5 Feb 2024 PRINCE ROHILLA 0 Comments Computer Education Quiz X-Marks (48) Q(1). Net crime is the criminal exploitation of the ___: (A) Browsers (B) Servers (C) Internet (D) None of These Q(2). Crime through the Internet includes: (A) Telemarketing (B) Internet fraud (C) Identity Theft (D) Credit Card account thefts (E) All of the Above (F) None of These Q(3). Which among the following is correct about "Hacking": (A) Hacking is an illegal intrusion into a computer system and/or network. (B) Cracking term is equivalent to Hacking (In Indian Laws perspective there is no difference between the term hacking and cracking). (C) Every act committed towards breaking into a computer and/or network is hacking. (D) Hackers can hack for personal monetary gains, such as stealing credit card information, transferring money from various bank accounts to their own account, followed by withdrawal of money. (E) All of the Above (F) None of These Q(4). Which among the following is correct about "Child Pornography": (A) Pedophiles lure children by distributing pornographic material. (B) Pedophiles falsely represent themselves as of the same age and win the confidence of children by chatting and by sending images. (C) Pedophiles, after winning the confidence of children, then offer them monetary as well as physical rewards. (D) Pedophiles may sexually exploit children by using them as sexual objects or by taking their pornographic pictures, in order to sell those over the Internet. (E) All of the Above (F) None of These Q(5). Which among the following characteristics are correct about 'Cyberstalking': (A) Cyberstalking is the use of the Internet or electronics to stalk or harass an individual or any group. (B) It includes making harassing phone calls, killing the victim's pet, vandalizing victims' property, leaving written messages or objects. (C) It may be offline as well as online. (D) All of the Above (E) None of These Q(6). Denial-of-service attack includes: (A) a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. (B) DoS attacks are included in it. (C) Both of Above (D) None of These Q(7). Which among the following is a wrong characteristic of "Phishing": (A) Fakers, by offering special rewards or money prizes, etc., ask for personal information such as passwords, credit card information, social security, and bank account numbers or other material information. (B) The main purpose is theft or misuse of the acquired material. (C) Both of Above (D) None of These Q(8). Credit Card Fraud includes: (A) Credit cards are illegally obtained and used to get movable or immovable property. (B) Unauthorized and illegal use of credit cards. (C) Both of Above (D) None of These Q(9). The punishment for Hacking in India is: (A) Imprisonment up to 3 years only. (B) Fine (Depends on case to case only). (C) Both of Above (D) None of These Q(10). Which among the following is best suitable for the term "Software Piracy": (A) Counterfeiting original products. (B) The illegal copying of genuine programs. (C) Both of Above (D) None of These Please provide your contact information to proceed.Email Address *First Name *Consent *Yes, I agree with the privacy policy and terms and conditions.Submit