Information Technology and Cyber law questions and answers for competitive examination. (Part-6)

onlinepsc,gst,india,kerala, UPSC, KERALA PSC, RAILAWAY, competitive examination

Online Examination

UPSC/PSC/BANK/RAILWAY,etc. examination questions

Questions about Information Technology (Part-6) including Kerala Administrative Service (KAS), Secretariat Assistant, Panchayath Secretary, BDO, Auditor, Assistant, LDC and LGS examination level questions. You need a lot of experience in taking an online exam.

Question1:-Cyber terrorism



which has domestic as well as international attack,like social, ideological,religious, political or nation related objects.


Question2:-Dumpster Diving



Simple type of security attack, information collected from material have been thrown away. all kind for information turn up in the trash.


Question3:-Wiretapping



Information collected from network or telephone wiring.


Question4:-Masquerading



One person uses the identity of another to gain access to a computer.


Question5:-Trap door or back door



one software attack,a trap door is a quick way into a program it allows program developers to bypass all of the security built into the program now or in the future.


Question6:-Data Diddling



False data entry, involves modiflying data before or after it is entered into the computer.


Question7:-Cyberstalking



Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, group, or organization. It may include false accusations, defamation, slander and libel. It may also include monitoring, identity theft, threats, vandalism, solicitation for sex, or gathering information that may be used to threaten, embarrass or harass.


Question8:- what is IDS



Intrusion Detection System


Question9:-What is IPS



Intrusion Preventions System


Question10:- Intellectual property rights



Intellectual property rights are legal concept that refers rights to owners and creators of the work, for their intellectual creativity.


Question11:-computer related offences is under it act____________ section



section 66


Question12:-Penalty and compensation for damage to computer, computer system is in IT act ___________ section



Section 43


Question13:- Tamering with computer source document is in IT act _______________ section



Section 65


Question14:-Punishment for sending offensive message through communication service is in IT act ___________ section



Section 66A


Question15:-Punishment for cheating by personation by using computer resource in IT act _____________ section



Section 66D


Question16:-Punishment for publishing or transmitting obscene material in electronic form in IT act _________ section



Section 67


Question17:-Punishment for publishing or tranmitting of material containing sexually explicit act in electroninct for is in IT act ____________ section



Section 67A


Question18:-Punishment for publishing or transmitting of material depicting cildren in sexually explicit in electronic form is in IT Act _________ section



Section 67B


Question19:-Indian computer Emergency Response team to serve as national agency for incident response is in IT Act __________ section



Section 7B


Question20:-"Select * from user" how to work this SQL command



retrieve / display all the information in the user table


Question21:-File carving



It is a tool for characteristics of certain file types in an effort to salvage deleted files


Question22:-No person can insist that his documents should be accepted in electronic form only, comes under _____section of IT Act



Section 9


Question23:-Central Government has power to make rules related with digital signature , comes under _____section of IT Act



Section 10


Question24:-Virus attacks and Denial of service attack, Logic bomb, comes under _____section of IT Act .



Section 43


Question25:-Corporate firm have the responsibility of protect their data from hackers, comes under _____section of IT Act 2008



Section 43A


Question26:-Tampering a computer by destroying or altering its source code or program is a crime, , comes under _____section of IT Act 2008



Section 65


Question27:-Hacking, e-mail bombing, logic bomb, salami attack, , comes under _____section of IT Act 2008?



Section 66


Question28:- Sending offensive and false message , comes under _____section of IT Act 2008



Section 66A


Question29:- Recieving stolen computer resources, comes under _____section of IT Act 2008



Section 66B


Question30:-Identity theft , comes under _____section of IT Act 2008



Section 66C


Question31:- Cheating by personation by using computer or electronic reources, comes under _____section of IT Act 2008



Section 66D


Question32:- Violation of Privacy, comes under _____section of IT Act 2008



Section 66E


Question33:- Cyber terrorism, comes under _____section of IT Act 2008



Section 66F


Question34:- Ponography, comes under _____section of IT Act 2008



Section 67


Question35:- The ISP' should preserve the information related to urser activity and retain such evidence before the pollice officers, comes under _____section of IT Act 2008



