Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

51.

Any digital content which any individual creates and is not acceptable to the society, it’s a cyber-crime that comes under _________ of IT Act.(a) Section 66(b) Section 67(c) Section 68(d) Section 69The question was posed to me in homework.This key question is from Cyber Laws and IT laws in section Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Right option is (b) Section 67

For explanation I would say: Any digital CONTENT which is either lascivious is not ACCEPTABLE by the society or viewers or that digital ITEM corrupts the minds of the audience, then the creator of such contents FALLS under the cyber-crime of section 67 of the Indian IT Act.

52.

IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of fine.(a) section 67-A(b) section 67-B(c) section 67-C(d) section 67-DThe question was asked in exam.The query is from Cyber Laws and IT laws topic in section Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

The correct answer is (a) section 67-A

Easy explanation: IT Act 2008 makes cyber-crime details more PRECISE where it mentioned if anyone publishes sexually explicit DIGITAL CONTENT then under section 67 – A he/she has to pay a legitimate amount of fine.

53.

How many years of imprisonment can an accused person face, if he/she comes under any cyber-crime listed in section 66 of the Indian IT Act, 2000?(a) 1 year(b) 2 years(c) 3 years(d) 4 yearsThis question was addressed to me in an international level competition.I'd like to ask this question from Cyber Laws and IT laws in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

The correct choice is (c) 3 YEARS

To explain I would SAY: Any cyber-crime that comes under SECTION 66 of the Indian IT ACT, the person accused of such cyber-crime gets fined of around five lacs rupees and 3 years of imprisonment.

54.

Any cyber-crime that comes under section 66 of IT Act, the accused person gets fined of around Rs ________(a) 2 lacs(b) 3 lacs(c) 4 lacs(d) 5 lacsThis question was posed to me during an interview.My query is from Cyber Laws and IT laws in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Correct option is (d) 5 lacs

To elaborate: Any cyber-crime that comes under section 66 of the INDIAN IT Act, the person ACCUSED of such cyber-crime gets fined of around FIVE lacs rupees.

55.

Download copy, extract data from an open system done fraudulently is treated as _________(a) cyber-warfare(b) cyber-security act(c) data-backup(d) cyber-crimeThe question was posed to me in final exam.The above asked question is from Cyber Laws and IT laws in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Right choice is (d) cyber-crime

The explanation is: Download copy, extract DATA from an open system DONE FRAUDULENTLY is treated as according to section 66 of the Indian IT ACT.

56.

Accessing Wi-Fi dishonestly is a cyber-crime.(a) True(b) FalseThis question was posed to me in class test.Query is from Cyber Laws and IT laws in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

The CORRECT option is (a) True

The best I can explain: Under SECTION 66 of IT Act, 2000 which later came up with a much broader and precise law (as IT Act, 2008) says that if any individual access anyone’s Wi-Fi network WITHOUT the permission of the OWNER or for doing a malicious activity, it is a cyber-crime.

57.

Cracking digital identity of any individual or doing identity theft, comes under __________ of IT Act.(a) Section 65(b) Section 66(c) Section 68(d) Section 70The question was posed to me during an interview for a job.I would like to ask this question from Cyber Laws and IT laws topic in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Correct choice is (B) Section 66

Easiest explanation: Under section 66 of IT Act, 2000 which later CAME up with a much broader and precise law (as IT Act, 2008) says that if any INDIVIDUAL steals the identity or MISUSE any victim’s identity for his/her own PROFIT, it is a cyber-crime.

58.

Accessing computer without prior authorization is a cyber-crimes that come under _______(a) Section 65(b) Section 66(c) Section 68(d) Section 70The question was asked in a national level competition.This key question is from Cyber Laws and IT laws topic in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

The CORRECT option is (B) Section 66

For explanation I would SAY: Under section 66 of IT Act, 2000 which later came up with a MUCH broader and precise law SAYS that without prior authorization or permission, if any individual access any computer system, it is a cyber-crime.

