Questions
- When planning for cybersecurity in e-commerce, which cyber law must be considered to protect digital transactions?
- Payment of Wages Act
- Trade Marks Act
- IT Act 2000 (Answer)
- Companies Act
- Which organization is responsible for certifying authorities in India?
- Controller of Certifying Authorities (CCA) (Answer)
- Ministry of Electronics and Information technology
- National Security Agency
- Reserve Bank of India
- Which section of the IT Act 2000 deals with identity theft and its punishment?
- Section 67A
- Section 65
- Section 66C (Answer)
- Section 69
- Which action is considered a violation of the IT Act related to intellectual property in cyberspace?
- Selling products without a license
- Unauthorized copying and distribution of digital content such as music and software (Answer)
- Developing software for personal use
- Installing open-source software
- What is the key challenge in enforcing intellectual property rights in cyberspace?
- Securing routers and switches
- The ease of copying and distributing digital content without consent (Answer)
- Identifying physical servers
- Managing network bandwidth
- Which element of the CIA Triad ensures that only authorized individuals have access to sensitive data?
- Integrity
- Confidentiality (Answer)
- Authentication
- Availability
- Which of the following is a common challenge in cybersecurity?
- Lack of antivirus software
- Limited access to the internet
- Increasing sophistication of cyber attacks (Answer)
- Limited use of mobile devices
- In the context of cyber security, why is it critical for organizations to protect their critical infrastructure?
- To ensure data confidentiality within the organization
- To improve employee satisfaction
- To reduce the cost of IT hardware
- To prevent national-level crises and safeguard public safety (Answer)
- Which of the following activities is addressed by intellectual property rights in cyberspace?
- Monitoring illegal online transactions
- Controlling internet bandwidth allocation
- Protecting and enforcing digital copyrights and trademarks (Answer)
- Encrypting user communications
- Which of the following is the main purpose of ethical hacking?
- To help identify and fix security vulnerabilities in systems (Answer)
- To spread malware across the internet
- To perform unauthorized access to networks
- To disable antivirus software on systems
- How can IPSec be used to secure e-commerce transactions?
- By blocking access to unauthorized websites
- By scanning the network for malware
- By creating a physical barrier to data theft
- By encrypting credit card data at the network layer during transmission (Answer)
- Which of the following best describes e-commerce under the IT Act 2000?
- Personal financial transactions
- Online buying and selling of goods and services (Answer)
- Offline sales transactions
- Government procurement procedures
- What is the purpose of a firewall in cybersecurity?
- To increase internet speed
- To monitor network traffic and block unauthorized access (Answer)
- To encrypt all data sent over the network
- To store sensitive data securely
- How can an organization prevent privilege escalation attacks?
- By using strong passwords and regularly updating them
- By ensuring all user accounts have administrative privileges
- By monitoring user activity and limiting access based on roles (Answer)
- By disabling antivirus software to reduce system overhead
- Which cyber attack involves overwhelming a system with traffic to make a service unavailable?
- Phishing
- Denial-of-Service (DoS) attack (Answer)
- SQL Injection
- Malware infection
- What is the main goal of Cybersecurity?
- To protect systems, networks, and data from cyber attacks (Answer)
- To enforce cloud computing
- To increase the speed of the internet
- To improve software development
- What is the penalty under Section 66 of the IT Act for hacking?
- Imprisonment up to 3 years, or a fine up to ₹5 lakh, or both (Answer)
- Lifetime imprisonment
- Only a monetary fine
- Imprisonment up to 1 year, or a fine up to ₹10 lakh
- Which of the following best describes the role of E-Governance in improving public service delivery?
- Ensuring faster, transparent, and more efficient interaction between the government and citizens through digital platforms (Answer)
- Automating government functions without citizen interaction
- Implementing online shopping portals for government services
- Replacing government employees with AI systems
- Which of the following best describes a “backdoor” in the context of cyber-attacks?
- An encrypted message sent over a network
- A secret entry point into a system that bypasses normal authentication procedures (Answer)
- A physical entry point to a secure facility
- A malware that replicates itself to spread to other systems
- Which legal principle is applied to cases of data theft under the IT Act?
- The principle of confidentiality and privacy under Section 72 (Answer)
- The principle of data redundancy
- The principle of domain ownership
- The principle of criminal conspiracy
- Which of the following comes under intellectual property rights in cyberspace?
- Using antivirus software
- Encrypting personal data
- Selling products online
- Copyrights, patents, and trademarks related to digital content (Answer)
- What is Cyberspace?
- A software used for internet communication
- A secure area in a data center
- The virtual environment where communication over computer networks occurs (Answer)
- A physical space with computers and servers
- How does IPSec enhance security in data transmission at the network layer?