Section 67C


Question36:- Central or State government can monotor information being trasmitted through a computer, comes under _____section of IT Act 2008



Section 69


Question38:-Power to Central government blocking a website, comes under _____section of IT Act 2008



Section 69A


Question39:-Power to central Government to collect information / data stored in computer, comes under _____section of IT Act 2008



Section 69B


Question40:-Prevent unauthorized access to a protected system, comes under _____section of IT Act 2008



Section 70


Question41:- India CERT-IN has been appointed as the national nodal agency for maintining cyber security, comes under _____section of IT Act 2008



Section 70B


Question42:- CERT-K



Nodal agency of CERT-IN


Question43:-CERT-IN



Computer Emergency Response Team-India


Question44:- Misrepresentation of data or information, comes under _____section of IT Act 2008



Section 71


Question45:-punishment for disclosure of information , comes under _____section of IT Act 2008



Section 72


Question46:- Publishing false digital signature certificate, comes under _____section of IT Act 2008



Section 73


Question47:-IT act is applicable not only for indian Citizen but also foreigners, comes under _____section of IT Act 2008



Section 75


Question48:- Power of investigation under the act from DSP to Inspector Lever, comes under _____section of IT Act 2008



Section 78


Question49:-It provides any police offcer above the rank of inspector or any authorized office of central government and state government can enter and serach a public place, comes under _____section of IT Act 2008



Section 80


Question50:-Cyber regulation advisory committee, comes under _____section of IT Act 2008



Section 88


Question51:-.otf



Open type font file


Question52:-.asp and .aspx



Active Server Page file


Question53:-.cer



Internet security certificate


Question54:-.css



Cascading Style Sheet file


Question55:-.htm and .html



HTML file


Question56:-.jsp



Java Server Page file


Question57:- .js



JavaScript file


Question58:-.php



PHP file (Hypertext Preprocessor)


Question59:-.rss



Really Simple Syndication, RSS


Question60:-.xhtml



eXtensible HyperText Markup Language, XHTML


Question61:-.class



Java class file


Question62:-.cs



Visual C# source code file


Question63:- .cpp



C++ source code file


Question64:-.c



C and C++ source code file


Question65:-.h



C, C++, and Objective-C header file


Question66:-.java



Java Source code file


Question67:-.vb



Visual Basic file


Question68:-.xls



Microsoft Excel file


Question69:-.xlsx



Microsoft Excel Open XML spreadsheet file


Question70:-.ods



OpenOffice Calc spreadsheet file ( equivalent to excel)


Question71:-.bak



Backup file


Question72:-.cpl



Windows Control panel file


Question73:-.cfg



Configuration file


Question74:-.cab



Windows Cabinet file


Question75:-.cur



Windows cursor file


Question76:-.dll



- DLL file (Dynamic Link Library)


Question77:-.drv



Device driver file


Question78:-.ini



Initialization file


Question79:-.sys



Windows system file


Question80:-.tmp



Temporary file


Question81:-.msi



Windows installer package


Question82:-.mp4



Motion Picture Experts Group (MPEG)- MPEG4 video file


Question83:-.mpg or .mpeg



MPEG video file


Question84:-.mkv



Matroska Multimedia Container (video file)


Question85:- .avi



Audio Video Interleave, AVI


Question86:-.flv



Adobe Flash file


Question87:-.wmv



Windows Media Video file


Question88:-.pdf



PDF file


Question89:-.doc and .docx



Microsoft Word file


Question90:-.odt



OpenOffice Writer document file (exquvalent to word)


Question91:-.txt



Plain text file


Question92:-.rtf



Real Text File


Question93:-.odp



OpenOffice Impress presentation file (equivalent to power point)


Question94:-.CRX



Chrome Extension


Question95:-.ACCDB



Access 2007 Database File


Question96:-.inf



Installation file


Question97:-.PRF



Outlook Profile File


Question98:-NOTEPAD EXTENSION



.txt


Question99:-.DOCX



Microsoft Word Open XML Document


Question100:-.XLSX



Microsoft Excel Open XML Spreadsheet