1. Cybercrime is defined as:
(A) Illegal acts involving a computer, network, or electronic device as a tool, target, or medium
(B) Any crime committed physically
(C) Only hacking
(D) Theft of physical devices only
2. Which term refers to the interactive virtual world of computer operations?
(A) Cyberspace
(B) Internet
(C) IT Network
(D) Digital Network
3. Who coined the term “cyberspace”?
(A) Tim Berners-Lee
(B) Joseph-Marie Jacquard
(C) Charles Babbage
(D) William Gibson
4. Which of the following is NOT considered a cybercrime?
(A) Hacking a computer system
(B) Physical theft of office furniture
(C) Publishing child pornography online
(D) Unauthorized access to data
5. The first cybercrime registered historically occurred in which year?
(A) 1984
(B) 1950
(C) 1820
(D) 2000
6. Section 43 of the IT Act, 2000 deals with:
(A) Hacking
(B) Breach of privacy
(C) Obscene publication
(D) Penalty for damage to computer, system, or network
7. Under Section 43, which act is punishable?
(A) Introducing a computer virus into a network
(B) Publishing obscene material online
(C) Misrepresentation to the Controller
(D) Unauthorized issuance of digital certificates
8. Section 44 covers penalties for:
(A) Damage to computer systems
(B) Hacking activities
(C) Breach of confidentiality
(D) Failure to furnish returns, books, or information
9. Section 45 provides:
(A) Residuary penalties for violations not covered elsewhere
(B) Punishment for hacking
(C) Penalty for child pornography
(D) Penalty for misrepresentation
10. Section 65 deals with:
(A) Tampering with computer source documents
(B) Breach of privacy
(C) Cyber fraud
(D) Obscene publications
11. Section 66 of the IT Act deals with:
(A) Hacking and unauthorized access
(B) Obscene publication
(C) Misrepresentation of digital certificates
(D) Breach of confidentiality
12. Section 67 deals with:
(A) Hacking
(B) Publishing obscene content electronically
(C) Fraudulent digital certificates
(D) Tampering with source documents
13. Penalty for first conviction under Section 67 is:
(A) Up to 3 years imprisonment
(B) Up to 10 years imprisonment
(C) Up to 5 years imprisonment and fine up to Rs. 1 lakh
(D) Up to 2 years imprisonment
14. Section 68 deals with:
(A) Fraudulent digital signatures
(B) Non-compliance with instructions from the Controller of Certifying Authorities
(C) Obscene publications
(D) Breach of confidentiality
15. Punishment under Section 68 is:
(A) Imprisonment up to 3 years or fine up to Rs. 2 lakh, or both
(B) Imprisonment up to 5 years
(C) Imprisonment up to 1 year
(D) Fine only
16. Section 71 covers offences of:
(A) Misrepresentation or suppression of facts to the Controller or Certifying Authority
