security in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Right answer is (d) injecting shell code

Easy explanation: WebInspect can check whether a web server is PROPERLY configured or not by ATTEMPTING for common ATTACKS such as Cross-site scripting, directory traversal, and parameter injection. But it cannot inject malicious shell code in the server.

20.

_____________ is a popular IP address and port scanner.(a) Cain and Abel(b) Snort(c) Angry IP Scanner(d) EttercapThe question was posed to me in a job interview.My question is from Popular Tools used in Security in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Correct choice is (c) ANGRY IP Scanner

To explain: Angry IP scanner is a light-weight, cross-platform IP and PORT scanning tool that scans a range of IP. It USES the CONCEPT of multithreading for making fast efficient scanning.

21.

_______________ is a popular tool used for network analysis in multiprotocol diverse network.(a) Snort(b) SuperScan(c) Burp Suit(d) EtterPeakThis question was posed to me in exam.This intriguing question comes from Popular Tools used in Security in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Correct option is (d) EtterPeak

Explanation: EtterPeak is a NETWORK analysis TOOL that can be used for multiprotocol heterogeneous networking ARCHITECTURE. It can help in SNIFFING packets of network TRAFFIC.

22.

____________ scans TCP ports and resolves different hostnames.(a) SuperScan(b) Snort(c) Ettercap(d) QualysGuardThe question was asked by my college director while I was bunking the class.The question is from Popular Tools used in Security in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Correct option is (a) SuperScan

For EXPLANATION: SuperScan has a very nice user-friendly interface and it is used for SCANNING TCP ports as well as RESOLVE HOSTNAMES. It is popularly used for scanning ports from a given RANGE of IP.

23.

Aircrack-ng is used for ____________(a) Firewall bypassing(b) Wi-Fi attacks(c) Packet filtering(d) System password crackingI had been asked this question in an interview.I want to ask this question from Popular Tools used in Security topic in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Correct option is (b) Wi-Fi attacks

Best explanation: Weak wireless encryption PROTOCOLS get easily cracked USING Aircrack WPA and Aircrack WEP. Its packet SNIFFING feature KEEPS track of all its TRAFFIC without making any attack.

24.

Which of this Nmap do not check?(a) services different hosts are offering(b) on what OS they are running(c) what kind of firewall is in use(d) what type of antivirus is in useI had been asked this question in an interview for internship.My doubt is from Popular Tools used in Security in section Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Right choice is (d) what type of antivirus is in use

Easy EXPLANATION: Network Mapper (Nmap) is a popular open-source tool used for discovering network as WELL as SECURITY auditing. It usually CHECKS for different services used by the host, what operating SYSTEM it is running and the type of firewall it is using.

25.

Which of the following deals with network intrusion detection and real-time traffic analysis?(a) John the Ripper(b) L0phtCrack(c) Snort(d) NessusThis question was addressed to me in an international level competition.The query is from Popular Tools used in Security topic in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Right option is (c) Snort

The best I can explain: Snort is a NETWORK intrusion DETECTING application that deals with real-time TRAFFIC analysis. As the rules are set and kept updated, they help in MATCHING patterns against KNOWN patterns and protect your network.

26.

Which of the below-mentioned tool is used for Wi-Fi hacking?(a) Wireshark(b) Nessus(c) Aircrack-ng(d) SnortI had been asked this question in homework.The query is from Popular Tools used in Security topic in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

The correct option is (c) Aircrack-ng

Best explanation: Weak wireless encryption protocols get easily cracked using Aircrack WPA and Aircrack WEP ATTACKS that comes with Aircrack-ng TOOL. Its packet sniffing feature keeps track of all its TRAFFIC WITHOUT making any ATTACK.

27.

Wireshark is a ____________ tool.(a) network protocol analysis(b) network connection security(c) connection analysis(d) defending malicious packet-filteringI got this question by my school principal while I was bunking the class.My doubt is from Popular Tools used in Security topic in section Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

The correct OPTION is (a) network protocol ANALYSIS

To explain I would say: Wireshark is popular standardized network protocol analysis tools that allow in-depth CHECK and analysis of PACKETS from different protocols used by the system.

28.

__________ is a popular tool used for discovering networks as well as in security auditing.(a) Ettercap(b) Metasploit(c) Nmap(d) Burp SuitThis question was addressed to me in semester exam.This interesting question is from Popular Tools used in Security topic in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Correct option is (c) Nmap

Easiest EXPLANATION: Network Mapper (Nmap) is a popular open-source tool USED for discovering network as well as security auditing. It can be used for either a single host network or LARGE networks.

29.

_________ framework made cracking of vulnerabilities easy like point and click.(a) .Net(b) Metasploit(c) Zeus(d) EttercapI have been asked this question during an interview.I want to ask this question from Popular Tools used in Security in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Right option is (B) Metasploit

Best explanation: In the year 2003, the Metasploit framework was released which made finding and cracking of VULNERABILITIES easy and is used by both white as well as BLACK hat hackers.

30.

