InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
Any digital content which any individual creates and is not acceptable to the society, it’s a cyber-crime that comes under _________ of IT Act.(a) Section 66(b) Section 67(c) Section 68(d) Section 69The question was posed to me in homework.This key question is from Cyber Laws and IT laws in section Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Right option is (b) Section 67 |
|
| 52. |
IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of fine.(a) section 67-A(b) section 67-B(c) section 67-C(d) section 67-DThe question was asked in exam.The query is from Cyber Laws and IT laws topic in section Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» The correct answer is (a) section 67-A |
|
| 53. |
How many years of imprisonment can an accused person face, if he/she comes under any cyber-crime listed in section 66 of the Indian IT Act, 2000?(a) 1 year(b) 2 years(c) 3 years(d) 4 yearsThis question was addressed to me in an international level competition.I'd like to ask this question from Cyber Laws and IT laws in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» The correct choice is (c) 3 YEARS |
|
| 54. |
Any cyber-crime that comes under section 66 of IT Act, the accused person gets fined of around Rs ________(a) 2 lacs(b) 3 lacs(c) 4 lacs(d) 5 lacsThis question was posed to me during an interview.My query is from Cyber Laws and IT laws in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Correct option is (d) 5 lacs |
|
| 55. |
Download copy, extract data from an open system done fraudulently is treated as _________(a) cyber-warfare(b) cyber-security act(c) data-backup(d) cyber-crimeThe question was posed to me in final exam.The above asked question is from Cyber Laws and IT laws in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Right choice is (d) cyber-crime |
|
| 56. |
Accessing Wi-Fi dishonestly is a cyber-crime.(a) True(b) FalseThis question was posed to me in class test.Query is from Cyber Laws and IT laws in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» The CORRECT option is (a) True |
|
| 57. |
Cracking digital identity of any individual or doing identity theft, comes under __________ of IT Act.(a) Section 65(b) Section 66(c) Section 68(d) Section 70The question was posed to me during an interview for a job.I would like to ask this question from Cyber Laws and IT laws topic in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Correct choice is (B) Section 66 |
|
| 58. |
Accessing computer without prior authorization is a cyber-crimes that come under _______(a) Section 65(b) Section 66(c) Section 68(d) Section 70The question was asked in a national level competition.This key question is from Cyber Laws and IT laws topic in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» The CORRECT option is (B) Section 66 |
|
| 59. |
What type of cyber-crime, its laws and punishments does section 66 of the Indian IT Act holds?(a) Cracking or illegally hack into any system(b) Putting antivirus into the victim(c) Stealing data(d) Stealing hardware componentsThis question was posed to me by my school principal while I was bunking the class.The origin of the question is Cyber Laws and IT laws in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» The correct answer is (a) Cracking or illegally HACK into any system |
|
| 60. |
In which year the Indian IT Act, 2000 got updated?(a) 2006(b) 2008(c) 2010(d) 2012I had been asked this question during an internship interview.The origin of the question is Cyber Laws and IT laws in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Correct ANSWER is (b) 2008 |
|
| 61. |
What is the updated version of the IT Act, 2000?(a) IT Act, 2007(b) Advanced IT Act, 2007(c) IT Act, 2008(d) Advanced IT Act, 2008I had been asked this question during a job interview.This interesting question is from Cyber Laws and IT laws in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Right option is (c) IT ACT, 2008 |
|
| 62. |
What is the punishment in India for stealing computer documents, assets or any software’s source code from any organization, individual, or from any other means?(a) 6 months of imprisonment and a fine of Rs. 50,000(b) 1 year of imprisonment and a fine of Rs. 100,000(c) 2 years of imprisonment and a fine of Rs. 250,000(d) 3 years of imprisonment and a fine of Rs. 500,000The question was posed to me in homework.This interesting question is from Cyber Laws and IT laws topic in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Right answer is (d) 3 years of imprisonment and a fine of Rs. 500,000 |
|
| 63. |
