Questions

  1. When planning for cybersecurity in e-commerce, which cyber law must be considered to protect digital transactions?
    • Payment of Wages Act
    • Trade Marks Act
    • IT Act 2000 (Answer)
    • Companies Act
  2. Which organization is responsible for certifying authorities in India?
    • Controller of Certifying Authorities (CCA) (Answer)
    • Ministry of Electronics and Information technology
    • National Security Agency
    • Reserve Bank of India
  3. Which section of the IT Act 2000 deals with identity theft and its punishment?
    • Section 67A
    • Section 65
    • Section 66C (Answer)
    • Section 69
  4. Which action is considered a violation of the IT Act related to intellectual property in cyberspace?
    • Selling products without a license
    • Unauthorized copying and distribution of digital content such as music and software (Answer)
    • Developing software for personal use
    • Installing open-source software
  5. What is the key challenge in enforcing intellectual property rights in cyberspace?
    • Securing routers and switches
    • The ease of copying and distributing digital content without consent (Answer)
    • Identifying physical servers
    • Managing network bandwidth
  6. Which element of the CIA Triad ensures that only authorized individuals have access to sensitive data?
    • Integrity
    • Confidentiality (Answer)
    • Authentication
    • Availability
  7. Which of the following is a common challenge in cybersecurity?
    • Lack of antivirus software
    • Limited access to the internet
    • Increasing sophistication of cyber attacks (Answer)
    • Limited use of mobile devices
  8. In the context of cyber security, why is it critical for organizations to protect their critical infrastructure?
    • To ensure data confidentiality within the organization
    • To improve employee satisfaction
    • To reduce the cost of IT hardware
    • To prevent national-level crises and safeguard public safety (Answer)
  9. Which of the following activities is addressed by intellectual property rights in cyberspace?
    • Monitoring illegal online transactions
    • Controlling internet bandwidth allocation
    • Protecting and enforcing digital copyrights and trademarks (Answer)
    • Encrypting user communications
  10. Which of the following is the main purpose of ethical hacking?
    • To help identify and fix security vulnerabilities in systems (Answer)
    • To spread malware across the internet
    • To perform unauthorized access to networks
    • To disable antivirus software on systems
  11. How can IPSec be used to secure e-commerce transactions?
    • By blocking access to unauthorized websites
    • By scanning the network for malware
    • By creating a physical barrier to data theft
    • By encrypting credit card data at the network layer during transmission (Answer)
  12. Which of the following best describes e-commerce under the IT Act 2000?
    • Personal financial transactions
    • Online buying and selling of goods and services (Answer)
    • Offline sales transactions
    • Government procurement procedures
  13. What is the purpose of a firewall in cybersecurity?
    • To increase internet speed
    • To monitor network traffic and block unauthorized access (Answer)
    • To encrypt all data sent over the network
    • To store sensitive data securely
  14. How can an organization prevent privilege escalation attacks?
    • By using strong passwords and regularly updating them
    • By ensuring all user accounts have administrative privileges
    • By monitoring user activity and limiting access based on roles (Answer)
    • By disabling antivirus software to reduce system overhead
  15. Which cyber attack involves overwhelming a system with traffic to make a service unavailable?
    • Phishing
    • Denial-of-Service (DoS) attack (Answer)
    • SQL Injection
    • Malware infection
  16. What is the main goal of Cybersecurity?
    • To protect systems, networks, and data from cyber attacks (Answer)
    • To enforce cloud computing
    • To increase the speed of the internet
    • To improve software development
  17. What is the penalty under Section 66 of the IT Act for hacking?
    • Imprisonment up to 3 years, or a fine up to ₹5 lakh, or both (Answer)
    • Lifetime imprisonment
    • Only a monetary fine
    • Imprisonment up to 1 year, or a fine up to ₹10 lakh
  18. Which of the following best describes the role of E-Governance in improving public service delivery?
    • Ensuring faster, transparent, and more efficient interaction between the government and citizens through digital platforms (Answer)
    • Automating government functions without citizen interaction
    • Implementing online shopping portals for government services
    • Replacing government employees with AI systems
  19. Which of the following best describes a “backdoor” in the context of cyber-attacks?
    • An encrypted message sent over a network
    • A secret entry point into a system that bypasses normal authentication procedures (Answer)
    • A physical entry point to a secure facility
    • A malware that replicates itself to spread to other systems
  20. Which legal principle is applied to cases of data theft under the IT Act?
    • The principle of confidentiality and privacy under Section 72 (Answer)
    • The principle of data redundancy
    • The principle of domain ownership
    • The principle of criminal conspiracy
  21. Which of the following comes under intellectual property rights in cyberspace?
    • Using antivirus software
    • Encrypting personal data
    • Selling products online
    • Copyrights, patents, and trademarks related to digital content (Answer)
  22. What is Cyberspace?
    • A software used for internet communication
    • A secure area in a data center
    • The virtual environment where communication over computer networks occurs (Answer)
    • A physical space with computers and servers
  23. How does IPSec enhance security in data transmission at the network layer?
    • By encrypting and authenticating each IP packet in a communication session (Answer)
    • By monitoring the bandwidth usage
    • By blocking all non-HTTPS traffic
    • By creating a virtual firewall for IP addresses
  24. What is the primary objective of the IT Act, 2000?
    • To restrict online shopping
    • To regulate internet access across India
    • To provide legal recognition for electronic transactions and digital signatures (Answer)
    • To promote the use of social media
  25. Which of the following describes a cyber attack that disrupts or damages computer systems to cripple an organization’s operations?
    • Cyber terrorism
    • Cyber fraud
    • Cyber warfare (Answer)
    • Cyber espionage

