T4Tutorials .PK

Cybercrime offences — MCQs

1. Cybercrime is defined as:

(A) Illegal acts involving a computer, network, or electronic device as a tool, target, or medium


(B) Any crime committed physically


(C) Only hacking


(D) Theft of physical devices only




2. Which term refers to the interactive virtual world of computer operations?

(A) Cyberspace


(B) Internet


(C) IT Network


(D) Digital Network




3. Who coined the term “cyberspace”?

(A) Tim Berners-Lee


(B) Joseph-Marie Jacquard


(C) Charles Babbage


(D) William Gibson




4. Which of the following is NOT considered a cybercrime?

(A) Hacking a computer system


(B) Physical theft of office furniture


(C) Publishing child pornography online


(D) Unauthorized access to data




5. The first cybercrime registered historically occurred in which year?

(A) 1984


(B) 1950


(C) 1820


(D) 2000




6. Section 43 of the IT Act, 2000 deals with:

(A) Hacking


(B) Breach of privacy


(C) Obscene publication


(D) Penalty for damage to computer, system, or network




7. Under Section 43, which act is punishable?

(A) Introducing a computer virus into a network


(B) Publishing obscene material online


(C) Misrepresentation to the Controller


(D) Unauthorized issuance of digital certificates




8. Section 44 covers penalties for:

(A) Damage to computer systems


(B) Hacking activities


(C) Breach of confidentiality


(D) Failure to furnish returns, books, or information




9. Section 45 provides:

(A) Residuary penalties for violations not covered elsewhere


(B) Punishment for hacking


(C) Penalty for child pornography


(D) Penalty for misrepresentation




10. Section 65 deals with:

(A) Tampering with computer source documents


(B) Breach of privacy


(C) Cyber fraud


(D) Obscene publications




11. Section 66 of the IT Act deals with:

(A) Hacking and unauthorized access


(B) Obscene publication


(C) Misrepresentation of digital certificates


(D) Breach of confidentiality




12. Section 67 deals with:

(A) Hacking


(B) Publishing obscene content electronically


(C) Fraudulent digital certificates


(D) Tampering with source documents




13. Penalty for first conviction under Section 67 is:

(A) Up to 3 years imprisonment


(B) Up to 10 years imprisonment


(C) Up to 5 years imprisonment and fine up to Rs. 1 lakh


(D) Up to 2 years imprisonment




14. Section 68 deals with:

(A) Fraudulent digital signatures


(B) Non-compliance with instructions from the Controller of Certifying Authorities


(C) Obscene publications


(D) Breach of confidentiality




15. Punishment under Section 68 is:

(A) Imprisonment up to 3 years or fine up to Rs. 2 lakh, or both


(B) Imprisonment up to 5 years


(C) Imprisonment up to 1 year


(D) Fine only




16. Section 71 covers offences of:

(A) Misrepresentation or suppression of facts to the Controller or Certifying Authority