- By encrypting and authenticating each IP packet in a communication session (Answer)
- By monitoring the bandwidth usage
- By blocking all non-HTTPS traffic
- By creating a virtual firewall for IP addresses
- What is the primary objective of the IT Act, 2000?
- To restrict online shopping
- To regulate internet access across India
- To provide legal recognition for electronic transactions and digital signatures (Answer)
- To promote the use of social media
- Which of the following describes a cyber attack that disrupts or damages computer systems to cripple an organization’s operations?
- Cyber terrorism
- Cyber fraud
- Cyber warfare (Answer)
- Cyber espionage
Analysis
Mapping of Questions to Syllabus Units
| Question # | Key Concept Tested | Mapped Syllabus Unit |
|---|---|---|
| 1 | Cyber Law for E-commerce (IT Act 2000) | Unit 5: Cyber Ethics and Laws |
| 2 | Certifying Authorities in India | Unit 5: Cyber Ethics and Laws |
| 3 | Identity Theft (Section 66C of IT Act) | Unit 5: Cyber Ethics and Laws |
| 4 | Intellectual Property Rights (IPR) Violation | Unit 5: Cyber Ethics and Laws |
| 5 | Challenge in Enforcing IPR | Unit 5: Cyber Ethics and Laws |
| 6 | CIA Triad (Confidentiality) | Unit 1: Introduction |
| 7 | General Cybersecurity Challenges | Unit 1: Introduction |
| 8 | Security of Critical Infrastructure | Unit 1: Introduction |
| 9 | IPR in Cyberspace | Unit 5: Cyber Ethics and Laws |
| 10 | Purpose of Ethical Hacking | Unit 3: Ethical Hacking and Social Engineering |
| 11 | IPSec for Securing Transactions | Unit 5: Cyber Ethics and Laws |
| 12 | E-commerce under IT Act 2000 | Unit 5: Cyber Ethics and Laws |
| 13 | Purpose of a Firewall | Unit 1: Introduction (as a defense against threats) |
| 14 | Preventing Privilege Escalation | Unit 2: Hackers and Cyber Crimes |
| 15 | Denial-of-Service (DoS) Attack | Unit 2: Hackers and Cyber Crimes |
| 16 | Main Goal of Cybersecurity | Unit 1: Introduction |
| 17 | Penalty for Hacking (IT Act) | Unit 5: Cyber Ethics and Laws |
| 18 | Role of E-Governance | Unit 5: Cyber Ethics and Laws |
| 19 | ”Backdoor” Definition | Unit 2: Hackers and Cyber Crimes |
| 20 | Data Theft under IT Act | Unit 5: Cyber Ethics and Laws |
| 21 | IPR in Cyberspace | Unit 5: Cyber Ethics and Laws |
| 22 | Definition of Cyberspace | Unit 1: Introduction |
| 23 | IPSec Functionality | Unit 5: Cyber Ethics and Laws |
| 24 | Primary Objective of IT Act, 2000 | Unit 5: Cyber Ethics and Laws |
| 25 | Definition of Cyber Warfare | Unit 1: Introduction |
Concise Analysis
Based on the mapping, here is a breakdown of the question distribution and key takeaways:
- Unit 1 (Introduction): 7 Questions
- Unit 2 (Hackers and Cyber Crimes): 3 Questions
- Unit 3 (Ethical Hacking and Social Engineering): 1 Question
- Unit 4 (Cyber Forensics and Auditing): 0 Questions
- Unit 5 (Cyber Ethics and Laws): 14 Questions
Key Observations:
- Heavy Emphasis on Law and Ethics: There is an overwhelming focus on Unit 5, which covers the IT Act 2000, E-commerce, IPR, and IPSec. More than half of the questions (14 out of 25) are from this unit alone, indicating that a thorough understanding of India’s legal framework for cybersecurity is critical.
- Strong Focus on Foundational Concepts: Unit 1, which covers the fundamental concepts of cybersecurity like the CIA Triad, cyberspace, cyber warfare, and critical infrastructure, is the second most-tested area.
- Underrepresentation of Technical and Practical Topics:
- Unit 2 (Hackers and Cyber Crimes) and Unit 3 (Ethical Hacking) are significantly underrepresented, with only a few questions covering specific attack types and the purpose of ethical hacking.
- Most notably, Unit 4 (Cyber Forensics and Auditing) is completely absent from the questions. Topics like the forensic investigation process, auditing, and ISO standards are not tested at all.
Conclusion: The assessment is heavily weighted towards the legal and foundational aspects of cybersecurity, rather than the technical, offensive, or defensive methodologies. Students preparing based on this question set should prioritize a deep understanding of the IT Act 2000 and core cybersecurity principles.