Cyber Law Multiple Choice Questions (MCQs) & Answers (2022)

by Pulakesh Nath

Cyber Law Multiple Choice Questions(MCQs)& AnswersCyber Law

Cyber Law or IT Law is the law regarding Information-technology whichincludes computers and internet. Cyber Law is related to legal informaticsand supervises the digital circulation of information, software,information security and e-commerce.


    • 0.1Importance of Cyber Law:
    • 0.2 Areas of Cyber Law:
  • 1What are the Advantages of Cyber Law?
    • 1.1 Share this:

Importance of Cyber Law:

  1. It covers all transaction over internet.
  2. It keeps eyes on all activities over internet.
  3. It touches every action and every reaction in cyberspace.

Areas of Cyber Law:

The major areas of cyber law include:


Consumers depend on cyber laws to protect them from online fraud. Laws aremade to prevent identity theft, credit card theft and other financialcrimes that happen online. A person who commits identity theft may faceconfederate or state criminal charges.


Copyright violation is an area of cyber law that protects the rights ofindividuals and companies to profit from their own creative works.


Defamation laws are civil laws that save individuals from fake publicstatements that can harm a business or someone’s personal reputation. Whenpeople use the internet to make statements that violate civil laws iscalled Defamation law.

Harassment and Stalking:

When a person makes threatening statements again and again about someoneelse online, there is violation of both civil and criminal laws. Cyberlawyers both prosecute and defend people when stalking occurs using theinternet and other forms of electronic communication.

Freedom of Speech:

Cyber lawyers must advise their clients on the limits of free speechincluding laws that prohibit obscenity. Cyber lawyers may also defend theirclients when there is a debate about whether their actions consist ofpermissible free speech.

Trade Secrets:

Companies doing businesses online often depend on cyber laws to protecttheir trade secrets. They spend a great deal of time developing otherfeatures like maps, intelligent assistance and flight search services toname a few. Cyber laws help these companies to take legal action asnecessary in order to protect their trade secrets.

Contracts and Employment Law:

Every time you click a button that says you agree to the terms andconditions of using a website, you have used cyber law. There are terms andconditions for every website that are somehow related to privacy concerns.

What are the Advantages of Cyber Law?

  1. Organizations are now able to carry out e-commerce using the legalinfrastructure provided by the Act.
  2. Digital signatures have been given legal validity and sanction in the Act.
  3. It has opened the doors for the entry of corporate companies forissuing Digital Signatures Certificates in the business of beingCertifying Authorities.
  4. It allows Government to issue notification on the web thus heraldinge-governance.
  5. It gives authority to the companies or organizations to file any form,application or any other document with any office, authority, body oragency owned or controlled by the suitable Government in e-form bymeans of such e-form as may be prescribed by the suitable Government.
  6. The IT Act also addresses the important issues of security, which areso critical to the success of electronic transactions.

1TCP/IP is composed of _______ number of layers.





Answer: 4

2Trusted TCP/IP commands have the same needs & go through the identical verification process.Which of them is not a TCP/IP command?





Answer: tcpexec

3Connection authentication is offered for ensuring that the remote host has the likely InternetProtocol (IP) ___________ & _________

Aaddress, name

Baddress, location

Cnetwork, name

Dnetwork, location

Answer:address, name

4Application layer sends & receives data for particular applications using Hyper Text TransferProtocol (HTTP), and Simple Mail Transfer Protocol (SMTP).



Answer: True

5TLS vulnerability is also known as Return of Bleichenbacher’s Oracle Threat.



Answer: True

6RoBOT is abbreviated as ___________

AReturn of Bleichenbacher’s Oracle Team

BRise of Bleichenbacher’s Oracle Threat

CReturn of Bleichenbacher’s Operational Threat

DReturn of Bleichenbacher’s Oracle Threat

Answer: Return of Bleichenbacher’s Oracle Threat

7There are __________ different versions of IP popularly used.





Answer: 2

8____________ is an attack where the attacker is able to guess together with the sequencenumber of an in progress communication session & the port number.

ATCP Spoofing

BTCP Blind Spoofings

CIP Spoofing

DIP Blind Spoofing

Answer: TCP Blind Spoofings

9___________ is an attack technique where numerous SYN packets are spoofed with a bogussource address which is then sent to an inundated server.

