Skip to content

MCQs with answers on “Cybersecurity in India: Threats and Solutions” 

 

1. Which of the following is the primary government body responsible for cybersecurity in India?

A) Ministry of Defence
B) National Security Council
C) CERT-In
D) Ministry of Electronics and Information Technology (MeitY)

Answer: C) CERT-In


2. What is the main purpose of the National Cyber Security Policy 2013 in India?

A) To protect digital identity
B) To create a secure cyberspace for citizens
C) To regulate internet service providers
D) To develop new cyber technologies

Answer: B) To create a secure cyberspace for citizens


3. Which of the following is a critical aspect of cybersecurity?

A) Data encryption
B) Data analysis
C) Web development
D) Cloud computing

Answer: A) Data encryption


4. Which of the following threats is primarily associated with the unauthorized access to data or systems?

A) Phishing
B) Malware
C) Hacking
D) Data breach

Answer: C) Hacking


5. Which of the following laws governs the protection of personal data in India?

A) Information Technology Act, 2000
B) Personal Data Protection Bill, 2019
C) National Cyber Security Policy, 2013
D) Telecom Regulatory Authority of India Act, 1997

Answer: B) Personal Data Protection Bill, 2019


6. Which of the following is NOT a type of cyber threat?

A) Phishing
B) Ransomware
C) Firewall
D) Spyware

Answer: C) Firewall


7. The ‘Zero Trust’ cybersecurity model primarily focuses on:

A) Trusting external networks
B) Granting access based on user identity
C) Preventing cyber attacks through physical barriers
D) Not trusting anyone inside or outside the network by default

Answer: D) Not trusting anyone inside or outside the network by default


8. Which organization was set up by the Government of India to handle cyber incidents?

A) Cyber Crime Investigation Cell
B) Indian Cyber Crime Coordination Centre
C) CERT-In
D) NIA

Answer: C) CERT-In


9. What is the key feature of a Distributed Denial of Service (DDoS) attack?

A) Infiltration of databases
B) Overloading a system with traffic to make it unavailable
C) Sending malicious emails
D) Theft of user credentials

Answer: B) Overloading a system with traffic to make it unavailable


10. Which of the following is a method used to protect data during transmission over a network?

A) Data mining
B) Data encryption
C) Web scraping
D) Spam filtering

Answer: B) Data encryption


11. What does the term ‘phishing’ refer to in the context of cybersecurity?

A) Hacking a network
B) Attempting to steal sensitive data via fraudulent means
C) The spread of computer viruses
D) Breaking into secure servers

Answer: B) Attempting to steal sensitive data via fraudulent means


12. Which of the following is an example of a cyber attack targeting individuals’ personal information?

A) Ransomware
B) Phishing
C) Malware
D) DDoS attack

Answer: B) Phishing


13. Which technology is often used to secure online transactions in India?

A) Blockchain
B) Artificial Intelligence
C) Virtual Private Network (VPN)
D) Data mining

Answer: A) Blockchain


14. What is the function of a firewall in cybersecurity?

A) Prevent data loss
B) Block unauthorized access to a network
C) Encrypt communication channels
D) Monitor user behavior

Answer: B) Block unauthorized access to a network


15. Which Indian government initiative aims to improve the cybersecurity infrastructure in the country?

A) Digital India
B) BharatNet
C) National Cyber Security Coordinator (NCSC)
D) Atal Innovation Mission

Answer: C) National Cyber Security Coordinator (NCSC)


16. Which of the following is a potential consequence of a ransomware attack?

A) Financial loss due to encryption of files
B) Theft of personal information
C) Data corruption
D) Website defacement

Answer: A) Financial loss due to encryption of files


17. What does the ‘Personal Data Protection Bill, 2019’ aim to do in India?

A) Control online advertising
B) Set up a national database of citizens
C) Regulate the collection, storage, and processing of personal data
D) Prevent all cyber threats

Answer: C) Regulate the collection, storage, and processing of personal data


18. Which of the following is a key challenge to implementing effective cybersecurity in India?

A) Lack of public awareness
B) Excessive funding for cybersecurity initiatives
C) Strong legal frameworks
D) Widespread adoption of artificial intelligence

Answer: A) Lack of public awareness


19. Which of the following is a commonly used method for identifying malware in a system?

A) Data encryption
B) Antivirus software
C) Firewalls
D) Data mining

Answer: B) Antivirus software


20. Which of the following is a cybercrime where a hacker attempts to gain access to a user’s confidential data using social engineering techniques?

A) Malware attack
B) Phishing
C) SQL injection
D) DDoS attack

Answer: B) Phishing


21. Which of the following is one of the solutions for cybersecurity threats in India?

A) Increasing online surveillance
B) Strengthening encryption standards
C) Reducing public access to the internet
D) Banning digital transactions

Answer: B) Strengthening encryption standards


22. Which of the following is NOT a feature of the Indian Computer Emergency Response Team (CERT-In)?

A) Monitoring cyber threats
B) Providing cybersecurity awareness
C) Setting up data centers
D) Responding to cyber incidents

Answer: C) Setting up data centers


23. Which of the following is a key vulnerability in mobile devices from a cybersecurity perspective?

A) Limited storage capacity
B) Use of outdated software and apps
C) Difficulty in accessing apps
D) Compatibility with cloud services

Answer: B) Use of outdated software and apps


24. What is the function of the Cyber Crime Prevention Against Women and Children (CCPWC) initiative in India?

A) Prevent cyberbullying
B) Promote cybersecurity awareness
C) Address online crimes against women and children
D) Develop secure software applications

Answer: C) Address online crimes against women and children


25. Which of the following is a feature of the ‘National Cyber Coordination Centre’ (NCCC)?

A) Implement cybersecurity policies
B) Coordinate with international cybersecurity agencies
C) Provide cybersecurity training for law enforcement
D) Conduct real-time cyber threat monitoring

Answer: D) Conduct real-time cyber threat monitoring


26. Which of the following is a key reason for the rise in cybersecurity threats in India?

A) Increased digitization of government services
B) Rapid adoption of cloud computing
C) Growing number of internet users
D) All of the above

Answer: D) All of the above


27. Which type of cyberattack involves an attacker gaining unauthorized control over a system or network for malicious purposes?

A) Hacking
B) Phishing
C) Data breach
D) DDoS attack

Answer: A) Hacking


28. What is the role of the National Critical Information Infrastructure Protection Centre (NCIIPC) in India?

A) Providing cybersecurity training to civilians
B) Protecting critical infrastructure from cyber attacks
C) Regulating internet traffic
D) Developing cybersecurity technologies

Answer: B) Protecting critical infrastructure from cyber attacks


29. Which of the following is a common practice to secure internet communications?

A) Social engineering
B) Two-factor authentication
C) Hacking
D) Phishing

Answer: B) Two-factor authentication


30. Which Indian organization is responsible for setting guidelines and standards for cybersecurity in the country?

A) National Security Council
B) Indian Computer Emergency Response Team (CERT-In)
C) Ministry of Home Affairs
D) Telecom Regulatory Authority of India

Answer: B) Indian Computer Emergency Response Team (CERT-In)

Cart
Back To Top
error: Content is protected !!