0% found this document useful (0 votes)
38 views14 pages

solv_ MCQ Bank_CyberSecurity Level_2-Student

The document contains multiple-choice questions (MCQs) related to Cyber Security Level-2 for S.Y.BCA Sem-4 for the academic year 2023-24. It covers various topics including cyber crimes, the Information Technology Act, digital forensics, and security protocols like HTTPS and SSL/TLS. Each question is accompanied by four options, testing knowledge on legal aspects, technical definitions, and cybersecurity practices.

Uploaded by

manthan7114
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views14 pages

solv_ MCQ Bank_CyberSecurity Level_2-Student

The document contains multiple-choice questions (MCQs) related to Cyber Security Level-2 for S.Y.BCA Sem-4 for the academic year 2023-24. It covers various topics including cyber crimes, the Information Technology Act, digital forensics, and security protocols like HTTPS and SSL/TLS. Each question is accompanied by four options, testing knowledge on legal aspects, technical definitions, and cybersecurity practices.

Uploaded by

manthan7114
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

MCQ Questions for CYBER SECURITY LEVEL-2 (SEC): S.Y.BCA Sem-4: A.Y.

: 2023-24

Question Option1 Option2 Option3 Option4


Many Cyber Crimes comes Sending
under Indian Penal Code Which Threatening Forgery of Bogus
All of above
one of the following is an message by Electronic Record Website
example? Email
The Information Technology Act 17th 17th
27th October 15th December
2000 is an Act of Indian November October
2000 2000
Parliament notified on 2000 2000
Assessing Computer without
prior authorization is a cyber Section 65 Section 66 Section 68 Section 70
crime that comes under____
Section 70 - Access or attempt
to access by any unauthorized
person, a protected computer Non-
system as notified by the Cognizable, Non-Cognizable, Cognizable, Cognizable,
Government in the Official Bailable Bailable Non-Bailable Non-
Gazette where punishment may Bailable
extend up to
10 yrs. and fine is:

Child pornography is an offence


67 A 67 B 67 C 67 D
under section ________.

Page 1 of 14
MCQ Questions for CYBER SECURITY LEVEL-2 (SEC): S.Y.BCA Sem-4: A.Y.: 2023-24

Question Option1 Option2 Option3 Option4

In the following case the Hon’ble Shreya


Kartar Singh v/s Maneka Gandhi K. A. Abbas
Supreme Court struck down Singhal v/s
State of Punjab v/s UOI v/s UOI
Section 66 A of eh I.T. Act: UOI

Section 13 of
The following laws / sections the POCSO
Section 134 of Sections 66 A
were amended / passed to Act, 2012 Section 376
the Indian and 66 B of the
combat pornography of an was passed of the Indian
Evidence Act, I.T. (Amendment)
aggravated to deal with Penal Code
1872 Act, 2008
form: such
offences

in case of As soon as
cognizable non-
after receiving
After receiving offence after cognizable
authority from Sr.
When to start investigation: permission from lodging of the offence is
Inspector of
Cyber Cell FIR under brought to
Police
Section 154 the notice of
of Cr. P. C. Police

Which Section deals with cyber


66 B 66 C 66 D 66 F
terrorism ?
IT Act 2000, amended in 2005 2008 2011 2015

Page 2 of 14
MCQ Questions for CYBER SECURITY LEVEL-2 (SEC): S.Y.BCA Sem-4: A.Y.: 2023-24

Question Option1 Option2 Option3 Option4

Indian Indian
Indian
Indian Computer Cyber
Commercial
ICERT stands for : Commercial and Emergency Emergency
Emergency
Economical Response Response
Response Team
Team Team
International Internet
Internet Service Internet Sample
What is an ISP ? Service Service
Provider Provider
Provider Passenger
A patent is an exclusive right
granted by a ______ to the
Country Government District World
owner of an invention to make,
use, manufacture.
International
International International International
Secondary
ISO stands for : Organization for Service Security
Organizatio
Standardization Organization Organization
n
Under which section of IT Act,
stealing any digital asset or
65 65 D 67 70
information is written a cyber-
crime.