ASYN flooding attack

BACK flooding attack

CSYN & ACK flooding attack

(Video) Top 40 MCQ's on Cyber Law and Ethics | RGPV Exam - Prof Ayushi Arzare

DPacket flooding attack

Answer: SYN flooding attack

10Unintentional data leakage can still result in the same penalties and reputational damage.




11Which of them is not an attack done in the network layer of the TCP/IP model?

AMITM attack

BDoS attack

CSpoofing attack

DShoulder surfing

Answer: Shoulder surfing

12Which of them is not an appropriate method of router security?

Answer: Routing protocol needs to be programmed by security experts

13Which 2 protocols are used in the Transport layer of the TCP/IP model?





Answer:TCP and UDP

14Which of the protocol is not used in the network layer of the TCP/IP model?





Answer: HTTP

15____________ protocol attack is done in the data-link layer.






16_____________ is the illicit transmission of data from inside an organization or personal system toan external location or recipient.

ADatabase hacking

BData leakage

CData cracking

DData revealing

Answer: Data leakage

17Data leakage threats do not usually occur from which of the following?

AWeb and email

BMobile data storage

CUSB drives and laptops


Answer: Television

18Data leakage is popularly known as ___________

Adata theft

Bdata crack

Clow and slow data theft

Dslow data theft

Answer: low and slow data theft

19There are __________ major types of data leakage.





Answer: 3
(Video) Cyber Laws | TYIT | MCQ Important questions

20“Unauthorized” data leakage doesn’t essentially mean intended or malicious.



Answer: True

21________________ helps in protecting businesses against data breaches that may make threats tocloud.


BMailbox Exchange Recovery



Answer: Centrify

22__________ is a popular corporate security tool that is used to detect the attack on email with cloudonly services.

ACain and Abel


CAngry IP Scanner


Answer: Proofpoint

23_____________ helps in protecting corporate data, communications and other assets.



CBurp Suit



24_________ framework made cracking of vulnerabilities easy like point and click.





Answer: Metasploit

26__________ is a popular tool used for discovering networks as well as in security auditing.




DBurp Suit

Answer: Nmap

27Which of this Nmap do not check?

Aservices different hosts are offering

Bon what OS they are running

Cwhat kind of firewall is in use

Dwhat type of antivirus is in use

Answer:what type of antivirus is in use

28Which of the following deals with network intrusion detection and real-time traffic analysis?

AJohn the Ripper




Answer: Snort

29Wireshark is a ____________ tool.

Anetwork protocol analysis

Bnetwork connection security

Cconnection analysis

Ddefending malicious packet-filtering

Answer: network protocol analysis

30Which of the below-mentioned tool is used for Wi-Fi hacking?





(Video) Cyber Law MCQs | PGTRB | NTA UGC NET | IT Officers | LIC AAO IT | ISRO & All CS/IT Exams
Answer: Aircrack-ng

31Which of them is not a vulnerability scanning tool?


BNessus Professional


DNikto Web scanner

Answer: Snort

32There are _______ major ways of stealing email information.






33Which of them is not a major way of stealing email information?

AStealing cookies

BReverse Engineering

CPassword Phishing

DSocial Engineering

Answer: Reverse Engineering

34____________ is the method for keeping sensitive information in email communication &accounts secure against unofficial access, loss, or compromise.

AEmail security

BEmail hacking

CEmail protection

DEmail safeguarding

Answer: Email security

35_____________ is a famous technological medium for the spread of malware, facing problems ofspam, & phishing attacks.


BPen drive




36Which of them is not a proper method for email security?

AUse Strong password

BUse email Encryption

CSpam filters and malware scanners

DClick on unknown links to explore

Answer: Click on unknown links to explore

37If a website uses a cookie, or a browser contains the cookie, then every time you visit thatwebsite, the browser transfers the cookie to that website.



Answer: True

38The stored cookie which contains all your personal data about that website can be stolen away by_____________ using _____________ or trojans.

Answer: attackers, malware

39If the data stored in the _____________ is not encrypted, then after cookie stealing, attackers cansee information such as username and password stored by the cookie.




Dhard drive


40Which of the following is a non-technical type of intrusion or attack technique?

