solv_ MCQ Bank_CyberSecurity Level_2-Student
solv_ MCQ Bank_CyberSecurity Level_2-Student
: 2023-24
Page 1 of 14
MCQ Questions for CYBER SECURITY LEVEL-2 (SEC): S.Y.BCA Sem-4: A.Y.: 2023-24
Section 13 of
The following laws / sections the POCSO
Section 134 of Sections 66 A
were amended / passed to Act, 2012 Section 376
the Indian and 66 B of the
combat pornography of an was passed of the Indian
Evidence Act, I.T. (Amendment)
aggravated to deal with Penal Code
1872 Act, 2008
form: such
offences
in case of As soon as
cognizable non-
after receiving
After receiving offence after cognizable
authority from Sr.
When to start investigation: permission from lodging of the offence is
Inspector of
Cyber Cell FIR under brought to
Police
Section 154 the notice of
of Cr. P. C. Police
Page 2 of 14
MCQ Questions for CYBER SECURITY LEVEL-2 (SEC): S.Y.BCA Sem-4: A.Y.: 2023-24
Indian Indian
Indian
Indian Computer Cyber
Commercial
ICERT stands for : Commercial and Emergency Emergency
Emergency
Economical Response Response
Response Team
Team Team
International Internet
Internet Service Internet Sample
What is an ISP ? Service Service
Provider Provider
Provider Passenger
A patent is an exclusive right
granted by a ______ to the
Country Government District World
owner of an invention to make,
use, manufacture.
International
International International International
Secondary
ISO stands for : Organization for Service Security
Organizatio
Standardization Organization Organization
n
Under which section of IT Act,
stealing any digital asset or
65 65 D 67 70
information is written a cyber-
crime.
Page 3 of 14
MCQ Questions for CYBER SECURITY LEVEL-2 (SEC): S.Y.BCA Sem-4: A.Y.: 2023-24
Page 4 of 14
MCQ Questions for CYBER SECURITY LEVEL-2 (SEC): S.Y.BCA Sem-4: A.Y.: 2023-24
Page 5 of 14
MCQ Questions for CYBER SECURITY LEVEL-2 (SEC): S.Y.BCA Sem-4: A.Y.: 2023-24
The application of
computer science
and investigative
procedures for a Use of
legal purpose science or
A process
involving the technology
where we
Process of using analysis of digital in the
develop and
scientific evidence after investigation
test
knowledge in proper search and
What Is Digital Forensic? hypotheses
analysis and authority, chain of establishme
that answer
presentation of custody, nt of the
questions
evidence in court validation with facts or
about digital
mathematics, use evidence in
events
of validated tools, a court of
repeatability, law
reporting, and
possible expert
presentation
Page 6 of 14
MCQ Questions for CYBER SECURITY LEVEL-2 (SEC): S.Y.BCA Sem-4: A.Y.: 2023-24
Page 7 of 14
MCQ Questions for CYBER SECURITY LEVEL-2 (SEC): S.Y.BCA Sem-4: A.Y.: 2023-24
No additional
What are the strengths of the Attack System specific All of the
hardware
host based IDS? verification activity mentioned
required
Page 8 of 14
MCQ Questions for CYBER SECURITY LEVEL-2 (SEC): S.Y.BCA Sem-4: A.Y.: 2023-24
Page 9 of 14
MCQ Questions for CYBER SECURITY LEVEL-2 (SEC): S.Y.BCA Sem-4: A.Y.: 2023-24
Page 10 of 14
MCQ Questions for CYBER SECURITY LEVEL-2 (SEC): S.Y.BCA Sem-4: A.Y.: 2023-24
Page 11 of 14
MCQ Questions for CYBER SECURITY LEVEL-2 (SEC): S.Y.BCA Sem-4: A.Y.: 2023-24
Page 12 of 14
MCQ Questions for CYBER SECURITY LEVEL-2 (SEC): S.Y.BCA Sem-4: A.Y.: 2023-24
Page 13 of 14
MCQ Questions for CYBER SECURITY LEVEL-2 (SEC): S.Y.BCA Sem-4: A.Y.: 2023-24
Page 14 of 14