MCQs with answers on “India’s Approach to Cyber Warfare and National Security”
1. Which of the following organizations is primarily responsible for India’s cybersecurity and protecting its national infrastructure?
- a) Indian Cyber Crime Coordination Centre (I4C)
- b) National Cyber Security Agency (NCSA)
- c) National Technical Research Organisation (NTRO)
- d) Indian Computer Emergency Response Team (CERT-In)
Answer: d) Indian Computer Emergency Response Team (CERT-In)
2. What is the main objective of the “National Cyber Security Policy of India” (2013)?
- a) To create a cybersecurity workforce
- b) To ensure data protection of government systems
- c) To prevent cyber attacks on critical infrastructure
- d) To promote cyber warfare capabilities
Answer: c) To prevent cyber attacks on critical infrastructure
3. The National Cyber Coordination Centre (NCCC) in India is responsible for:
- a) Monitoring and controlling national cyber security
- b) Training cyber experts
- c) Coordinating with foreign agencies on cyber security
- d) Developing cyber weapons for national security
Answer: a) Monitoring and controlling national cyber security
4. Which of the following is an essential component of India’s Cybersecurity Strategy?
- a) Cybersecurity education and training
- b) International cyber warfare alliances
- c) Creation of an offensive cyber unit
- d) Development of cyber weapons for attack
Answer: a) Cybersecurity education and training
5. Which government agency is responsible for the coordination of all cybercrime-related matters in India?
- a) Ministry of Defence
- b) Ministry of Electronics and Information Technology
- c) Central Bureau of Investigation
- d) Indian Computer Emergency Response Team (CERT-In)
Answer: b) Ministry of Electronics and Information Technology
6. In the context of India’s cyber warfare strategy, which of the following is considered a critical infrastructure?
- a) Media organizations
- b) Financial institutions
- c) Social media platforms
- d) Mobile networks
Answer: b) Financial institutions
7. Which country has India signed an agreement with to enhance cooperation in cyber defense and counter cyber threats?
- a) USA
- b) Russia
- c) China
- d) United Kingdom
Answer: a) USA
8. The Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011, were formulated under which Act?
- a) The Indian Penal Code
- b) The Information Technology Act, 2000
- c) The Cybersecurity Act, 2015
- d) The National Cyber Security Act, 2019
Answer: b) The Information Technology Act, 2000
9. Which of the following is a form of cyber warfare that involves unauthorized access to a nation’s data and information systems?
- a) Phishing
- b) Hacking
- c) Malware attacks
- d) All of the above
Answer: d) All of the above
10. Which is India’s first national cyber security policy focused on building national cyber resilience and strategies for data protection?
- a) National Cyber Security Policy 2011
- b) National Cyber Security Policy 2013
- c) Cyber Security Strategy 2016
- d) Cyber Resilience Framework 2020
Answer: b) National Cyber Security Policy 2013
11. Which of the following is a key challenge in India’s approach to cybersecurity?
- a) Limited expertise in cyber defense
- b) Lack of private sector participation
- c) Outdated infrastructure in rural areas
- d) All of the above
Answer: d) All of the above
12. India’s offensive cyber capabilities include:
- a) The use of cyber espionage
- b) Creation of cyber weapons for warfare
- c) Cyber attacks on foreign infrastructure
- d) All of the above
Answer: b) Creation of cyber weapons for warfare
13. Which of the following best describes a ‘botnet’ in the context of cyber warfare?
- a) A computer network used for online marketing
- b) A network of infected computers used for cyber attacks
- c) A secure server for cyber intelligence
- d) A virtual reality platform for warfare simulations
Answer: b) A network of infected computers used for cyber attacks
14. What does the term ‘Zero-day vulnerability’ refer to in cybersecurity?
- a) A weakness in a system that is discovered and exploited before the developer can fix it
- b) A malware infection that spreads through social media
- c) A type of virus that affects antivirus programs
- d) A defense mechanism for detecting cyber attacks
Answer: a) A weakness in a system that is discovered and exploited before the developer can fix it
