Skip to content

MCQs with answers on the topic “Cybercrime in the Age of Digital Transactions: Threats and Solutions”

1. Which of the following is the most common form of cybercrime in the age of digital transactions?

A) Phishing
B) Malware
C) Ransomware
D) Denial-of-service attacks

Answer: A) Phishing


2. What is the primary objective of a phishing attack?

A) To steal personal information
B) To delete important files
C) To disrupt computer networks
D) To monitor internet usage

Answer: A) To steal personal information


3. Which of the following is an example of a digital transaction that is vulnerable to cybercrime?

A) Online banking
B) In-person payments
C) Cash transactions
D) Bartering

Answer: A) Online banking


4. What is the term used for the practice of attempting to gain unauthorized access to systems or networks?

A) Cyberterrorism
B) Hacking
C) Phishing
D) Data leakage

Answer: B) Hacking


5. Which of the following is NOT a solution to combat cybercrime in digital transactions?

A) Encryption
B) Strong passwords
C) Two-factor authentication
D) Ignoring software updates

Answer: D) Ignoring software updates


6. What does the term ‘ransomware’ refer to in the context of cybercrime?

A) A type of malware that encrypts files and demands payment to unlock them
B) A method of stealing credit card information
C) A tool used for phishing attacks
D) A process of blocking access to websites

Answer: A) A type of malware that encrypts files and demands payment to unlock them


7. Which of the following is a common form of identity theft in the age of digital transactions?

A) Fake checks
B) Credit card fraud
C) Impersonation via social media
D) Both B and C

Answer: D) Both B and C


8. What is the primary function of a firewall in protecting digital transactions?

A) To encrypt sensitive data
B) To block unauthorized access to a network
C) To monitor user activity
D) To scan files for malware

Answer: B) To block unauthorized access to a network


9. Which regulation aims to protect data and privacy in the European Union?

A) GDPR (General Data Protection Regulation)
B) HIPAA (Health Insurance Portability and Accountability Act)
C) FCRA (Foreign Contribution Regulation Act)
D) CCPA (California Consumer Privacy Act)

Answer: A) GDPR (General Data Protection Regulation)


10. Which of the following is a recommended measure for ensuring secure online payments?

A) Using public Wi-Fi for transactions
B) Enabling two-factor authentication
C) Sharing your PIN over the phone
D) Using easily guessable passwords

Answer: B) Enabling two-factor authentication


11. Which of the following cybercrimes is often associated with digital payment fraud?

A) Phishing
B) Skimming
C) Hacking
D) Data breach

Answer: B) Skimming


12. Which organization monitors and tracks cybercrimes in India?

A) National Cyber Security Agency
B) Cyber Crime Cell of CBI
C) Computer Emergency Response Team (CERT-In)
D) National Internet Crime Agency

Answer: C) Computer Emergency Response Team (CERT-In)


13. What is the purpose of the Payment Card Industry Data Security Standard (PCI DSS)?

A) To provide a secure method for online payments
B) To regulate the use of credit cards worldwide
C) To set security standards for digital payment systems
D) To ensure consumer privacy

Answer: C) To set security standards for digital payment systems


14. What is the primary risk posed by malware in digital transactions?

A) Loss of payment data
B) Slow internet connection
C) High internet costs
D) Inaccurate financial records

Answer: A) Loss of payment data


15. Which of the following is a type of software used to exploit vulnerabilities in systems and digital transactions?

A) Virus
B) Trojan Horse
C) Adware
D) All of the above

Answer: D) All of the above


16. Which one of the following is an emerging threat in digital transactions?

A) Quantum hacking
B) Fake invoices
C) Phishing emails
D) Mobile app fraud

Answer: A) Quantum hacking


17. Which of the following is an example of a cybercrime committed through mobile applications?

A) SIM card cloning
B) ATM card skimming
C) Mobile app fraud
D) Email spoofing

Answer: C) Mobile app fraud


18. What is the main purpose of digital encryption in online transactions?

A) To make transactions faster
B) To hide the identity of users
C) To protect data from unauthorized access
D) To verify user credentials

Answer: C) To protect data from unauthorized access


19. Which type of cybercrime is most likely to disrupt the operations of an e-commerce business?

A) Data breach
B) Distributed Denial-of-Service (DDoS) attack
C) Phishing
D) Intellectual property theft

Answer: B) Distributed Denial-of-Service (DDoS) attack


20. What kind of threat does “man-in-the-middle” (MITM) attacks pose to digital transactions?

A) Interception of data during transmission
B) Unauthorized access to payment systems
C) Corruption of payment data
D) Installation of malicious software

Answer: A) Interception of data during transmission


21. Which technology is used to enhance security during digital payments?

A) Blockchain
B) Virtual Reality
C) Cloud computing
D) 3D printing

Answer: A) Blockchain


22. What does the term “two-factor authentication” refer to in digital transactions?

A) Using two payment methods
B) Authentication with two different passwords
C) Using two independent methods to verify identity
D) Changing passwords every two weeks

Answer: C) Using two independent methods to verify identity


23. Which of the following is a legal framework designed to combat cybercrimes in India?

A) Information Technology Act, 2000
B) Consumer Protection Act, 2019
C) Prevention of Money Laundering Act
D) Indian Penal Code, 1860

Answer: A) Information Technology Act, 2000


24. Which of the following best describes a “data breach”?

A) Unauthorized access to personal data
B) Theft of physical data storage devices
C) Loss of internet connectivity
D) Unauthorized digital payment transactions

Answer: A) Unauthorized access to personal data


25. Which of the following best describes “skimming”?

A) Intercepting emails to steal data
B) Extracting data from credit/debit cards using a card reader
C) Overcharging customers during transactions
D) Creating fake websites to steal credentials

Answer: B) Extracting data from credit/debit cards using a card reader


26. Which of the following measures is most effective in reducing cybercrime risks for digital transactions?

A) Using weak passwords for easy access
B) Regularly updating software and systems
C) Avoiding the use of encryption
D) Ignoring alerts from security software

Answer: B) Regularly updating software and systems


27. Which of the following entities plays a critical role in cybersecurity in digital banking?

A) National Security Agency (NSA)
B) Reserve Bank of India (RBI)
C) Indian Space Research Organization (ISRO)
D) Department of Telecommunications (DoT)

Answer: B) Reserve Bank of India (RBI)


28. Which of the following is an example of a legal framework that protects consumers from digital fraud?

A) Consumer Protection Act, 2019
B) National Security Act, 1980
C) Telecom Regulatory Authority of India (TRAI) Act
D) Payment Systems Act, 2017

Answer: A) Consumer Protection Act, 2019


29. What does the term “cyber hygiene” refer to?

A) Regularly cleaning a computer system
B) Practicing good security practices to avoid cyber threats
C) Keeping a computer in a clean environment
D) Updating passwords every year

Answer: B) Practicing good security practices to avoid cyber threats


30. Which of the following can prevent unauthorized access during digital transactions?

A) Strong and unique passwords
B) Using the same password across all platforms
C) Disabling encryption
D) Ignoring software updates

Answer: A) Strong and unique passwords

Cart
Back To Top
error: Content is protected !!