NSCT – Cyber Laws & Ethics MCQs 20 min Score: 0 Attempted: 0/20 Subscribe 1. . Cyber Laws are: (A) Guidelines for deleting files (B) Rules to increase internet speed (C) Legal regulations governing the use of computers, internet, and digital technologies (D) Instructions to compress dataShow All AnswersShow All Answers 2. . Cyber Ethics refers to: (A) Compressing data (B) Encrypting files (C) Moral principles and behavior in the use of digital technologies (D) Deleting old emailsShow All Answers 3. . Which of the following is considered a cybercrime? (A) Hacking into systems (B) Phishing (C) Identity theft (D) All of the aboveShow All Answers 4. . The main objective of cyber laws is to: (A) Delete old emails (B) Increase storage capacity (C) Compress files (D) Protect users, organizations, and data from illegal activitiesShow All Answers 5. . Intellectual Property Rights (IPR) in cyberspace protect: (A) Files automatically (B) Only hardware (C) Only network cables (D) Software, digital content, and inventionsShow All Answers 6. . The Information Technology Act, 2000 (India) deals with: (A) Only data compression (B) Legal recognition of electronic documents, digital signatures, and cybercrime (C) Increasing internet speed (D) Deleting malwareShow All Answers 7. . Phishing is: (A) Attempting to steal sensitive information by pretending to be a trusted entity (B) Encrypting emails (C) Compressing attachments (D) Deleting spam automaticallyShow All Answers 8. . Cyberstalking refers to: (A) Encrypting data (B) Using the internet to harass or threaten someone (C) Deleting old accounts (D) Compressing filesShow All Answers 9. . Data privacy laws aim to: (A) Increase network speed (B) Delete old files (C) Protect personal and sensitive information of individuals (D) Compress logsShow All Answers 10. . Digital signatures are used to: (A) Delete data (B) Encrypt files automatically (C) Verify authenticity and integrity of electronic documents (D) Compress messagesShow All Answers 11. . Cyber terrorism involves: (A) Compressing data (B) Encrypting emails (C) Deleting malware (D) Using digital technologies to conduct politically motivated attacks or threatsShow All Answers 12. . Password theft is illegal under cyber laws because it: (A) Deletes old emails (B) Compresses files automatically (C) Enables unauthorized access to systems or data (D) Increases internet speedShow All Answers 13. . Online piracy refers to: (A) Compressing logs (B) Encrypting files (C) Illegal copying and distribution of copyrighted digital content (D) Deleting old dataShow All Answers 14. . Cyberbullying is: (A) Using digital platforms to intimidate, threaten, or harm others (B) Encrypting files (C) Compressing messages (D) Deleting old accountsShow All Answers 15. . Ethics in social media usage include: (A) Increasing likes (B) Deleting old posts automatically (C) Compressing media (D) Respecting privacy, avoiding fake news, and proper online conductShow All Answers 16. . Computer fraud is: (A) Using digital systems to deceive or manipulate for financial gain (B) Encrypting emails (C) Compressing files (D) Deleting old dataShow All Answers 17. . Cyber laws ensure accountability for: (A) Deleting old files (B) Compressing files (C) Increasing system speed (D) Actions taken online that harm others or break legal regulationsShow All Answers 18. . Key principles of cyber ethics include: (A) Deleting old emails (B) Compressing files (C) Honesty, integrity, privacy, and respect for others (D) Encrypting data automaticallyShow All Answers 19. . Unauthorized access to government or corporate systems is: (A) Only a social issue (B) Allowed if done ethically (C) Compressed automatically (D) Illegal under most cyber lawsShow All Answers 20. . The main objective of Cyber Laws & Ethics is to: (A) Compress data (B) Promote responsible, legal, and ethical use of technology while protecting users and data (C) Delete old files (D) Increase system speedShow All Answers