Page 3 of 14
MCQ Questions for CYBER SECURITY LEVEL-2 (SEC): S.Y.BCA Sem-4: A.Y.: 2023-24

Question Option1 Option2 Option3 Option4


What is the punishment in India
3 years of
for stealing computer 6 months of 1 year of 2 years of
imprisonme
documents, assets or any imprisonment imprisonment and imprisonment
nt and a fine
software’s source code from any and a fine of Rs. a fine of Rs. and a fine of
of Rs.
organization, individual, or from 50,000 100,000 Rs. 250,000
500,000
any other means?
What type of cyber-crime, its
Cracking or Stealing
laws and punishments does Putting antivirus
illegally hack into Stealing data hardware
section 66 of the Indian IT Act into the victim
any system components
holds?
_______ is an application of
Risk and
information and communication Electronic Governance
Governance Governance
technology (ICT) for delivering Governance and Ethics
.
Government Service.
Every appeal to Cyber Appellate
Tribunal shall be filed within a 60 days 90 days 45 days 30 days
period of _____.
Which are the Sections of IT Act
42, 67, 67 A, 67 43, 66, 66 C,
that deal with credit card fraud ? 66, 66 C, 66 D None
B 66 B
(66c)
Computer
Computer
Computer forensics also known Digital forensic forensics
Computer crime forensic
as? science investigation
science
s

Page 4 of 14
MCQ Questions for CYBER SECURITY LEVEL-2 (SEC): S.Y.BCA Sem-4: A.Y.: 2023-24

Question Option1 Option2 Option3 Option4


Which of the following is NOT
Enhanceme
the focus of digital forensic Authenticity Comparison Proving
nt
analysis?
Stop the Continue
If, while searching a computer Abandon the search and with the
Continue with the
for evidence of a specific crime, original search, obtain a original
original search
evidence of a new, Unrelated and pursue the warrant that search,
but also pursue
crime is discovered, the best new line of addresses ignoring the
the new inquiry
course of action is: investigation the new new
inquiry information
A procedure to Hacking
Collection of Searching
Investigation means : find the Digital computer
information over internet
Evidence systems

Page 5 of 14
MCQ Questions for CYBER SECURITY LEVEL-2 (SEC): S.Y.BCA Sem-4: A.Y.: 2023-24

Question Option1 Option2 Option3 Option4

The application of
computer science
and investigative
procedures for a Use of
legal purpose science or
A process
involving the technology
where we
Process of using analysis of digital in the
develop and
scientific evidence after investigation
test
knowledge in proper search and
What Is Digital Forensic? hypotheses
analysis and authority, chain of establishme
that answer
presentation of custody, nt of the
questions
evidence in court validation with facts or
about digital
mathematics, use evidence in
events
of validated tools, a court of
repeatability, law
reporting, and
possible expert
presentation

Page 6 of 14
MCQ Questions for CYBER SECURITY LEVEL-2 (SEC): S.Y.BCA Sem-4: A.Y.: 2023-24

Question Option1 Option2 Option3 Option4

___________ includes the


identification, recovery,
investigation, validation and
Cyber Cyber
presentation of facts regarding Digital Forensic Analog forensic
forensic Security
digital evidence found on
computer and similar storage
media devices.
Digital
Digitalized Direct
Digital Foreign Forensic
The full form of DFI is : Forensic Forensic
Investment Investigatio
Investigation Investigation
n
IPSec is designed to provide Application Session
Transport layer Network layer
security at the _________ layer layer
In tunnel mode, IPSec protects
Entire IP packet IP header IP payload IP trailer
the ______
Encapsulating Internet key
Which component is included in Authentication All of the
Security Payload Exchange
IP security? Header (AH) mentioned
(ESP) (IKE)
Pretty good privacy (PGP) is WiFi
Browser security Email security FTP security
used in ______ security
Virtual Virtual
Visual Private Virtual Protocol
VPN is abbreviated as _____ Private Protocol
Network Network
Network Networking

