Computer Information Technology Part-7

Total Questions: 54

1. Virtual Keyboards protect the computer against : [M.P. P.C.S. (Pre) 2021]

Correct Answer: (d) All of the above
Note:

A virtual keyboard is a software component that allows the input of characters without the need for physical keys. The interaction with the virtual keyboard happens mostly via a touchscreen interface, but can also take place in a different form in virtual or augmented reality. Virtual keyboards may be used to reduce the risk of keystroke logging. When entering private data (for example, your login and password for an online banking account) from a regular keyboard, there is always a risk of data interception by some spyware. Such programs record the keys pressed on the keyboard and therefore capture the data entered from the regular keyboard to pass it to the malefactor. Thus, virtual keyboards may protect the computer against Password theft, Trojan programs and Spyware. However, a virtual keyboard cannot protect your personal data if a site that requires entering such data was hacked. In this case, the information goes directly to the malefactors.

2. Cybercrime is : [M.P.P.C.S. (Pre) 2012]

Correct Answer: (d) All of the above
Note:

Hacking, stalking and denial of service attacks all are considered as a cybercrime. Hacking is the practice to crack into someone else's system or otherwise using a programming or expert knowledge to act maliciously. Cyberstalking is the use of the internet or other electronic means to stalk or harass an individual, a group or an organization. Denial of service attack is an attempt to make a machine or network resource unavailable to its intended users.

3. Which of the following is not a cybercrime? [M.P.P.C.S. (Pre) 2019]

Correct Answer: (d) Online Chatting
Note:

Among the given options online chatting is not a cybercrime, while phishing (the fraudulent attempt to obtain sensitive information such as username, passwords and debit/credit card details by disguising oneself as a trustworthy entity in an electronic communication), cyber stalking and identity theft are considered as cybercrime.

4. Which of the following is a type of cyber attack that involves tricking users into revealing sensitive information? [M.P. P.C.S. (Pre) 2023]

Correct Answer: (a) Phishing attack
Note:

Phishing is a type of cyber attack that involves tricking users into revealing sensitive information such as username, passwords, debit/credit card details etc.

5. An e-mail that appears to originate from one source but actually has been sent from another : [M.P. P.C.S. (Pre) 2021]

Correct Answer: (b) Spoofing
Note:

In the context of information security, and especially network security, a spoofing attack is a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage. Spoofing is a type of scam in which a criminal disguises an email address, display name, phone number, text message, or website URL to convince a target that they are interacting with a known, trusted source. Email spoofing is a technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust.

6. Which of the following are the two essential features of cybercrime? [M.P. P.C.S. (Pre) 2018]

Correct Answer: (b) Offender computer skills and victim ignorance of computer technology
Note:

The cybercriminals are well skilled in computers, and victims are totally ignorant relating to techniques of computer technology.

7. The feature(s) of cybersecurity is/are: [M.P. P.C.S. (Pre) 2022]

Correct Answer: (d) All of the above
Note:

Compliance, defence against internal threats, and threat prevention — all these are features of cybersecurity. The main essential features of cybersecurity are:

  1. Coverage for external threats
  2. Defence against internal threats
  3. Regulatory compliance for security
  4. Cloud-based security services
  5. Threat detection, prevention, and response
  6. Consolidated solutions
  7. Proper security analytics

8. First cyber law which provides the legal infrastructure for e-commerce in India is: [M.P.P.C.S. (Pre) 2019]

Correct Answer: (b) The Information Technology Act, 2000
Note:

First cyber law which provides the legal infrastructure for e-commerce in India is the Information Technology Act, 2000. It was enacted on 9 June 2000 and commenced on 17 October 2000. It provides a legal framework for electronic governance by giving recognition to electronic records and digital signatures. It also defines cybercrimes and prescribes penalties for them.

9. In India, it is legally mandatory for which of the following to report on cybersecurity incidents? [I.A.S. (Pre) 2017]

  1. Service providers
  2. Data centers
  3. Body corporate

Select the correct answer using the code given below:

Correct Answer: (d) 1, 2 and 3
Note:

In India, section 70-B of the Information Technology Act, 2000 empowers the Central Government to set up a government agency named 'Indian Computer Emergency Response Team' (CERT-In). In pursuance of this provision, the Central Government has issued 'Information Technology Rules, 2013' in which the CERT-In work methods and places etc. are mentioned. These rules impose the obligation to report cybersecurity incidents within a reasonable time on service providers, intermediaries, data centers, and corporate bodies, so that CERT-In can take immediate action on it.

10. In India, under cyber insurance for individuals, which of the following benefits are generally covered, in addition to payment for the loss of funds and other benefits? [I.A.S. (Pre) 2020]

  1. Cost of restoration of the computer system in case of malware disrupting access to one's computer
  2. Cost of a new computer if some miscreant willfully damages it, if proved so
  3. Cost of hiring a specialized consultant to minimize the loss in case of cyber extortion
  4. Cost of defence in the Court of Law if any third party files a suit

Select the correct answer using the code given below:

Correct Answer: (b) 1, 3 and 4 only
Note:

Cyber insurance is a sub-category of general insurance that covers businesses and individuals against internet-based liability and risks. There are generally two levels of cyber security coverage : first-party and third-party. First-party coverage encompasses direct losses to an organization or individual, whereas third-party coverage extends to claims and legal action taken by customers or partners. In India,under cyber insurance for individuals, any damage or destruction to any tangible property is not covered. Hence,cost of a new computer if some miscreant wilfully damaged it, is not generally covered under individual cyber insurance policy. These policies provide only restoration costs of individual's computer due to damage caused by malware or any other cyber attack. Benefits given in the other options are generally covered under the cyber insurance policy for individuals in India.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *