Introduction India, with its immense human capital and burgeoning economy, is at a pivotal juncture…
MCQs with answers on “Cybersecurity in India: Threats and Solutions”
1. Which of the following is the primary government body responsible for cybersecurity in India?
A) Ministry of Defence
B) National Security Council
C) CERT-In
D) Ministry of Electronics and Information Technology (MeitY)
Answer: C) CERT-In
2. What is the main purpose of the National Cyber Security Policy 2013 in India?
A) To protect digital identity
B) To create a secure cyberspace for citizens
C) To regulate internet service providers
D) To develop new cyber technologies
Answer: B) To create a secure cyberspace for citizens
3. Which of the following is a critical aspect of cybersecurity?
A) Data encryption
B) Data analysis
C) Web development
D) Cloud computing
Answer: A) Data encryption
4. Which of the following threats is primarily associated with the unauthorized access to data or systems?
A) Phishing
B) Malware
C) Hacking
D) Data breach
Answer: C) Hacking
5. Which of the following laws governs the protection of personal data in India?
A) Information Technology Act, 2000
B) Personal Data Protection Bill, 2019
C) National Cyber Security Policy, 2013
D) Telecom Regulatory Authority of India Act, 1997
Answer: B) Personal Data Protection Bill, 2019
6. Which of the following is NOT a type of cyber threat?
A) Phishing
B) Ransomware
C) Firewall
D) Spyware
Answer: C) Firewall
7. The ‘Zero Trust’ cybersecurity model primarily focuses on:
A) Trusting external networks
B) Granting access based on user identity
C) Preventing cyber attacks through physical barriers
D) Not trusting anyone inside or outside the network by default
Answer: D) Not trusting anyone inside or outside the network by default
8. Which organization was set up by the Government of India to handle cyber incidents?
A) Cyber Crime Investigation Cell
B) Indian Cyber Crime Coordination Centre
C) CERT-In
D) NIA
Answer: C) CERT-In
9. What is the key feature of a Distributed Denial of Service (DDoS) attack?
A) Infiltration of databases
B) Overloading a system with traffic to make it unavailable
C) Sending malicious emails
D) Theft of user credentials
Answer: B) Overloading a system with traffic to make it unavailable
10. Which of the following is a method used to protect data during transmission over a network?
A) Data mining
B) Data encryption
C) Web scraping
D) Spam filtering
Answer: B) Data encryption
11. What does the term ‘phishing’ refer to in the context of cybersecurity?
A) Hacking a network
B) Attempting to steal sensitive data via fraudulent means
C) The spread of computer viruses
D) Breaking into secure servers
Answer: B) Attempting to steal sensitive data via fraudulent means
12. Which of the following is an example of a cyber attack targeting individuals’ personal information?
A) Ransomware
B) Phishing
C) Malware
D) DDoS attack
Answer: B) Phishing
13. Which technology is often used to secure online transactions in India?
A) Blockchain
B) Artificial Intelligence
C) Virtual Private Network (VPN)
D) Data mining
Answer: A) Blockchain
14. What is the function of a firewall in cybersecurity?
A) Prevent data loss
B) Block unauthorized access to a network
C) Encrypt communication channels
D) Monitor user behavior
Answer: B) Block unauthorized access to a network
15. Which Indian government initiative aims to improve the cybersecurity infrastructure in the country?
A) Digital India
B) BharatNet
C) National Cyber Security Coordinator (NCSC)
D) Atal Innovation Mission
Answer: C) National Cyber Security Coordinator (NCSC)
16. Which of the following is a potential consequence of a ransomware attack?
A) Financial loss due to encryption of files
B) Theft of personal information
C) Data corruption
D) Website defacement
Answer: A) Financial loss due to encryption of files
17. What does the ‘Personal Data Protection Bill, 2019’ aim to do in India?
A) Control online advertising
B) Set up a national database of citizens
C) Regulate the collection, storage, and processing of personal data
D) Prevent all cyber threats
Answer: C) Regulate the collection, storage, and processing of personal data
18. Which of the following is a key challenge to implementing effective cybersecurity in India?
A) Lack of public awareness
B) Excessive funding for cybersecurity initiatives
C) Strong legal frameworks
D) Widespread adoption of artificial intelligence
Answer: A) Lack of public awareness
19. Which of the following is a commonly used method for identifying malware in a system?
A) Data encryption
B) Antivirus software
C) Firewalls
D) Data mining
Answer: B) Antivirus software
20. Which of the following is a cybercrime where a hacker attempts to gain access to a user’s confidential data using social engineering techniques?
A) Malware attack
B) Phishing
C) SQL injection
D) DDoS attack
Answer: B) Phishing
21. Which of the following is one of the solutions for cybersecurity threats in India?
A) Increasing online surveillance
B) Strengthening encryption standards
C) Reducing public access to the internet
D) Banning digital transactions
Answer: B) Strengthening encryption standards
22. Which of the following is NOT a feature of the Indian Computer Emergency Response Team (CERT-In)?
A) Monitoring cyber threats
B) Providing cybersecurity awareness
C) Setting up data centers
D) Responding to cyber incidents
Answer: C) Setting up data centers
23. Which of the following is a key vulnerability in mobile devices from a cybersecurity perspective?
A) Limited storage capacity
B) Use of outdated software and apps
C) Difficulty in accessing apps
D) Compatibility with cloud services
Answer: B) Use of outdated software and apps
24. What is the function of the Cyber Crime Prevention Against Women and Children (CCPWC) initiative in India?
A) Prevent cyberbullying
B) Promote cybersecurity awareness
C) Address online crimes against women and children
D) Develop secure software applications
Answer: C) Address online crimes against women and children
25. Which of the following is a feature of the ‘National Cyber Coordination Centre’ (NCCC)?
A) Implement cybersecurity policies
B) Coordinate with international cybersecurity agencies
C) Provide cybersecurity training for law enforcement
D) Conduct real-time cyber threat monitoring
Answer: D) Conduct real-time cyber threat monitoring
26. Which of the following is a key reason for the rise in cybersecurity threats in India?
A) Increased digitization of government services
B) Rapid adoption of cloud computing
C) Growing number of internet users
D) All of the above
Answer: D) All of the above
27. Which type of cyberattack involves an attacker gaining unauthorized control over a system or network for malicious purposes?
A) Hacking
B) Phishing
C) Data breach
D) DDoS attack
Answer: A) Hacking
28. What is the role of the National Critical Information Infrastructure Protection Centre (NCIIPC) in India?
A) Providing cybersecurity training to civilians
B) Protecting critical infrastructure from cyber attacks
C) Regulating internet traffic
D) Developing cybersecurity technologies
Answer: B) Protecting critical infrastructure from cyber attacks
29. Which of the following is a common practice to secure internet communications?
A) Social engineering
B) Two-factor authentication
C) Hacking
D) Phishing
Answer: B) Two-factor authentication
30. Which Indian organization is responsible for setting guidelines and standards for cybersecurity in the country?
A) National Security Council
B) Indian Computer Emergency Response Team (CERT-In)
C) Ministry of Home Affairs
D) Telecom Regulatory Authority of India
Answer: B) Indian Computer Emergency Response Team (CERT-In)