Page 7 of 14
MCQ Questions for CYBER SECURITY LEVEL-2 (SEC): S.Y.BCA Sem-4: A.Y.: 2023-24

Question Option1 Option2 Option3 Option4


A ______ can hide a user’s Incognito
Firewall Antivirus VPN
browsing activity. mode
__________ masks your IP Incognito
Firewall Antivirus VPN
address. mode
_________ are also used for Incognito
Firewall Antivirus VPN
hides user’s physical location. mode
Encrypts
Hide our
Access sites that Compromise our local
Using VPN, we can access personal
are blocked other’s system drive files
_______________ data in the
geographically remotely while
cloud
transferring
What are the major components
Alert All of the
of the intrusion detection Analysis Engine Event provider
Database mentioned
system?
What are the different ways to Host & Network Network &
Zone based Level based
classify an IDS? based Zone based
Cost of Real time
What are strengths of Network Malicious intent All of the
ownership detection and
based IDS? detection mentioned
reduced response

No additional
What are the strengths of the Attack System specific All of the
hardware
host based IDS? verification activity mentioned
required

Page 8 of 14
MCQ Questions for CYBER SECURITY LEVEL-2 (SEC): S.Y.BCA Sem-4: A.Y.: 2023-24

Question Option1 Option2 Option3 Option4


Series
Serial Session Secure Socket Session
The full form of SSL is Socket
Layer Layer Secure Layer
Layer
In the SSL Protocol, each upper
layer message if fragmented
2^16 2^32 2^14 2^12
into a maximum of __________
bytes.
In TLS padding cann be upto a none of the
79 bytes 127 bytes 255 bytes
maximum of – mentioned
Number of phases in the
2 3 4 5
handshaking protocol?

There are the following


statements that are given below,
which of them are correct about
HTTPS?
A. HTTPS is the extended
version of HTTP.
B. HTTPS is used for secured A&B A&C A, B & C A, B, C & D
communication between the
web browser and web server.
C. HTTPS stands for HyperText
Transfer Protocol Secure.
D. HTTPS also provides anti-
virus security for the website.

Page 9 of 14
MCQ Questions for CYBER SECURITY LEVEL-2 (SEC): S.Y.BCA Sem-4: A.Y.: 2023-24

Question Option1 Option2 Option3 Option4

Which of the following protocols


are used with HTTPS for SSL TLS Both None
security mechanism?
Netscape
Who was invented HTTPS? Oracle Google Communicati Microsoft
ons
In which year HTTPS was
1991 1994 1997 1999
invented?
To encrypt data
To secure To prevent
transmitted To protect
What is the primary purpose of user SQL
between a web against DDoS
SSL/TLS in web security? authenticatio injection
server and a attacks.
n attacks.
browser
Which protocol is typically used
for securing email HTTP Telnet FTP SMTP
communication?
To encrypt data
To secure To enable
To serve as a transmitted
What is the primary purpose of user cross-origin
backup protocol between a web
HTTPS in web security? authenticatio resource
for HTTP server and a
n sharing
browser

Page 10 of 14
MCQ Questions for CYBER SECURITY LEVEL-2 (SEC): S.Y.BCA Sem-4: A.Y.: 2023-24

Question Option1 Option2 Option3 Option4


Encrypted
improve
What is the main advantages of Faster data Strong password data
server
using HTTPS over HTTP? transmission policies transmissio
performance
n
Which certificate authority is
responsible for issuing and Certificate Browser
ICANN IANA
validating SSL/TLS certificates Authority (CA) Forum
for websites?
Which encryption method is
commonly used in SSL/TLS to RSA AES DES SHA-1
secure data transmission?
Thorough
What does TLS stand for in the Trusted Link Transport Layer The Lasting
Layered
context of web security? Security Security Security
Security
Which port number is commonly
21 25 80 443
associated with HTTPS traffic?
They are free
They may
They are issued and
They provide the trigger
Which statement is true about by trusted commonly
highest level of security
sell-signed SSL certificates? Certificate used in
security warnings in
Authorities (CAs) production
browsers
websites
Which key is used for encryption Intermediat
Public key Private Key Session key
in SSL/TLS? e key