15. The role of the Indian National Security Council in the context of cyber warfare is to:
- a) Provide legal guidance on cybercrime
- b) Coordinate all security measures including cyber warfare
- c) Develop offensive cyber warfare strategies
- d) Implement cyber defense programs in private sectors
Answer: b) Coordinate all security measures including cyber warfare
16. Which of the following is a legal framework to address cyber crimes in India?
- a) The Indian Penal Code (IPC)
- b) The Information Technology Act, 2000
- c) The Indian Evidence Act
- d) All of the above
Answer: d) All of the above
17. Which international body governs and sets the standards for cybersecurity around the world?
- a) World Health Organization (WHO)
- b) International Telecommunication Union (ITU)
- c) United Nations (UN)
- d) World Trade Organization (WTO)
Answer: b) International Telecommunication Union (ITU)
18. Which type of cyber attack involves overwhelming a system with traffic to make it unavailable?
- a) Phishing
- b) Denial-of-Service (DoS)
- c) Malware
- d) Man-in-the-middle attack
Answer: b) Denial-of-Service (DoS)
19. Which initiative did the Indian government launch to improve cybersecurity awareness and preparedness?
- a) Digital India
- b) Smart Cities Mission
- c) Cyber Swachhta Kendra
- d) BharatNet
Answer: c) Cyber Swachhta Kendra
20. Which of the following is a major source of cyber threats in India?
- a) Cyber terrorism
- b) Organized cyber crime
- c) State-sponsored cyber attacks
- d) All of the above
Answer: d) All of the above
21. What is India’s primary strategy to address cybersecurity threats posed by foreign adversaries?
- a) Building cyber defense systems
- b) Diplomacy and international cooperation
- c) Offensive cyber operations
- d) All of the above
Answer: d) All of the above
22. Which of the following sectors is a target of cyber attacks in India due to its importance in national security?
- a) Financial institutions
- b) Government databases
- c) Telecommunications infrastructure
- d) All of the above
Answer: d) All of the above
23. India’s cybersecurity strategy is aligned with which of the following global standards?
- a) European Union’s GDPR
- b) United Nations’ Global Cybersecurity Agenda
- c) USA’s National Cybersecurity Strategy
- d) Japan’s Cybersecurity and Protection Law
Answer: b) United Nations’ Global Cybersecurity Agenda
24. Which Indian law provides the legal basis for tackling cybercrime and the protection of online information?
- a) Information Technology (Reasonable Security Practices and Procedures) Rules, 2011
- b) Cybersecurity Act, 2015
- c) The Indian Penal Code, 1860
- d) Information Technology Act, 2000
Answer: d) Information Technology Act, 2000
25. Which of the following is an example of a cyber espionage tactic used in cyber warfare?
- a) Launching DoS attacks
- b) Data theft from government agencies
- c) Spreading malware in the financial sector
- d) All of the above
Answer: b) Data theft from government agencies
26. Which of the following is an important element in improving India’s national cybersecurity readiness?
- a) Establishing more cybersecurity institutions
- b) Building local cybersecurity hardware
- c) Encouraging public-private partnerships
- d) Creating global alliances with cyber powers
Answer: c) Encouraging public-private partnerships
27. What is the name of the Indian government’s cyber threat intelligence platform?
- a) Vedic Security Intelligence Network (VSIN)
- b) Indian Cyber Crime Coordination Centre (I4C)
- c) Indian National Cyber Coordination Centre (NCCC)
- d) Cyber Crime Investigation Network and Systems (CIN)
Answer: b) Indian Cyber Crime Coordination Centre (I4C)
28. In the context of India’s defense strategy, which term refers to cyberattacks carried out with the intent to destabilize the nation?
- a) Cyber terrorism
- b) Cyber espionage
- c) Cyber warfare
- d) Cyber hacking
Answer: c) Cyber warfare
29. India has a strategy for cybersecurity governance that emphasizes which of the following principles?
- a) Protection of personal data
- b) Integration of technology and defense
- c) Ensuring cyber sovereignty
- d) All of the above
Answer: d) All of the above
30. Which is India’s primary platform for cybersecurity training and awareness for professionals?
- a) Indian Cyber Crime Coordination Centre (I4C)
- b) Data Security Council of India (DSCI)
- c) National Cyber Security Centre (NCSC)
- d) NASSCOM Cybersecurity Forum
Answer: b) Data Security Council of India (DSCI)
These MCQs aim to cover various aspects of India’s approach to cybersecurity and its management within the context of national security.