(B) Obscene content
(C) Hacking
(D) Cyber fraud
17. Punishment under Section 71 is:
(A) Fine only
(B) Imprisonment up to 5 years
(C) Imprisonment up to 10 years
(D) Imprisonment up to 2 years or fine up to Rs. 1 lakh, or both
18. Section 72 of the IT Act deals with:
(A) Breach of confidentiality and privacy of electronic records
(B) Hacking computers
(C) Obscene publications
(D) Non-compliance of Controller instructions
19. Section 73(1) makes it an offence to:
(A) Hack computer systems
(B) Tamper with source documents
(C) Publish false digital certificates
(D) Access internet without permission
20. Section 74 penalizes:
(A) Creating viruses
(B) Publishing digital certificates for fraudulent purposes
(C) Breach of privacy
(D) Obscene publication
21. Which of the following is considered a cybercrime against persons?
(A) Identity theft
(B) Hacking
(C) Spamming
(D) Phishing for money
22. Which cybercrime uses computers as a weapon to commit traditional crimes?
(A) Cyber offences
(B) Cyber contraventions
(C) Computer misuse
(D) Network attacks
23. Stealing computer hardware to later damage data is:
(A) Cyber contravention
(B) Cybercrime
(C) Legal activity
(D) Only hacking
24. Which Indian Act governs cybercrime offences?
(A) Prevention of Corruption Act, 1947
(B) Information Technology Act, 2000
(C) Indian Penal Code, 1860
(D) Cyber Security Act, 2010
25. Cybercrime can affect:
(A) Individuals
(B) All of the above
(C) Organizations
(D) Groups
26. The first network developed for global communication was:
(A) World Wide Web
(B) ARPANET
(C) Internet of Things
(D) Ethernet
27. Hacking a system to steal confidential information is:
(A) Legal with permission
(B) Cyber contravention
(C) Cybercrime under Section 66
(D) Ethical hacking
28. Tampering with computer source documents without authorization is punished under:
(A) Section 65
(B) Section 43
(C) Section 66
(D) Section 72
29. Cybercrime is difficult to control because:
(A) It is limited to physical locations
(B) It is not illegal
(C) Everyone uses computers
(D) Law enforcement lacks technical expertise
30. Section 43 compensation limit under the IT Act is:
(A) Rs. 10 lakh
(B) Rs. 5 crore
(C) Rs. 50,000
(D) Rs. 1 crore
31. Publishing child pornography online falls under which section?
(A) Section 67
(B) Section 66
(C) Section 71
(D) Section 72
32. Misuse of digital signatures for fraud is covered under:
(A) Section 74
(B) Section 43
(C) Section 65
(D) Section 72
33. Which of the following is an example of cybercrime as a medium?
(A) Destroying physical files
(B) Publishing a newspaper article
(C) Robbing a bank physically
(D) Using computer to commit fraud
34. Accessing someone else’s computer without permission to modify information is:
(A) Ethical hacking
(B) Non-cyber crime
(C) Cyber contravention
(D) Hacking under Section 66
35. “Cyber contraventions” generally refer to:
(A) Hacking
(B) Minor offences not amounting to cybercrime
(C) Child pornography
(D) Fraud with computers
36. Cybercrime can be committed:
(A) Within a single country
(B) Across international borders
(C) Only in cyberspace without impact
(D) Both A and B
37. Penalty for publishing false digital certificate (Section 73) is:
(A) Up to 1 year imprisonment
(B) Fine only
(C) Up to 5 years imprisonment
(D) Up to 2 years imprisonment or fine Rs. 1 lakh, or both
38. Hacking for personal gain or to damage others falls under:
(A) Cybercrime Section 66
(B) Ethical hacking
(C) Cyber contravention
(D) Unauthorized testing
39. Section 68 empowers the Controller to:
(A) Grant licenses
(B) Publish digital certificates
(C) Issue imprisonment directly
(D) Direct certifying authorities to comply with the law
40. Cybercrime can target:
(A) Individuals
(B) All of the above
(C) Organizations
(D) Computer networks
41. Failure to furnish required IT information under Section 44 is punishable by:
(A) Imprisonment
(B) Both A and B
(C) Fine
(D) Warning only
42. Section 66A (not covered in your text but generally known) deals with:
(A) Breach of privacy
(B) Hacking
(C) Sending offensive messages online
(D) Tampering with source documents
43. Publication of digital certificate for fraudulent purposes is punishable under which section?
(A) 65
(B) 74
(C) 67
(D) 72
44. Cybercrime can involve:
(A) Theft of hardware
(B) All of the above
(C) Unauthorized access to data
(D) Damage to software
45. Cybercrime offences under the IT Act are mostly:
(A) Criminal
(B) Civil only
(C) Regulatory only
(D) Optional
46. Section 43 applies to:
(A) Only government computers
(B) Only servers
(C) Only personal computers
(D) Any computer, system, or network
47. Section 67 covers which of the following crimes?
(A) Child pornography
(B) Obscene publications
(C) Both A and B
(D) Only adult content
48. Non-compliance with Controller’s instructions may result in:
(A) Fine only
(B) Imprisonment only
(C) Warning
(D) Imprisonment, fine, or both
49. Cybercrime can occur because:
(A) All of the above
(B) Law enforcement may lack technical expertise
(C) Offenders can operate globally
(D) Computers are widely used