Cyber Crime Solved MCQs Questions Answers.By: Prof. Dr. Fazal Rehman | Last updated: April 15, 2025 15 Score: 0 Attempted: 0/15 Subscribe 1. Which one option is not a type of cybercrime? (A) Data theft (B) Forgery (C) Damage to data and systems (D) Installing antivirus for protection 2. McAfee is an example of (A) Photo Editing Software (B) Quick Heal (C) Virus (D) Antivirus 3. Cyber-crime can be categorized into ________ types. (A) 4 (B) 3 (C) 2 (D) 6 4. Which of the following is not a type of peer-to-peer cyber-crime? (A) Phishing (B) Injecting Trojans to a target victim (C) MiTM (D) Credit card details leak in the deep web 5. Which of the following is not an example of a computer as a weapon cyber-crime? (A) Credit card fraudulent (B) Spying someone using keylogger (C) IPR Violation (D) Pornography 6. Which of the following is not done by cybercriminals? (A) Unauthorized account access (B) Mass attack using Trojans as botnets (C) Email spoofing and spamming (D) Report vulnerability in any system 7. What is the name of the IT law that India is having in the Indian legislature? (A) India’s Technology (IT) Act, 2000 (B) India’s Digital Information Technology (DIT) Act, 2000 (C) India’s Information Technology (IT) Act, 2000 (D) The Technology Act, 2008 8. In which year India’s IT Act came into existence? (A) 2000 (B) 2001 (C) 2002 (D) 2003 9. What is the full form of ITA-2000? (A) Information Tech Act -2000 (B) Indian Technology Act -2000 (C) International Technology Act -2000 (D) Information Technology Act -2000 10. Under which section of the IT Act, stealing any digital asset or information is written a cyber-crime? (A) 65 (B) 65-D (C) 67 (D) 70 11. The first computer virus is ——– (A) I Love You (B) Blaster (C) Sasser (D) Creeper 12. Which of the following is known as Malicious software? (A) illegal war (B) badware (C) malware (D) malicious ware 13. To protect a computer from virus, you should install ——– on your computer. (A) backup wizard (B) disk cleanup (C) antivirus (D) disk defragmenter 14. How to track Email? (A) Read notify (B) Self distracting (C) Spy pin (D) Gmail 15. What are the types of password attacks? (A) Electronic Attack (B) Nonelectronic attack (C) Man in the middle attack (D) Shoulder surfing Read More MCQs on Digital Marketing SET 1: Digital Marketing MCQs SET 2: Digital Marketing MCQs SET 3: Social Networks MCQs Search Engines MCQs Cyber Crime Solved MCQs Internet MCQs Internet and Email MCQs More MCQs of Networking Internet and Web Router MCQs Storage area network MCQs Networking Important MCQs Network Security MCQs Electrical Network Analysis MCQs Networking Programming MCQs Social Networks MCQs Network Layers OSI Model MCQs Digital Communication MCQs Telecommunication MCQs Transmission and switching MCQs Networking topologies Solved MCQs Computer Network MCQs for Lecturer Test Mobile and Wireless Network MCQs Cyber Crime Solved MCQs Internet Protocols MCQs Internet MCQs Web Security and forensics MCQs Web Security and forensics MCQs 2 Wireless Security MCQs Datalink layer OSI Model MCQs Physical Layer OSI Model MCQs 7 layers OSI Model MCQs Application Layer MCQs WIFI MCQs Internet and Email MCQs Networking MCQs Public Service Commission network administrator MCQs LINUX MCQ’s Linux File Permissions MCQs Linux File Permissions MCQs 2 Linux Startup and Shutdown MCQs Linux process Management MCQs More MCQs of Networking on T4Tutorials Related Posts:Speech on Cyber Crime [1, 2, 3, 5 Minutes]Online National Crime Repository Project in PHPCRIME MANAGEMENT SYSTEM Project in C#.NetWhich of the following is the first South Asian country to declare match-fixing a crime?Basic Computer Security and Cyber Threats MCQsSpeech on Cyber security [1, 2, 3, 5 Minutes]