(B) Obscene content


(C) Hacking


(D) Cyber fraud




17. Punishment under Section 71 is:

(A) Fine only


(B) Imprisonment up to 5 years


(C) Imprisonment up to 10 years


(D) Imprisonment up to 2 years or fine up to Rs. 1 lakh, or both




18. Section 72 of the IT Act deals with:

(A) Breach of confidentiality and privacy of electronic records


(B) Hacking computers


(C) Obscene publications


(D) Non-compliance of Controller instructions




19. Section 73(1) makes it an offence to:

(A) Hack computer systems


(B) Tamper with source documents


(C) Publish false digital certificates


(D) Access internet without permission




20. Section 74 penalizes:

(A) Creating viruses


(B) Publishing digital certificates for fraudulent purposes


(C) Breach of privacy


(D) Obscene publication




21. Which of the following is considered a cybercrime against persons?

(A) Identity theft


(B) Hacking


(C) Spamming


(D) Phishing for money




22. Which cybercrime uses computers as a weapon to commit traditional crimes?

(A) Cyber offences


(B) Cyber contraventions


(C) Computer misuse


(D) Network attacks




23. Stealing computer hardware to later damage data is:

(A) Cyber contravention


(B) Cybercrime


(C) Legal activity


(D) Only hacking




24. Which Indian Act governs cybercrime offences?

(A) Prevention of Corruption Act, 1947


(B) Information Technology Act, 2000


(C) Indian Penal Code, 1860


(D) Cyber Security Act, 2010




25. Cybercrime can affect:

(A) Individuals


(B) All of the above


(C) Organizations


(D) Groups




26. The first network developed for global communication was:

(A) World Wide Web


(B) ARPANET


(C) Internet of Things


(D) Ethernet




27. Hacking a system to steal confidential information is:

(A) Legal with permission


(B) Cyber contravention


(C) Cybercrime under Section 66


(D) Ethical hacking




28. Tampering with computer source documents without authorization is punished under:

(A) Section 65


(B) Section 43


(C) Section 66


(D) Section 72




29. Cybercrime is difficult to control because:

(A) It is limited to physical locations


(B) It is not illegal


(C) Everyone uses computers


(D) Law enforcement lacks technical expertise




30. Section 43 compensation limit under the IT Act is:

(A) Rs. 10 lakh


(B) Rs. 5 crore


(C) Rs. 50,000


(D) Rs. 1 crore




31. Publishing child pornography online falls under which section?

(A) Section 67


(B) Section 66


(C) Section 71


(D) Section 72




32. Misuse of digital signatures for fraud is covered under:

(A) Section 74


(B) Section 43


(C) Section 65


(D) Section 72




33. Which of the following is an example of cybercrime as a medium?

(A) Destroying physical files


(B) Publishing a newspaper article


(C) Robbing a bank physically


(D) Using computer to commit fraud




34. Accessing someone else’s computer without permission to modify information is:

(A) Ethical hacking


(B) Non-cyber crime


(C) Cyber contravention


(D) Hacking under Section 66




35. “Cyber contraventions” generally refer to:

(A) Hacking


(B) Minor offences not amounting to cybercrime


(C) Child pornography


(D) Fraud with computers




36. Cybercrime can be committed:

(A) Within a single country


(B) Across international borders


(C) Only in cyberspace without impact


(D) Both A and B




37. Penalty for publishing false digital certificate (Section 73) is:

(A) Up to 1 year imprisonment


(B) Fine only


(C) Up to 5 years imprisonment


(D) Up to 2 years imprisonment or fine Rs. 1 lakh, or both




38. Hacking for personal gain or to damage others falls under:

(A) Cybercrime Section 66


(B) Ethical hacking


(C) Cyber contravention


(D) Unauthorized testing




39. Section 68 empowers the Controller to:

(A) Grant licenses


(B) Publish digital certificates


(C) Issue imprisonment directly


(D) Direct certifying authorities to comply with the law




40. Cybercrime can target:

(A) Individuals


(B) All of the above


(C) Organizations


(D) Computer networks




41. Failure to furnish required IT information under Section 44 is punishable by:

(A) Imprisonment


(B) Both A and B


(C) Fine


(D) Warning only




42. Section 66A (not covered in your text but generally known) deals with:

(A) Breach of privacy


(B) Hacking


(C) Sending offensive messages online


(D) Tampering with source documents




43. Publication of digital certificate for fraudulent purposes is punishable under which section?

(A) 65


(B) 74


(C) 67


(D) 72




44. Cybercrime can involve:

(A) Theft of hardware


(B) All of the above


(C) Unauthorized access to data


(D) Damage to software




45. Cybercrime offences under the IT Act are mostly:

(A) Criminal


(B) Civil only


(C) Regulatory only


(D) Optional




46. Section 43 applies to:

(A) Only government computers


(B) Only servers


(C) Only personal computers


(D) Any computer, system, or network




47. Section 67 covers which of the following crimes?

(A) Child pornography


(B) Obscene publications


(C) Both A and B


(D) Only adult content




48. Non-compliance with Controller’s instructions may result in:

(A) Fine only


(B) Imprisonment only


(C) Warning


(D) Imprisonment, fine, or both




49. Cybercrime can occur because:

(A) All of the above


(B) Law enforcement may lack technical expertise


(C) Offenders can operate globally


(D) Computers are widely used




Exit mobile version