Information Technology and Cyber law questions and answers for competitive examination. (Part-6)

onlinepsc,gst,india,kerala, UPSC, KERALA PSC, RAILAWAY, competitive examination

Online Examination

UPSC/PSC/BANK/RAILWAY,etc. examination questions

Questions about Information Technology (Part-6) including Kerala Administrative Service (KAS), Secretariat Assistant, Panchayath Secretary, BDO, Auditor, Assistant, LDC and LGS examination level questions. You need a lot of experience in taking an online exam.

Question1:-Cyber terrorism

which has domestic as well as international attack,like social, ideological,religious, political or nation related objects.

Question2:-Dumpster Diving

Simple type of security attack, information collected from material have been thrown away. all kind for information turn up in the trash.


Information collected from network or telephone wiring.


One person uses the identity of another to gain access to a computer.

Question5:-Trap door or back door

one software attack,a trap door is a quick way into a program it allows program developers to bypass all of the security built into the program now or in the future.

Question6:-Data Diddling

False data entry, involves modiflying data before or after it is entered into the computer.


Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, group, or organization. It may include false accusations, defamation, slander and libel. It may also include monitoring, identity theft, threats, vandalism, solicitation for sex, or gathering information that may be used to threaten, embarrass or harass.

Question8:- what is IDS

Intrusion Detection System

Question9:-What is IPS

Intrusion Preventions System

Question10:- Intellectual property rights

Intellectual property rights are legal concept that refers rights to owners and creators of the work, for their intellectual creativity.

Question11:-computer related offences is under it act____________ section

section 66

Question12:-Penalty and compensation for damage to computer, computer system is in IT act ___________ section

Section 43

Question13:- Tamering with computer source document is in IT act _______________ section

Section 65

Question14:-Punishment for sending offensive message through communication service is in IT act ___________ section

Section 66A

Question15:-Punishment for cheating by personation by using computer resource in IT act _____________ section

Section 66D

Question16:-Punishment for publishing or transmitting obscene material in electronic form in IT act _________ section

Section 67

Question17:-Punishment for publishing or tranmitting of material containing sexually explicit act in electroninct for is in IT act ____________ section

Section 67A

Question18:-Punishment for publishing or transmitting of material depicting cildren in sexually explicit in electronic form is in IT Act _________ section

Section 67B

Question19:-Indian computer Emergency Response team to serve as national agency for incident response is in IT Act __________ section

Section 7B

Question20:-"Select * from user" how to work this SQL command

retrieve / display all the information in the user table

Question21:-File carving

It is a tool for characteristics of certain file types in an effort to salvage deleted files

Question22:-No person can insist that his documents should be accepted in electronic form only, comes under _____section of IT Act

Section 9

Question23:-Central Government has power to make rules related with digital signature , comes under _____section of IT Act

Section 10

Question24:-Virus attacks and Denial of service attack, Logic bomb, comes under _____section of IT Act .

Section 43

Question25:-Corporate firm have the responsibility of protect their data from hackers, comes under _____section of IT Act 2008

Section 43A

Question26:-Tampering a computer by destroying or altering its source code or program is a crime, , comes under _____section of IT Act 2008

Section 65

Question27:-Hacking, e-mail bombing, logic bomb, salami attack, , comes under _____section of IT Act 2008?

Section 66

Question28:- Sending offensive and false message , comes under _____section of IT Act 2008

Section 66A

Question29:- Recieving stolen computer resources, comes under _____section of IT Act 2008

Section 66B

Question30:-Identity theft , comes under _____section of IT Act 2008

Section 66C

Question31:- Cheating by personation by using computer or electronic reources, comes under _____section of IT Act 2008

Section 66D

Question32:- Violation of Privacy, comes under _____section of IT Act 2008

Section 66E

Question33:- Cyber terrorism, comes under _____section of IT Act 2008

Section 66F

Question34:- Ponography, comes under _____section of IT Act 2008

Section 67

Question35:- The ISP' should preserve the information related to urser activity and retain such evidence before the pollice officers, comes under _____section of IT Act 2008

Section 67C

Question36:- Central or State government can monotor information being trasmitted through a computer, comes under _____section of IT Act 2008

Section 69

Question38:-Power to Central government blocking a website, comes under _____section of IT Act 2008

Section 69A

Question39:-Power to central Government to collect information / data stored in computer, comes under _____section of IT Act 2008

Section 69B

Question40:-Prevent unauthorized access to a protected system, comes under _____section of IT Act 2008

Section 70

Question41:- India CERT-IN has been appointed as the national nodal agency for maintining cyber security, comes under _____section of IT Act 2008

Section 70B

Question42:- CERT-K

Nodal agency of CERT-IN


Computer Emergency Response Team-India

Question44:- Misrepresentation of data or information, comes under _____section of IT Act 2008

Section 71

Question45:-punishment for disclosure of information , comes under _____section of IT Act 2008

Section 72

Question46:- Publishing false digital signature certificate, comes under _____section of IT Act 2008

Section 73

Question47:-IT act is applicable not only for indian Citizen but also foreigners, comes under _____section of IT Act 2008

Section 75

Question48:- Power of investigation under the act from DSP to Inspector Lever, comes under _____section of IT Act 2008

Section 78

Question49:-It provides any police offcer above the rank of inspector or any authorized office of central government and state government can enter and serach a public place, comes under _____section of IT Act 2008

Section 80

Question50:-Cyber regulation advisory committee, comes under _____section of IT Act 2008

Section 88


Open type font file

Question52:-.asp and .aspx

Active Server Page file


Internet security certificate


Cascading Style Sheet file

Question55:-.htm and .html

HTML file


Java Server Page file

Question57:- .js

JavaScript file


PHP file (Hypertext Preprocessor)


Really Simple Syndication, RSS


eXtensible HyperText Markup Language, XHTML


Java class file


Visual C# source code file

Question63:- .cpp

C++ source code file


C and C++ source code file


C, C++, and Objective-C header file

Java Source code file


Visual Basic file


Microsoft Excel file


Microsoft Excel Open XML spreadsheet file


OpenOffice Calc spreadsheet file ( equivalent to excel)


Backup file


Windows Control panel file


Configuration file

Windows Cabinet file


Windows cursor file


- DLL file (Dynamic Link Library)


Device driver file


Initialization file


Windows system file


Temporary file


Windows installer package


Motion Picture Experts Group (MPEG)- MPEG4 video file

Question83:-.mpg or .mpeg

MPEG video file


Matroska Multimedia Container (video file)

Question85:- .avi

Audio Video Interleave, AVI


Adobe Flash file


Windows Media Video file


PDF file

Question89:-.doc and .docx

Microsoft Word file


OpenOffice Writer document file (exquvalent to word)


Plain text file


Real Text File


OpenOffice Impress presentation file (equivalent to power point)


Chrome Extension


Access 2007 Database File


Installation file


Outlook Profile File




Microsoft Word Open XML Document


Microsoft Excel Open XML Spreadsheet