Introduction India, with its immense human capital and burgeoning economy, is at a pivotal juncture…
MCQs with answers on the topic “Cybercrime in the Age of Digital Transactions: Threats and Solutions”
1. Which of the following is the most common form of cybercrime in the age of digital transactions?
A) Phishing
B) Malware
C) Ransomware
D) Denial-of-service attacks
Answer: A) Phishing
2. What is the primary objective of a phishing attack?
A) To steal personal information
B) To delete important files
C) To disrupt computer networks
D) To monitor internet usage
Answer: A) To steal personal information
3. Which of the following is an example of a digital transaction that is vulnerable to cybercrime?
A) Online banking
B) In-person payments
C) Cash transactions
D) Bartering
Answer: A) Online banking
4. What is the term used for the practice of attempting to gain unauthorized access to systems or networks?
A) Cyberterrorism
B) Hacking
C) Phishing
D) Data leakage
Answer: B) Hacking
5. Which of the following is NOT a solution to combat cybercrime in digital transactions?
A) Encryption
B) Strong passwords
C) Two-factor authentication
D) Ignoring software updates
Answer: D) Ignoring software updates
6. What does the term ‘ransomware’ refer to in the context of cybercrime?
A) A type of malware that encrypts files and demands payment to unlock them
B) A method of stealing credit card information
C) A tool used for phishing attacks
D) A process of blocking access to websites
Answer: A) A type of malware that encrypts files and demands payment to unlock them
7. Which of the following is a common form of identity theft in the age of digital transactions?
A) Fake checks
B) Credit card fraud
C) Impersonation via social media
D) Both B and C
Answer: D) Both B and C
8. What is the primary function of a firewall in protecting digital transactions?
A) To encrypt sensitive data
B) To block unauthorized access to a network
C) To monitor user activity
D) To scan files for malware
Answer: B) To block unauthorized access to a network
9. Which regulation aims to protect data and privacy in the European Union?
A) GDPR (General Data Protection Regulation)
B) HIPAA (Health Insurance Portability and Accountability Act)
C) FCRA (Foreign Contribution Regulation Act)
D) CCPA (California Consumer Privacy Act)
Answer: A) GDPR (General Data Protection Regulation)
10. Which of the following is a recommended measure for ensuring secure online payments?
A) Using public Wi-Fi for transactions
B) Enabling two-factor authentication
C) Sharing your PIN over the phone
D) Using easily guessable passwords
Answer: B) Enabling two-factor authentication
11. Which of the following cybercrimes is often associated with digital payment fraud?
A) Phishing
B) Skimming
C) Hacking
D) Data breach
Answer: B) Skimming
12. Which organization monitors and tracks cybercrimes in India?
A) National Cyber Security Agency
B) Cyber Crime Cell of CBI
C) Computer Emergency Response Team (CERT-In)
D) National Internet Crime Agency
Answer: C) Computer Emergency Response Team (CERT-In)
13. What is the purpose of the Payment Card Industry Data Security Standard (PCI DSS)?
A) To provide a secure method for online payments
B) To regulate the use of credit cards worldwide
C) To set security standards for digital payment systems
D) To ensure consumer privacy
Answer: C) To set security standards for digital payment systems
14. What is the primary risk posed by malware in digital transactions?
A) Loss of payment data
B) Slow internet connection
C) High internet costs
D) Inaccurate financial records
Answer: A) Loss of payment data
15. Which of the following is a type of software used to exploit vulnerabilities in systems and digital transactions?
A) Virus
B) Trojan Horse
C) Adware
D) All of the above
Answer: D) All of the above
16. Which one of the following is an emerging threat in digital transactions?
A) Quantum hacking
B) Fake invoices
C) Phishing emails
D) Mobile app fraud
Answer: A) Quantum hacking
17. Which of the following is an example of a cybercrime committed through mobile applications?
A) SIM card cloning
B) ATM card skimming
C) Mobile app fraud
D) Email spoofing
Answer: C) Mobile app fraud
18. What is the main purpose of digital encryption in online transactions?
A) To make transactions faster
B) To hide the identity of users
C) To protect data from unauthorized access
D) To verify user credentials
Answer: C) To protect data from unauthorized access
19. Which type of cybercrime is most likely to disrupt the operations of an e-commerce business?
A) Data breach
B) Distributed Denial-of-Service (DDoS) attack
C) Phishing
D) Intellectual property theft
Answer: B) Distributed Denial-of-Service (DDoS) attack
20. What kind of threat does “man-in-the-middle” (MITM) attacks pose to digital transactions?
A) Interception of data during transmission
B) Unauthorized access to payment systems
C) Corruption of payment data
D) Installation of malicious software
Answer: A) Interception of data during transmission
21. Which technology is used to enhance security during digital payments?
A) Blockchain
B) Virtual Reality
C) Cloud computing
D) 3D printing
Answer: A) Blockchain
22. What does the term “two-factor authentication” refer to in digital transactions?
A) Using two payment methods
B) Authentication with two different passwords
C) Using two independent methods to verify identity
D) Changing passwords every two weeks
Answer: C) Using two independent methods to verify identity
23. Which of the following is a legal framework designed to combat cybercrimes in India?
A) Information Technology Act, 2000
B) Consumer Protection Act, 2019
C) Prevention of Money Laundering Act
D) Indian Penal Code, 1860
Answer: A) Information Technology Act, 2000
24. Which of the following best describes a “data breach”?
A) Unauthorized access to personal data
B) Theft of physical data storage devices
C) Loss of internet connectivity
D) Unauthorized digital payment transactions
Answer: A) Unauthorized access to personal data
25. Which of the following best describes “skimming”?
A) Intercepting emails to steal data
B) Extracting data from credit/debit cards using a card reader
C) Overcharging customers during transactions
D) Creating fake websites to steal credentials
Answer: B) Extracting data from credit/debit cards using a card reader
26. Which of the following measures is most effective in reducing cybercrime risks for digital transactions?
A) Using weak passwords for easy access
B) Regularly updating software and systems
C) Avoiding the use of encryption
D) Ignoring alerts from security software
Answer: B) Regularly updating software and systems
27. Which of the following entities plays a critical role in cybersecurity in digital banking?
A) National Security Agency (NSA)
B) Reserve Bank of India (RBI)
C) Indian Space Research Organization (ISRO)
D) Department of Telecommunications (DoT)
Answer: B) Reserve Bank of India (RBI)
28. Which of the following is an example of a legal framework that protects consumers from digital fraud?
A) Consumer Protection Act, 2019
B) National Security Act, 1980
C) Telecom Regulatory Authority of India (TRAI) Act
D) Payment Systems Act, 2017
Answer: A) Consumer Protection Act, 2019
29. What does the term “cyber hygiene” refer to?
A) Regularly cleaning a computer system
B) Practicing good security practices to avoid cyber threats
C) Keeping a computer in a clean environment
D) Updating passwords every year
Answer: B) Practicing good security practices to avoid cyber threats
30. Which of the following can prevent unauthorized access during digital transactions?
A) Strong and unique passwords
B) Using the same password across all platforms
C) Disabling encryption
D) Ignoring software updates
Answer: A) Strong and unique passwords