Nmap is abbreviated as Network Mapper.(a) True(b) FalseI got this question in class test.Origin of the question is Popular Tools used in Security topic in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

The correct choice is (a) True

Best explanation: Network Mapper (Nmap) is a popular open-source tool USED for discovering network as well as SECURITY AUDITING. It can be used for either a SINGLE host network or large networks.

31.

_____________ helps in protecting corporate data, communications and other assets.(a) Snort(b) CipherCloud(c) Burp Suit(d) WiresharkThe question was asked in an interview for job.I want to ask this question from Popular Tools used in Security in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer» RIGHT choice is (b) CipherCloud

Easiest EXPLANATION: CipherCloud helps in protecting corporate data, different communications as WELL as other assets. This includes anti-virus scanning FACILITY, ENCRYPTION & traffic monitoring. In addition, it provides mobile security support also.
32.

__________ is a popular corporate security tool that is used to detect the attack on email with cloud only services.(a) Cain and Abel(b) Proofpoint(c) Angry IP Scanner(d) EttercapThis question was addressed to me in an interview for internship.My question is from Popular Tools used in Security topic in section Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Correct answer is (b) Proofpoint

The EXPLANATION: Proofpoint is a popular CORPORATE security TOOL that is used to detect an attack on email with cloud-only services. It helps firms detect attack vectors and loopholes in different security systems through which ATTACKERS may gain ACCESS.

33.

________________ helps in protecting businesses against data breaches that may make threats to cloud.(a) Centrify(b) Mailbox Exchange Recovery(c) Nessus(d) DashlineI have been asked this question during an interview.The origin of the question is Popular Tools used in Security in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Right option is (a) CENTRIFY

For explanation: Centrify helps in protecting businesses against data breaches that may MAKE threats to the cloud. This is done by securing Centrify USERS by providing internal, EXTERNAL and privileged users.

34.

________________ is a platform that essentially keeps the log of data from networks, devices as well as applications in a single location.(a) EventLog Analyser(b) NordVPN(c) Wireshark(d) PacketFilter AnalyzerI got this question in an interview for job.The above asked question is from Popular Tools used in Security in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Right answer is (a) EventLog Analyser

To explain I would say: EventLog Analyser is a tool that BASICALLY keeps the log of data from networks, devices as WELL as applications in a single location. Latest ENCRYPTION TECHNIQUES are used for securing its STORED data.

35.

______________ is competent to restore corrupted Exchange Server Database files as well as recovering unapproachable mails in mailboxes.(a) Outlook(b) Nessus(c) Mailbox Exchange Recovery(d) Mail Exchange Recovery toolkitI have been asked this question during a job interview.My question comes from Popular Tools used in Security topic in section Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Correct choice is (c) Mailbox EXCHANGE Recovery

For EXPLANATION: Mailbox Exchange Recovery is competent to restore corrupted Exchange Server Database files as well as RECOVERING unapproachable mails in mailboxes. This tool is popularly used by ethical HACKERS and cyber-forensics investigators in recovering emails, calendars, attachments, contacts from INACCESSIBLE mail-servers.

36.

__________ is a popular command-line packet analyser.(a) Wireshark(b) Snort(c) Metasploit(d) TcpdumpThe question was posed to me by my school principal while I was bunking the class.Enquiry is from Popular Tools used in Security in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Right choice is (d) Tcpdump

For explanation I WOULD say: Tcpdump is a POPULAR command-line network packet analyzer. It allows its user in DISPLAYING TCP / IP as well as other data packets being transmitted or received over the computer network.

37.

__________ is a debugger and exploration tool.(a) Netdog(b) Netcat(c) Tcpdump(d) BackTrackThis question was addressed to me by my school principal while I was bunking the class.This interesting question is from Popular Tools used in Security topic in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Right answer is (b) Netcat

Easy explanation: Netcat is an easy Unix utility that helps in reading and WRITING data across network connections, using TCP or UDP protocol. It is popularly used as a debugger and exploration tool that is found free for Windows and Mac OS also.

38.

ToneLoc is abbreviated as __________(a) Tone Locking(b) Tone Locator(c) Tone Locker(d) Tune LocatorI had been asked this question in examination.This interesting question is from Popular Tools used in Security in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Right option is (c) Tone Locker

The best I can explain: ToneLoc is a popular and PRIMITIVE tool written for MS-DOS users. It is BASICALLY used by malicious ATTACKERS to guess USER accounts, finding entry points in modems and locating modems connected in the network.

39.

Network Stumbler is a Windows Wi-Fi monitoring tool.(a) True(b) FalseThis question was posed to me during an internship interview.This is a very interesting question from Popular Tools used in Security in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

The correct OPTION is (a) True

To explain: Network Stumbler is a popular tool that HELPS in detecting WLANs and helps hackers in finding non-broadcasting WIRELESS NETWORKS. It is popularly used as Wi-Fi scanning and monitoring tool for Windows.

40.

