RANGE FOREST OFFICER EXAM- IT AND CYBER LAW QUESTIONS AND ANSWERS

RANGE FOREST OFFICER EXAM- IT AND CYBER LAW QUESTIONS AND ANSWERS


1.The use of the Internet or other electronic means to stalk or harass an invidual, a group of individuals, or an organisation is termed:
(a)Cyberspace 
(b)Cyberstalking 
(c)Pornography 
(d)None of these
Ans. Cyberstalking

2. The explicit portrayal of sexual subject matter is termed:
(a)Pornography 
(b)Spamming 
(c)Junking 
(d)None of these
Ans. Pornography 

3. Which of the following is a cyber crime?
(a)Hacking 
(b)Worm attack 
(c)Virus attack 
(d)All of these
Ans. All of these

4. .......... Refers to email that appears to have been originated from one source when it was actually sent from another source.
(a)Email bombing 
(b)Email spoofing 
(c)Email spamming 
(d)None of these
Ans. Email spoofing 

5. A program that has capability to infect other programs and make copies of itself and spread into other programs is called:
(a)Worm 
(b)Virus 
(c)Trojan 
(d)None of these
Ans. Virus 

6. A type of cyber crime that occurs in pay per click online advertising when a person, automated script or computer program imitates a legitimate user of a web browser clicking on an ad, for the purpose of generating a charge per click without having actual interest in the target of the ad’s link.
(a)Phishing 
(b)Zombie 
(c)Click fraud 
(d)None of these
Ans. Click fraud 

7. In cyber law terminology ‘DoS’ means:
(a)Denial of Service 
(b)Disc operating System 
(c)Distant operator Service 
(d)None of these
Ans. Denial of Service 

8. The Indian Parliament passed the Information Technology Bill, which is regarded as the mother legislation regulating the use of computers, computer systems and computer networks as also data and information in the electronic format, in the year:
(a)2000
(b)2001
(c)2002
(d)2003
Ans. 2000 

9. The seat of the Asian School of Cyber Laws:
(a)New Delhi 
(b)Pune 
(c)Chennai 
(d)Hyderabad 
Ans. Pune 

10. Which of the following is an example of ‘denial of service attack’?
(a)Attempts to “flood” a network, thereby preventing legitimate network traffic 
(b)Attempts to disrupt connections between two machines, thereby preventing access to a service 
(c)Attempts to prevent a particular individual from accessing a service 
(d)All of these
Ans. All of these


11. .......... Is a computer connected to the internet that has been compromised by a hacker, computer virus or jrojan horse and can be used to perform malicious tasks of one sort of another under remote direction.
(a)Server 
(b)Zombie 
(c)Symbian 
(d)None of these
Ans. Zombie 

12. Which one of the following is not an example of ‘using computer as a weapon’?
(a)Cyber Terrorism 
(b)IPR violations 
(c)Credit and Frauds 
(d)All of these
Ans. All of these

13. .......... refers to sending email to thousands and thousands of users-similar to a chain letter.
(a)Email spamming 
(b)Email bombing 
(c)Trojan attack 
(d)None of these
Ans. Email spamming 

14. According to a report on crimes in India in 2011, published by the National Crime Records Bureau, the largest number of cyber crimes were registered in:
(a)Maharashtra
(b)Uttar Pradesh 
(c)Karnataka 
(d)Andra Pradesh 
Ans. Andra Pradesh 

15. By hacking web server taking control on another persons website called as web ..........
(a)Spoofing 
(b)Hijacking 
(c)Spamming 
(d)None of these
Ans. Hijacking 

16. Programs that multiply like viruses but spread from computer to computer are called as:
(a)Worms 
(b)Virus 
(c)Boot 
(d)None of these
Ans. Worms 

17. The attempt to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication is termed:
(a)Spamming 
(b)Phishing 
(c)Spoofing 
(d)None of these
Ans. Phishing 

18. Which agency made the investigation related to India’s First Cyber Crime Conviction?
(a)Mumbai Police 
(b)Chennai Police 
(c)CBI
(d)Kerala Police 
Ans. CBI

19. Which one of the following is an example of E-mail and Internet Relay Chat (IRC) related crimes?
(a)Email spoofing 
(b)Email spamming 
(c)Email bombing 
(d)All of these
Ans. All of these

20. .......... Is characterized by abusers repeatedly sending an identical email message to a particular address:
(a)Email Spoofing 
(b)Email Spamming 
(c)Email Bombing 
(d)None of these
Ans. Email Bombing

Post a Comment

0 Comments
* Please Don't Spam Here. All the Comments are Reviewed by Admin.

buttons=(Accept !) days=(20)

Our website uses cookies to enhance your experience. Learn More
Accept !