59.

What type of cyber-crime, its laws and punishments does section 66 of the Indian IT Act holds?(a) Cracking or illegally hack into any system(b) Putting antivirus into the victim(c) Stealing data(d) Stealing hardware componentsThis question was posed to me by my school principal while I was bunking the class.The origin of the question is Cyber Laws and IT laws in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

The correct answer is (a) Cracking or illegally HACK into any system

Easiest explanation: Under SECTION 66 of IT Act, 2000 which later came up with a MUCH broader and precise LAW says that cracking or illegally hacking into any victim’s computer is a crime. It covers a wide RANGE of cyber-crimes under this section of the IT Act.

60.

In which year the Indian IT Act, 2000 got updated?(a) 2006(b) 2008(c) 2010(d) 2012I had been asked this question during an internship interview.The origin of the question is Cyber Laws and IT laws in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Correct ANSWER is (b) 2008

The explanation is: In the year 2008, the IT Act, 2000 was UPDATED and came up with a much BROADER and precise LAW on different computer-related crimes and cyber offenses.

61.

What is the updated version of the IT Act, 2000?(a) IT Act, 2007(b) Advanced IT Act, 2007(c) IT Act, 2008(d) Advanced IT Act, 2008I had been asked this question during a job interview.This interesting question is from Cyber Laws and IT laws in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Right option is (c) IT ACT, 2008

The BEST I can explain: In the year 2008, the IT Act, 2000 was updated and came up with a MUCH broader and precise law on different computer-related CRIMES and cyber offenses.

62.

What is the punishment in India for stealing computer documents, assets or any software’s source code from any organization, individual, or from any other means?(a) 6 months of imprisonment and a fine of Rs. 50,000(b) 1 year of imprisonment and a fine of Rs. 100,000(c) 2 years of imprisonment and a fine of Rs. 250,000(d) 3 years of imprisonment and a fine of Rs. 500,000The question was posed to me in homework.This interesting question is from Cyber Laws and IT laws topic in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Right answer is (d) 3 years of imprisonment and a fine of Rs. 500,000

For explanation: The punishment in INDIA for stealing computer documents, ASSETS or any software’s source CODE from any ORGANIZATION, individual, or from any other means is 3 years of imprisonment and a fine of Rs. 500,000.

63.

Under which section of IT Act, stealing any digital asset or information is written a cyber-crime.(a) 65(b) 65-D(c) 67(d) 70I got this question in exam.Enquiry is from Cyber Laws and IT laws in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer» CORRECT option is (a) 65

The BEST I can explain: When a cyber-criminal steals any computer documents, assets or any software’s source code from any organization, individual, or from any other MEANS then the cyber crime FALLS under section 65 of IT Act, 2000.
64.

The Information Technology Act -2000 bill was passed by K. R. Narayanan.(a) True(b) FalseI got this question during an online interview.My query is from Cyber Laws and IT laws topic in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Correct option is (b) False

For EXPLANATION: The bill was passed & SIGNED by Dr. K. R. Narayanan on 9th May, in the year 2000. The bill got finalised by head officials along with the Minister of Information Technology, Dr. Pramod Mahajan.

65.

What is the full form of ITA-2000?(a) Information Tech Act -2000(b) Indian Technology Act -2000(c) International Technology Act -2000(d) Information Technology Act -2000This question was addressed to me in an interview.The doubt is from Cyber Laws and IT laws in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer» RIGHT OPTION is (d) Information TECHNOLOGY Act -2000

To elaborate: Information Technology Act -2000 (ITA-2000), came into existence on 17^th Oct 2000, that is dedicated to cyber-crime and e-commerce law in INDIA.
66.

In which year India’s IT Act came into existence?(a) 2000(b) 2001(c) 2002(d) 2003The question was posed to me in an interview.Enquiry is from Cyber Laws and IT laws in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Correct answer is (a) 2000

To explain: On 17TH Oct 2000, the Indian LEGISLATURE thought of adding a CHAPTER that is DEDICATED to cyber law, for which India’s Information TECHNOLOGY (IT) Act, 2000 came into existence.

