0% found this document useful (0 votes)
210 views3 pages

B) Spying Someone Using Keylogger: 1. A 2. C 3. C 4. B 5. C 6. C

The document discusses cyber crimes and computer security. It provides examples of computer crimes like credit card fraud, spying using keyloggers, and IPR violations. It mentions that India's Information Technology Act of 2000 is the law governing cyber crimes in India. Exploit-db is identified as the search engine for finding exploits related to known vulnerabilities. The document also discusses ways that web servers can be compromised, like misconfigurations, bugs in the operating system, and using network vulnerabilities. It recommends turning off Bluetooth on mobile devices for security when not in use, as botnets can trigger DDoS attacks from compromised devices.

Uploaded by

Prerna Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
210 views3 pages

B) Spying Someone Using Keylogger: 1. A 2. C 3. C 4. B 5. C 6. C

The document discusses cyber crimes and computer security. It provides examples of computer crimes like credit card fraud, spying using keyloggers, and IPR violations. It mentions that India's Information Technology Act of 2000 is the law governing cyber crimes in India. Exploit-db is identified as the search engine for finding exploits related to known vulnerabilities. The document also discusses ways that web servers can be compromised, like misconfigurations, bugs in the operating system, and using network vulnerabilities. It recommends turning off Bluetooth on mobile devices for security when not in use, as botnets can trigger DDoS attacks from compromised devices.

Uploaded by

Prerna Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

1.

a
2. c
1. Which of the following is not an example of a computer as weapon cyber-crime? 3. c
4. b
a) Credit card fraudulent 5. c
6. c
b) Spying someone using keylogger

c) IPR Violation

d) Pornography

View Answer

Answer: b

Explanation: DDoS (Distributed Denial of Service), IPR violation, pornography are mass attacks done
using a computer. Spying someone using keylogger is an example of peer-to-peer attack.

2. What is the name of the IT law that India is having in the Indian legislature?

a) India’s Technology (IT) Act, 2000

b) India’s Digital Information Technology (DIT) Act, 2000

c) India’s Information Technology (IT) Act, 2000

d) The Technology Act, 2008

View Answer

Answer: c

Explanation: The Indian legislature thought of adding a chapter that is dedicated to cyber law. This
finally brought India’s Information Technology (IT) Act, 2000 which deals with the different cyber-crimes
and their associated laws.

3. __________ is the specific search engine for exploits where anyone can find all the exploits
associated to vulnerability.

a) Google

b) Bing

c) Exploit-db

d) Exploit-engine

View Answer
Answer: c

Explanation: Since based on vulnerabilities, we can find exploits, Exploit-db is the specific search engine
for exploits where anyone can find all the exploits associated with vulnerability. You can find this from
https://www.exploit-db.com.

4. Which of the following is not an appropriate way to compromise web servers?

a) Misconfiguration in OS

b) Using network vulnerabilities

c) Misconfiguration in networks

d) Bugs in OS which allow commands to run on web servers

View Answer

Answer: b

Explanation: Websites get hosted on web servers. Web servers are actually computers running that
makes us available & accessible files (web pages) through the internet. Various ways that can help
compromise a web server are a misconfiguration of network or OS, bugs in web server’s OS etc.

5. Activate _____________ when you’re required it to use, otherwise turn it off for security
purpose.

a) Flash Light

b) App updates

c) Bluetooth

d) Rotation

View Answer

Answer: c

Explanation: Activate Bluetooth when you’re required it to use, otherwise turn it off for security
purpose. This is because; there are various tools and vulnerabilities that may gain access to your smart-
phone using Bluetooth.
6. DDoS in mobile systems wait for the owner of the _____________ to trigger the attack.

a) worms

b) virus

c) botnets

d) programs

View Answer

Answer: c

Explanation: Botnets on compromised mobile devices wait for instructions from their owner. After
getting the owner’s instruction it launches DDoS flood attack. This result in a failure in connecting calls
or transmitting data.

You might also like