Skip to content

MCQs with answers on India’s Cybersecurity Framework: Progress and Challenges 

1. What is the primary objective of India’s National Cyber Security Policy 2013?

a) To promote digital literacy
b) To protect India’s cyberspace from cyber threats
c) To support global trade
d) To regulate the use of the internet
Answer: b) To protect India’s cyberspace from cyber threats

2. Which of the following is the nodal agency for cybersecurity in India?

a) Ministry of Electronics and Information Technology (MeitY)
b) National Security Council Secretariat (NSCS)
c) Indian Computer Emergency Response Team (CERT-In)
d) Reserve Bank of India (RBI)
Answer: c) Indian Computer Emergency Response Team (CERT-In)

3. Which cyber attack incident is most commonly associated with the rise of cybercrimes in India?

a) Ransomware attacks
b) Distributed Denial of Service (DDoS) attacks
c) Data theft and phishing attacks
d) Man-in-the-middle attacks
Answer: c) Data theft and phishing attacks

4. Which international standard does India follow for securing its cyberspace?

a) ISO/IEC 27001
b) GDPR
c) HIPAA
d) Sarbanes-Oxley Act
Answer: a) ISO/IEC 27001

5. What is the purpose of the Cyber Swachhta Kendra (CSK)?

a) To monitor internet traffic
b) To offer cybersecurity skills training
c) To provide free antivirus software
d) To promote ethical hacking
Answer: c) To provide free antivirus software

6. Which act was enacted in India in 2000 to deal with cybercrimes and electronic commerce?

a) Indian Penal Code (IPC)
b) Information Technology Act, 2000
c) Digital India Act
d) Cyber Security Act
Answer: b) Information Technology Act, 2000

7. Which initiative was launched to develop a robust cybersecurity ecosystem in India?

a) Digital India
b) Smart Cities Mission
c) National Cyber Security Policy
d) Atmanirbhar Bharat
Answer: c) National Cyber Security Policy

8. What is the primary challenge faced by India in implementing cybersecurity measures?

a) Insufficient funding
b) Lack of awareness and skilled professionals
c) Lack of international cooperation
d) Lack of legal frameworks
Answer: b) Lack of awareness and skilled professionals

9. Which of the following is the primary role of CERT-In?

a) Developing encryption standards
b) Monitoring national cybersecurity threats
c) Regulating e-commerce
d) Promoting internet literacy
Answer: b) Monitoring national cybersecurity threats

10. Which program was launched by the Government of India for training cybersecurity professionals?

a) Skill India Program
b) Cyber Surakshit Bharat
c) Digital India Mission
d) Start-Up India Initiative
Answer: b) Cyber Surakshit Bharat

11. Which cybersecurity attack involves unauthorized access to networks or systems to steal sensitive data?

a) Phishing
b) Ransomware
c) Hacking
d) Virus attack
Answer: c) Hacking

12. Which ministry is responsible for implementing the National Cyber Security Policy in India?

a) Ministry of Electronics and Information Technology
b) Ministry of Home Affairs
c) Ministry of Finance
d) Ministry of External Affairs
Answer: a) Ministry of Electronics and Information Technology

13. What is the main aim of the ‘Digital India’ initiative?

a) To secure digital transactions
b) To enable digital infrastructure and services
c) To create a digital army
d) To regulate the internet industry
Answer: b) To enable digital infrastructure and services

14. What is India’s current position globally in terms of cybersecurity readiness?

a) 10th
b) 20th
c) 40th
d) 50th
Answer: c) 40th

15. What does the acronym ‘DDoS’ stand for in the context of cybersecurity?

a) Data Delivery Operating System
b) Distributed Denial of Service
c) Direct Digital Online Service
d) Digital Denial of Services
Answer: b) Distributed Denial of Service

16. Which global cybersecurity framework is being considered for adoption in India to improve its security posture?

a) NIST Cybersecurity Framework
b) CIS Controls
c) ISO/IEC 27000 series
d) GDPR
Answer: a) NIST Cybersecurity Framework

17. What is one of the most common types of cybercrime in India?

a) Identity theft
b) Phishing
c) Distributed denial of service (DDoS)
d) Ransomware
Answer: b) Phishing

18. Which cyber security measure involves converting sensitive data into an unreadable format?

a) Firewall protection
b) Encryption
c) Anti-virus protection
d) Public-key infrastructure
Answer: b) Encryption

19. What is the role of the National Critical Information Infrastructure Protection Centre (NCIIPC)?

a) To monitor economic activity
b) To protect critical information infrastructure from cyber attacks
c) To promote digital literacy
d) To regulate the IT industry
Answer: b) To protect critical information infrastructure from cyber attacks

20. Which of the following organizations in India is responsible for issuing the national cybersecurity strategy?

a) Ministry of Information and Broadcasting
b) National Cyber Coordination Centre (NCCC)
c) Indian Computer Emergency Response Team (CERT-In)
d) National Security Council Secretariat (NSCS)
Answer: d) National Security Council Secretariat (NSCS)

21. Which technology is crucial for securing online banking transactions?

a) Blockchain
b) Cloud computing
c) Quantum computing
d) Artificial Intelligence
Answer: a) Blockchain

22. The ‘Indian Cyber Crime Coordination Centre (I4C)’ was established to:

a) Monitor foreign cyber threats
b) Conduct cyber forensic investigations
c) Strengthen India’s e-commerce ecosystem
d) Coordinate cybercrime efforts across India
Answer: d) Coordinate cybercrime efforts across India

23. Which cyber attack is commonly used to disrupt the functioning of websites by overwhelming them with internet traffic?

a) Phishing
b) Ransomware
c) Distributed Denial of Service (DDoS)
d) Malware
Answer: c) Distributed Denial of Service (DDoS)

24. What does the Government of India’s ‘Cybercrime Helpline’ provide?

a) Legal advice on cybercrimes
b) Free cybersecurity software
c) A platform to report cybercrimes
d) Training on ethical hacking
Answer: c) A platform to report cybercrimes

25. What is the main reason behind the rise in cybercrimes in India?

a) Inadequate cybersecurity laws
b) Lack of awareness
c) Increased internet penetration
d) Insufficient cybersecurity technology
Answer: b) Lack of awareness

26. The ‘Personal Data Protection Bill’ is designed to:

a) Strengthen the data protection laws in India
b) Regulate the internet usage in India
c) Monitor the data flows within India
d) Monitor financial transactions online
Answer: a) Strengthen the data protection laws in India

27. Which of the following is NOT a key element of India’s cybersecurity strategy?

a) Awareness and capacity building
b) Strengthening cybersecurity infrastructure
c) Internet regulation
d) Legal framework for cybercrime
Answer: c) Internet regulation

28. Which Indian entity is responsible for monitoring and analyzing cybersecurity threats in the country?

a) Ministry of Home Affairs
b) CERT-In
c) National Security Council Secretariat (NSCS)
d) RBI
Answer: b) CERT-In

29. India’s ‘Digital India’ program focuses on:

a) Providing digital literacy
b) Protecting data from cyber threats
c) Internet penetration
d) All of the above
Answer: d) All of the above

30. What does ‘cyber hygiene’ mean in the context of cybersecurity?

a) Regular updates to software and passwords
b) Physical security of devices
c) Protecting personal data
d) Monitoring internet traffic
Answer: a) Regular updates to software and passwords

Cart
Back To Top
error: Content is protected !!