____________ is the world’s most popular vulnerability scanner used in companies for checking vulnerabilities in the network.(a) Wireshark(b) Nessus(c) Snort(d) WebInspectI have been asked this question by my school principal while I was bunking the class.My question is from Popular Tools used in Security in section Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer» RIGHT ANSWER is (b) Nessus

To EXPLAIN: Nessus is a popular and PROPRIETARY network vulnerability scanning tool developed by Tenable Network Security. It helps in easily identifying vulnerabilities and fix them, which includes missing patches and software FLAWS.
41.

_____________ is a tool which can detect registry issues in an operating system.(a) Network Stumbler(b) Ettercap(c) Maltego(d) LANguard Network Security ScannerI had been asked this question in homework.This question is from Popular Tools used in Security in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Right option is (d) LANguard Network SECURITY Scanner

Explanation: LANguard Network Security Scanner HELPS in monitoring NETWORKS by SCANNING connected machines to provide information for every node. It can also be used for IDENTIFYING registry issues.

42.

Which of the following attach is not used by LC4 to recover Windows password?(a) Brute-force attack(b) Dictionary attack(c) MiTM attack(d) Hybrid attacksThe question was posed to me in an interview for job.This interesting question is from Popular Tools used in Security topic in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Correct answer is (C) MiTM attack

To explain I would say: LC4 is a password auditing and RECOVERY tool; used for testing strength of a password and also HELPS in recovering lost MICROSOFT Windows passwords using a HYBRID attack, brute-force attack as well as using a dictionary attack.

43.

Section 79 of the Indian IT Act declares that any 3^rd party information or personal data leakage in corporate firms or organizations will be a punishable offense.(a) True(b) FalseThe question was asked during a job interview.My query is from Cyber Laws and IT laws topic in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Correct option is (a) True

To ELABORATE: SECTION 79 of the Indian IT Act covers some of the CORPORATE and business laws circulating TECHNOLOGIES and cyberspace; declares that any 3^rd party information or personal DATA leakage in corporate firms or organizations will be a punishable offense.

44.

Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act.(a) section 65(b) section 66(c) section 71(d) section 72This question was addressed to me in an online interview.I want to ask this question from Cyber Laws and IT laws in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

The correct option is (d) section 72

To explain I would say: Cyber-criminals and BLACK HAT HACKERS do one common form of cyber-crime that is a misuse of DIGITAL signatures. The law for this fraudulent act comes under section 72 of the Indian IT Act.

45.

Stealing of digital files comes under __________ of the Indian IT Act.(a) section 66-A(b) section 66-B(c) section 66-C(d) section 66-DThis question was posed to me during an online exam.Enquiry is from Cyber Laws and IT laws topic in section Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Correct answer is (c) SECTION 66-C

The best explanation: STEALING of digital files, e-documents from any system or cloud or electronic device is a punishable offense that COMES under section 66 – C of the Indian IT ACT.

46.

Sending offensive message to someone comes under _____________ of the Indian IT Act ______(a) section 66-A, 2000(b) section 66-B, 2008(c) section 67, 2000(d) section 66-A, 2008This question was addressed to me during an internship interview.My question is taken from Cyber Laws and IT laws topic in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Right option is (d) section 66-A, 2008

Best EXPLANATION: Sending an offensive MESSAGE, emails o any digital content through an electronic medium to your recipient is a punishable OFFENSE that COMES under section 66 – A of the Indian IT Act, 2008.

47.

Using of spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with imprisonment of ___________(a) 2 years(b) 3 years(c) 4 years(d) 5 yearsI have been asked this question in an interview.I want to ask this question from Cyber Laws and IT laws in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Correct answer is (b) 3 years

For explanation I would say: Using of SPY cameras in malls and shops to capture private PARTS of any person, without the CONCERN of that VICTIM, then it comes under section 67 of IT Act, 2008 where the person doing such crime is punished with imprisonment of 3 years.

48.

Using spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with a fine of Rs. 5 Lacs.(a) True(b) FalseThe question was asked during an interview.My question is from Cyber Laws and IT laws topic in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

The correct answer is (a) True

The best explanation: USING of spy cameras in malls and shops to capture private parts of any PERSON, without the concern of that victim, then it COMES under section 67 of IT Act, 2008 where the person doing such crime is punished with a fine of Rs. 5 Lacs.

49.

If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of _________ years.(a) 2(b) 3(c) 4(d) 5This question was posed to me in a job interview.This key question is from Cyber Laws and IT laws in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

The correct answer is (d) 5

Explanation: IT Act 2008 make cyber-crime DETAILS more PRECISE where it MENTIONED if anyone publishes sexually explicit DIGITAL content then under section 67 – A he/she has to pay a legitimate amount of fine and imprisonment of five YEARS.

50.

Using spy cameras in malls and shops to capture private parts of any person comes under _______ of IT Act, 2008.(a) Section 66(b) Section 67(c) Section 68(d) Section 69The question was asked in quiz.The query is from Cyber Laws and IT laws in section Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Right choice is (b) SECTION 67

For explanation: Using of spy cameras in malls and shops to capture private parts of any person, WITHOUT the concern of that victim, then it COMES under section 67 of IT Act, 2008 as a punishable OFFENSE.