AReverse Engineering

(Video) MCQ Questions Cyber Security Cyber Laws It Laws 1 with Answers

BMalware Analysis

CSocial Engineering

DMalware Writing

Answer: Social Engineering

41Aircrack-ng is used for ____________

AFirewall bypassing

BWi-Fi attacks

CPacket filtering

DSystem password cracking

Answer: Wi-Fi attacks

42_____________ is a popular IP address and port scanner.

ACain and Abel


CAngry IP Scanner


Answer: Angry IP Scanner

43_______________ is a popular tool used for network analysis in multiprotocol diverse network.



CBurp Suit


Answer: EtterPeak

44____________ scans TCP ports and resolves different hostnames.






45___________ is a web application assessment security tool.





Answer: WebInspect

46Which of the following attack-based checks WebInspect cannot do?

Across-site scripting

Bdirectory traversal

Cparameter injection

Dinjecting shell code

Answer: injecting shell code

47________ is a password recovery and auditing tool.



CNetwork Stumbler



48L0phtCrack is formerly known as LC3.



Answer: False

49___________ is a weakness that can be exploited by attackers.

ASystem with Virus

BSystem without firewall

CSystem with vulnerabilities

DSystem with a strong password

Answer: System with vulnerabilities

50_________ is the sum of all the possible points in software or system where unauthorized users canenter as well as extract data from the system.

AAttack vector

BAttack surface

CAttack point


DAttack arena

Answer: Attack surface


What is cyber crime Mcq? ›

Explanation: When a cyber-criminal steals any computer documents, assets or any software's source code from any organization, individual, or from any other means then the cyber crime falls under section 65 of IT Act, 2000. 12.

Is the example of cyber crime Mcq? ›

Explanation: Phishing, injecting Trojans and worms to individuals comes under peer-to-peer cyber crime. Whereas, leakage of credit card data of a large number of people in deep web comes under computer as weapon cyber-crime.

What is Cyber Security Mcq answer? ›

Cyber security is the protection of systems, programmes, networks, devices, and data from cyber attacks with the help of technology and processes. Its primary aim is to reduce cyber attacks and protect systems, networks, and technologies from unauthorised exploitation.

Who is the father of computer security? ›

August Kerckhoffs: the father of computer security - History | HEC Paris.

What is the full form of ITA 2000? ›


What is Cyber Law PDF? ›

Cyber Law can be defined as law of the web, i.e., it is a part of the legal systems that deals with the Internet, Cyberspace and with other legal issues like online security or online privacy.

What are the types of password attacks? ›

Six Types of Password Attacks & How to Stop Them
  • Phishing. Phishing is when a hacker posing as a trustworthy party sends you a fraudulent email, hoping you will reveal your personal information voluntarily. ...
  • Man-in-the-Middle Attack. ...
  • Brute Force Attack. ...
  • Dictionary Attack. ...
  • Credential Stuffing. ...
  • Keyloggers.

What are hybrid attacks Mcq? ›

An attempt to crack passwords by replacing characters with numbers and symbols. Explanation – Hybrid attacks do crack passwords that are created with replaced characters of dictionary type words.

What type of virus is code red? ›

Code Red was a computer worm observed on the Internet on July 15, 2001. It attacked computers running Microsoft's IIS web server.

What is Trojan Horse Mcq? ›

A Trojan horse:

It is a type of malware that often disguised as a legitimate software. It is used by cyber thieves and hackers to access user systems.

What is the role of firewall Mcq? ›

In every case, the purpose of a firewall is to isolate your trusted internal network (or your personal PC) from the dangers of unknown resources on the Internet and other network connections that may be harmful. The firewall prevents unauthorized access to your internal, trusted network from outside threats.

What are phishing attacks Mcq? ›

Explanation: Phishing is a category of social engineering attack that is used to steal user data. Phishers often develop illegitimate websites for tricking users & filling their personal data.

Which is computer virus? ›

A computer virus is a type of malicious software, or malware, that spreads between computers and causes damage to data and software. Computer viruses aim to disrupt systems, cause major operational issues, and result in data loss and leakage.

What is the full form of malware? ›

Malware is a contraction for “malicious software.” Examples of common malware includes viruses, worms, Trojan viruses, spyware, adware, and ransomware.