Page 11 of 14
MCQ Questions for CYBER SECURITY LEVEL-2 (SEC): S.Y.BCA Sem-4: A.Y.: 2023-24

Question Option1 Option2 Option3 Option4


Which cryptographic protocol is
used for securing email SSH TLS HTTP DNS
communication?
Which organization is
responsible for the development
W3C IETF ISO ITU-T
and maintenance of the
SSL/TLS protocols?

Pretty good privacy PGP(Pretty None of the


Browser security Email security FTP security
Good Privacy) is used in mentioned
L0phtCrack is formerly known
LC4 LC3 None
as______. LC2
Web vulnerabilities tool Nikto Full support for None of
Both a and b
support for SSL
Supports full HTTP Proxy these
John the ripper is highly support
DOS Unix OpenVAS
to Win32
Full HTTP
Cross platform ,
SSL support, HTML proxy
SSL support,
Full HTTP proxy support, SSL support,
WML Support,
Nikto support to attribute support, Easily support, Cross
Easily updated
updated via Cross platform,
via command
command line. platform. HTML
line.
support

Page 12 of 14
MCQ Questions for CYBER SECURITY LEVEL-2 (SEC): S.Y.BCA Sem-4: A.Y.: 2023-24

Question Option1 Option2 Option3 Option4


User friendly static Password John The
L0phtCrack THC Hydra Ophcrack
Cracking Tool Ripper
Report Session
Zed Attack Proxy support for Auto tagging.
generation. comparison. All of these
Which of the below-mentioned
scanner is used for Web Nmap Superscan Nikto OpenVAS
applicationsecurity scanner.
One of the following deal with
network intrusion detection and Zed Attack Snort HTC-Hydra Wireshark
trafficanalysis
HTML
WML
SSL support, Cross platform , support, SSL
Support,
Full HTTP proxy Interaction support,
w3af support to attribute Cross
support, Scans among plugins , Scans
platform ,
multiple ports. WML Support. multiple
nmap.
ports.
One of the following Tool used
for encrypted passwords based John The
THC Hydra. Lophtcrack. Ophcrack.
onvaries hashes are up to be Ripper.
broken.
An easy to use web application Zed Attack None of
John the Ripper. THC-Hydra.
pen testing. Proxy. these.

Page 13 of 14
MCQ Questions for CYBER SECURITY LEVEL-2 (SEC): S.Y.BCA Sem-4: A.Y.: 2023-24

Question Option1 Option2 Option3 Option4


Add custom Full HTTP
One of the following feature Stapling Cookie
headers to proxy
support for Nikto tool. vulnerability. handling.
requests. support.
Which of the following is not a
HTTPS SSL SMTP SFTP
strong security protocol?
Which of the following is not a
Mail using
secured mail transferring POP3 SSMTP S/MIME
PGP
methodology?
MAC MAC
MAC (Message
In SSL, what is used for MAC (Message (Machine (Machine
Authentication
authenticating a message? Access Code) Authenticatio Access
Code)
n Code) Code)
__________ is used for
IPSec HTTPS SMTP S/MIME
encrypting data at network level.
Walk-in
Which of them is not an Break-in and using
Phishing Sneak-in
example of physical hacking? steal piggybackin
g
Brute Force attack is _______ Fast Inefficient Slow Complex
In _______________ attacks an
attacker do not contact with non-
passive online active online offline
authorizing party for stealing electronic
password.

Page 14 of 14

You might also like