Under which section of IT Act, stealing any digital asset or information is written a cyber-crime.(a) 65(b) 65-D(c) 67(d) 70I got this question in exam.Enquiry is from Cyber Laws and IT laws in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» CORRECT option is (a) 65 The BEST I can explain: When a cyber-criminal steals any computer documents, assets or any software’s source code from any organization, individual, or from any other MEANS then the cyber crime FALLS under section 65 of IT Act, 2000. |
|
| 64. |
The Information Technology Act -2000 bill was passed by K. R. Narayanan.(a) True(b) FalseI got this question during an online interview.My query is from Cyber Laws and IT laws topic in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Correct option is (b) False |
|
| 65. |
What is the full form of ITA-2000?(a) Information Tech Act -2000(b) Indian Technology Act -2000(c) International Technology Act -2000(d) Information Technology Act -2000This question was addressed to me in an interview.The doubt is from Cyber Laws and IT laws in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» RIGHT OPTION is (d) Information TECHNOLOGY Act -2000 To elaborate: Information Technology Act -2000 (ITA-2000), came into existence on 17^th Oct 2000, that is dedicated to cyber-crime and e-commerce law in INDIA. |
|
| 66. |
In which year India’s IT Act came into existence?(a) 2000(b) 2001(c) 2002(d) 2003The question was posed to me in an interview.Enquiry is from Cyber Laws and IT laws in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Correct answer is (a) 2000 |
|
| 67. |
Which of the following is not done by cyber criminals?(a) Unauthorized account access(b) Mass attack using Trojans as botnets(c) Email spoofing and spamming(d) Report vulnerability in any systemThe question was posed to me in an online quiz.This intriguing question comes from Cyber Laws and IT laws topic in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» The correct option is (d) Report vulnerability in any SYSTEM |
|
| 68. |
What is the name of the IT law that India is having in the Indian legislature?(a) India’s Technology (IT) Act, 2000(b) India’s Digital Information Technology (DIT) Act, 2000(c) India’s Information Technology (IT) Act, 2000(d) The Technology Act, 2008This question was posed to me during an internship interview.My query is from Cyber Laws and IT laws in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» RIGHT choice is (c) India’s Information TECHNOLOGY (IT) Act, 2000 Best EXPLANATION: The Indian legislature thought of adding a chapter that is dedicated to cyber law. This FINALLY brought India’s Information Technology (IT) Act, 2000 which deals with the different cyber-crimes and their ASSOCIATED laws. |
|
| 69. |
Which of the following is not an example of a computer as weapon cyber-crime?(a) Credit card fraudulent(b) Spying someone using keylogger(c) IPR Violation(d) PornographyThis question was addressed to me in exam.My doubt stems from Cyber Laws and IT laws in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» CORRECT option is (B) Spying someone using keylogger Best explanation: DDoS (DISTRIBUTED Denial of Service), IPR violation, pornography are mass attacks done using a computer. Spying someone using keylogger is an EXAMPLE of peer-to-peer attack. |
|
| 70. |
Which of the following is not a type of peer-to-peer cyber-crime?(a) Phishing(b) Injecting Trojans to a target victim(c) MiTM(d) Credit card details leak in deep webThis question was posed to me in a job interview.The origin of the question is Cyber Laws and IT laws in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Right choice is (d) Credit CARD details leak in deep web |
|
| 71. |
Cyber-crime can be categorized into ________ types.(a) 4(b) 3(c) 2(d) 6I had been asked this question in semester exam.This question is from Cyber Laws and IT laws in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Right answer is (c) 2 |
|
| 72. |
Cyber-laws are incorporated for punishing all criminals only.(a) True(b) FalseI had been asked this question in examination.Question is taken from Cyber Laws and IT laws topic in section Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» RIGHT answer is (b) False The explanation is: Cyber-laws were incorporated in our law book not only to punish cyber criminals but to reduce cyber CRIMES and tie the hands of citizens from doing illicit digital acts that harm or damage other’s digital property or identity. |
|
| 73. |
Which of the following is not a type of cyber crime?(a) Data theft(b) Forgery(c) Damage to data and systems(d) Installing antivirus for protectionThe question was asked during a job interview.Query is from Cyber Laws and IT laws in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security |
|
Answer» Right choice is (d) INSTALLING antivirus for protection |
|