Who is the No 1 hacker in world? ›

Kevin Mitnick
Kevin Mitnick speaking at Cyber Incursion event 2018. He spoke about social engineering and its risks for users.
BornKevin David Mitnick August 6, 1963 Van Nuys, California, U.S.
Other namesThe Condor, The Darkside Hacker
7 more rows

What are the 5 types of cyber-attacks? ›

The different types of cyber-attacks are malware attack, password attack, phishing attack, and SQL injection attack.

What is Section 66a of IT Act? ›

(c) any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages, shall be punishable with imprisonment for a term which may extend to three years and with fine. Explanation.

What is purpose of Section 43 of the IT Act? ›

charges the services availed of by a person to the account of another person by tampering with or manipulating any computer, computer system, or computer network, he shall be liable to pay damages by way of compensation to the person so affected.

When was the act first introduced? ›

The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce.

Which country introduced cyber law first? ›

United Kingdom. The Computer Misuse Act 1990 enacted by the United Kingdom on 29 June 1990, and which came into force on 29 August 1990, is an example of one of the earliest such legal enactments.

What was the first cyber law? ›

The Computer Fraud and Abuse Act was the first cyber law, called CFFA, that was enacted in 1986. This law was helpful in preventing unauthorized access to computers.

When was cyber law introduced India? ›

The primary source of cyber law in India is the Information Technology Act, 2000 (IT Act) which came into force on 17 October 2000. The primary purpose of the Act is to provide legal recognition to electronic commerce and to facilitate filing of electronic records with the Government.

Which is the strongest password? ›

Use a mixture of upper- and lowercase; passwords are case sensitive. Use a combination of letters and numbers, or a phrase like "many colors" using only the consonants, e.g., mnYc0l0rz or a misspelled phrase, e.g., 2HotPeetzas or ItzAGurl .

What are rainbow attacks? ›

A rainbow table attack is a type of hacking wherein the perpetrator tries to use a rainbow hash table to crack the passwords stored in a database system. A rainbow table is a hash function used in cryptography for storing important data such as passwords in a database.

What is a VPN Mcq? ›

Explanation: A Virtual Private Network i.e. VPN is a technique used in networking or other intermediate networks for connecting computers and making them isolated remote computer networks, maintaining a tunnel of security and privacy.

What is snort Mcq? ›

Explanation: Snort is a network intrusion detecting application that deals with real-time traffic analysis. As the rules are set and kept updated, they help in matching patterns against known patterns and protect your network.

What are the three types of scanning? ›

Scanning is primarily of three types. These are network scanning, port scanning, and vulnerability scanning.

What is Code Red N? ›

n. 1. A condition of heightened alertness or preparedness, especially to guard against imminent danger.

Who is responsible for cyber security? ›

Although the CIO, or CISO, still carries primary responsibility for cybersecurity in 85% of organisations (1), it is the entire organisation and everyone working in the business who holds the secondary responsibility for it. Cyberattacks can be targeted at anyone in the business.

What is the Zeus virus? ›

The Zeus Trojan is an insidious malware kit commonly used to steal banking information. With millions of Windows computers infected, it's one of the most widespread and successful strains of malware in the history of the internet.

What is CryptoLocker Mcq? ›

What is CryptoLocker? A module of the Windows BitLocker encryption system. A type of encrypted Linux file system. A type of ransomware which encrypts user files and demands payment for the decryption key.

What is spyware Mcq? ›

Explanation: Spyware is harmful software which infiltrates user's system, spy on user's activities, stealing internet usage data & sensitive information of that user. It monitors your internet activity, track login credentials and spy on user's sensitive information.

What is logic bomb in computer? ›

A logic bomb is a malicious program that is triggered when a logical condition is met, such as after a number of transactions have been processed, or on a specific date (also called a time bomb). Malware such as worms often contain logic bombs, behaving in one manner, then changing tactics on a specific date and time.

What is fire wall Mcq? ›

firewalls are network based security measures that control the flow of incoming and outgoing traffic.

What is DMZ in network Mcq? ›

In computer networks, a DMZ, or demilitarized zone, is a physical or logical subnet that separates a local area network (LAN) from other untrusted networks -- usually, the public internet. DMZs are also known as perimeter networks or screened subnetworks.

Which one is a cyber crime? ›

cybercrime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy.