67.

Which of the following is not done by cyber criminals?(a) Unauthorized account access(b) Mass attack using Trojans as botnets(c) Email spoofing and spamming(d) Report vulnerability in any systemThe question was posed to me in an online quiz.This intriguing question comes from Cyber Laws and IT laws topic in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

The correct option is (d) Report vulnerability in any SYSTEM

The explanation: Cyber-criminals are involved in activities like accessing online accounts in UNAUTHORIZED manner; use TROJANS to attack large SYSTEMS, SENDING spoofed emails. But cyber-criminals do not report any bug is found in a system, rather they exploit the bug for their profit.

68.

What is the name of the IT law that India is having in the Indian legislature?(a) India’s Technology (IT) Act, 2000(b) India’s Digital Information Technology (DIT) Act, 2000(c) India’s Information Technology (IT) Act, 2000(d) The Technology Act, 2008This question was posed to me during an internship interview.My query is from Cyber Laws and IT laws in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer» RIGHT choice is (c) India’s Information TECHNOLOGY (IT) Act, 2000

Best EXPLANATION: The Indian legislature thought of adding a chapter that is dedicated to cyber law. This FINALLY brought India’s Information Technology (IT) Act, 2000 which deals with the different cyber-crimes and their ASSOCIATED laws.
69.

Which of the following is not an example of a computer as weapon cyber-crime?(a) Credit card fraudulent(b) Spying someone using keylogger(c) IPR Violation(d) PornographyThis question was addressed to me in exam.My doubt stems from Cyber Laws and IT laws in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer» CORRECT option is (B) Spying someone using keylogger

Best explanation: DDoS (DISTRIBUTED Denial of Service), IPR violation, pornography are mass attacks done using a computer. Spying someone using keylogger is an EXAMPLE of peer-to-peer attack.
70.

Which of the following is not a type of peer-to-peer cyber-crime?(a) Phishing(b) Injecting Trojans to a target victim(c) MiTM(d) Credit card details leak in deep webThis question was posed to me in a job interview.The origin of the question is Cyber Laws and IT laws in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Right choice is (d) Credit CARD details leak in deep web

For explanation: Phishing, injecting Trojans and worms to individuals COMES under peer-to-peer cyber crime. Whereas, leakage of credit card DATA of a large NUMBER of people in deep web comes under computer as weapon cyber-crime.

71.

Cyber-crime can be categorized into ________ types.(a) 4(b) 3(c) 2(d) 6I had been asked this question in semester exam.This question is from Cyber Laws and IT laws in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Right answer is (c) 2

To explain: Cyber crime can be CATEGORIZED into 2 types. These are peer-to-peer attack and computer as WEAPON. In peer-to-peer attack, attackers target the victim users; and in computer as weapon attack TECHNIQUE, computers are used by attackers for a MASS attack such as illegal and banned photo leak, IPR violation, pornography, cyber TERRORISM etc.

72.

Cyber-laws are incorporated for punishing all criminals only.(a) True(b) FalseI had been asked this question in examination.Question is taken from Cyber Laws and IT laws topic in section Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer» RIGHT answer is (b) False

The explanation is: Cyber-laws were incorporated in our law book not only to punish cyber criminals but to reduce cyber CRIMES and tie the hands of citizens from doing illicit digital acts that harm or damage other’s digital property or identity.
73.

Which of the following is not a type of cyber crime?(a) Data theft(b) Forgery(c) Damage to data and systems(d) Installing antivirus for protectionThe question was asked during a job interview.Query is from Cyber Laws and IT laws in portion Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security

Answer»

Right choice is (d) INSTALLING antivirus for protection

The explanation is: Cyber crimes are one of the most THREATENING terms that is an evolving phase. It is said that major percentage of the World War III will be based on cyber-attacks by cyber ARMIES of different countries.