Analysis

Mapping of Questions to Syllabus Units

Question #Key Concept TestedMapped Syllabus Unit
1Cyber Law for E-commerce (IT Act 2000)Unit 5: Cyber Ethics and Laws
2Certifying Authorities in IndiaUnit 5: Cyber Ethics and Laws
3Identity Theft (Section 66C of IT Act)Unit 5: Cyber Ethics and Laws
4Intellectual Property Rights (IPR) ViolationUnit 5: Cyber Ethics and Laws
5Challenge in Enforcing IPRUnit 5: Cyber Ethics and Laws
6CIA Triad (Confidentiality)Unit 1: Introduction
7General Cybersecurity ChallengesUnit 1: Introduction
8Security of Critical InfrastructureUnit 1: Introduction
9IPR in CyberspaceUnit 5: Cyber Ethics and Laws
10Purpose of Ethical HackingUnit 3: Ethical Hacking and Social Engineering
11IPSec for Securing TransactionsUnit 5: Cyber Ethics and Laws
12E-commerce under IT Act 2000Unit 5: Cyber Ethics and Laws
13Purpose of a FirewallUnit 1: Introduction (as a defense against threats)
14Preventing Privilege EscalationUnit 2: Hackers and Cyber Crimes
15Denial-of-Service (DoS) AttackUnit 2: Hackers and Cyber Crimes
16Main Goal of CybersecurityUnit 1: Introduction
17Penalty for Hacking (IT Act)Unit 5: Cyber Ethics and Laws
18Role of E-GovernanceUnit 5: Cyber Ethics and Laws
19”Backdoor” DefinitionUnit 2: Hackers and Cyber Crimes
20Data Theft under IT ActUnit 5: Cyber Ethics and Laws
21IPR in CyberspaceUnit 5: Cyber Ethics and Laws
22Definition of CyberspaceUnit 1: Introduction
23IPSec FunctionalityUnit 5: Cyber Ethics and Laws
24Primary Objective of IT Act, 2000Unit 5: Cyber Ethics and Laws
25Definition of Cyber WarfareUnit 1: Introduction

Concise Analysis

Based on the mapping, here is a breakdown of the question distribution and key takeaways:

  • Unit 1 (Introduction): 7 Questions
  • Unit 2 (Hackers and Cyber Crimes): 3 Questions
  • Unit 3 (Ethical Hacking and Social Engineering): 1 Question
  • Unit 4 (Cyber Forensics and Auditing): 0 Questions
  • Unit 5 (Cyber Ethics and Laws): 14 Questions

Key Observations:

  1. Heavy Emphasis on Law and Ethics: There is an overwhelming focus on Unit 5, which covers the IT Act 2000, E-commerce, IPR, and IPSec. More than half of the questions (14 out of 25) are from this unit alone, indicating that a thorough understanding of India’s legal framework for cybersecurity is critical.
  2. Strong Focus on Foundational Concepts: Unit 1, which covers the fundamental concepts of cybersecurity like the CIA Triad, cyberspace, cyber warfare, and critical infrastructure, is the second most-tested area.
  3. Underrepresentation of Technical and Practical Topics:
    • Unit 2 (Hackers and Cyber Crimes) and Unit 3 (Ethical Hacking) are significantly underrepresented, with only a few questions covering specific attack types and the purpose of ethical hacking.
    • Most notably, Unit 4 (Cyber Forensics and Auditing) is completely absent from the questions. Topics like the forensic investigation process, auditing, and ISO standards are not tested at all.

Conclusion: The assessment is heavily weighted towards the legal and foundational aspects of cybersecurity, rather than the technical, offensive, or defensive methodologies. Students preparing based on this question set should prioritize a deep understanding of the IT Act 2000 and core cybersecurity principles.