Which is not a cyber crime Mcq? ›

The correct answer is ​Online gaming. Online gaming is not a cybercrime. Spoofing is, in general, fraudulent or malicious behavior. In which communication is sent from an unknown source that displays to the receiver as a known source (Known Source).

What is cyber crime PDF? ›

CYBERCRIME. Cybercrime is defined as crimes committed on the internet using the computer as either a tool or a. targeted victim. It is very difficult to classify crimes in general into distinct groups as many crimes.

Which of the following is not a type of cybercrime Mcq? ›

The Correct answer is Installing antivirus software.

Who is the first cyber criminal in India? ›

In 1992, the first cyber crime appeared wherein the first polymorphic virus was released. In India, one of the very first cases of cyber crime was that of Yahoo v. Akash Arora.

What are the Top 5 cyber crimes? ›

Here are 5 of the top cybercrimes affecting businesses and individuals in 2022:
  • Phishing Scams.
  • Website Spoofing.
  • Ransomware.
  • Malware.
  • IOT Hacking.
17 Aug 2022

What are the 4 types of computer crimes? ›

4 Common Types of Computer Crimes
  • Viruses and Malware. Computer programs and apps rely on coding to function properly. ...
  • Identity Theft. Identity theft and credit card fraud are closely related crimes in which a person steals data and uses it for his or her own purposes. ...
  • Hacking. ...
  • Phishing.
14 Aug 2020

What are phishing attacks Mcq? ›

Explanation: Phishing is a category of social engineering attack that is used to steal user data. Phishers often develop illegitimate websites for tricking users & filling their personal data.

What is purpose of Section 43 of the IT Act Mcq? ›

Chapter IX Section 43 of IT act, 2000 prescribes a penalty for damage to computer or computer system. It is a common thing that happens whenever a computer system is hacked.

Is AES a cybercrime? ›

This is Expert Verified Answer

(ii) AES is not a cybercrime.

What is the scope of cybercrime? ›

Cyber law is associated with all the areas of business which have a technological bend. In this article, we will look at six areas of concern for a cyber law namely, e-commerce, online contracts, business software patenting, e-taxation, e-governance, and cyber crimes.

What are the causes of cybercrime? ›

We have listed some of the reasons :
  • Easy to access computers – Since technology is complex, it has become very difficult to protect the computer from viruses and hackers. ...
  • Size to store computer data in comparatively small space – The computer has got a distinctive feature of storing data in a very small space.
24 Aug 2022

Is phishing a cyber crime? ›

Phishing is a cyber crime that leverages deceptive emails, websites, and text messages to steal confidential personal and corporate information. Victims are tricked into giving up personal information such as their credit card data, phone number, mailing address, company information, etc.

Which act controls cyber offenses? ›

Cybercrimes are covered under Information Technology Act (IT Act) and the Indian Penal Code. The IT Act, 2000, which came into force on October 17, 2000, deals with cybercrime and electronic commerce. The IT Act was later amended in the year 2008. The Act defines cyber crimes and punishments.

WHEN DID IT Act, 2000 came into effect? ›

17 October 2000


1. MCQ Part 1 - Cyber Law and Internet Security
(Bindas Code)
2. Internet & Cyber Laws in Hindi | Best 40 Questions (Part-1) | IT ACT 2000 | Cyber Laws MCQ |
(Arora Educator)
3. Cyber Law | TYIT | Sem 6 | Most Impotant MCQ
(Zeetech Academy)
4. Top 30 CYBER Safety and Crime Multiple Choice Questions MCQ
5. Cyber security MCQ questions and answers pdf download free for interview and exams preparation 2022
6. Advance Computer Network & Cyber law Ethics MCQs | network & cyber law mcqs | The intellect byte.
(The Coding School)

Top Articles

Latest Posts

Article information

Author: Errol Quitzon

Last Updated: 01/06/2023

Views: 6223

Rating: 4.9 / 5 (59 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Errol Quitzon

Birthday: 1993-04-02

Address: 70604 Haley Lane, Port Weldonside, TN 99233-0942

Phone: +9665282866296

Job: Product Retail Agent

Hobby: Computer programming, Horseback riding, Hooping, Dance, Ice skating, Backpacking, Rafting

Introduction: My name is Errol Quitzon, I am a fair, cute, fancy, clean, attractive, sparkling, kind person who loves writing and wants to share my knowledge and understanding with you.