GK On Cyber Security: Cyber Crime, Cyber Attack

GK On Cyber Security

Last Updated: 22 December 2023

Cyber Security is the Protection of Your, Your Family, Your Client’s Computer System, and the Network associated with it.

It is the protection of the Computer System from the theft of Passwords, Documents, Files, etc, and damage to the Hardware, Software, and Electronic data.

As we get more into the Digital World every day, Cyber Security has become a very important part of the Internet today and a major challenge to make it secure.

In this article, you will learn about Cyber Attacks, Cyber Crimes, and we also included Cyber Security Exam Questions and Answers. Read all the GK On Cyber Security, Cyber Crime, Cyber Law, Cyber Attacks, and the current affairs of Cyber Security. A list of Cyber Offenses with Penalties is mentioned on the last page.

GK On Cyber Security

1. What are the 5 Major Types of Cyber Security?

1) Critical Infrastructure Security
2) Cloud Security
3) Network Security
4) Application Security
5) Internet of Things Security (IoT)

2. What are the 10 Common Types of Cyber Attacks?

1) Malware
2) Denial-Of-Service
3) Man-In-The-Middle
4) Phishing
5) SQL Injection
6) Zero-Day Exploit
7) DNS Tunneling
8) Eavesdropping
9) Direct-Access
10) Cross-Site Scripting

3. What does VPN stand for?

Answer: Virtual Private Network

4. What is the full form of DOS and DDoS?

DoS: Denial of Service
DDoS: Distributed Denial of Service

5. What is the full form of the IP Address?

Answer: Internet Protocol Address

6. Which is more secure HTTP or HTTPS?

Answer: HTTPS

7. What is the full form of HTTPS?

Answer: Hypertext Transfer Protocol Secure

8. What does HTML stand for?

Answer: Hypertext Markup Language

9. What does XML stand for?

Answer: eXtensible Markup Language

10. Which programs are used by the FBI and NSA to Eavesdrop on the systems of ISPs?

Answer: Carnivore and NarusInSight

Related: Computer General Knowledge Questions And Answers: Basic To Advanced

11. What does ISP stand for?

Answer: Internet Service Provider

12. Which Law was introduced in India to deal with Cyber Crime and Electronic Commerce?

Answer: The Information Technology Act (2000)

13. Who Signed The Information Technology Act?

Answer: President K. R. Narayanan (9 May 2000)

14. Full-Form of MeitY?

Answer: Ministry of Electronics and Information Technology

15. When was the Ministry of Electronics and Information Technology Founded?

Answer: 19 July 2016

16. Where is the Headquarters of the Ministry of Electronics and Information Technology?

Answer: New Delhi

17. What is the Penalty for Hacking Computer Systems in India?

Answer: Imprisonment up to 3 Years, or/and with a Fine up to ₹500,000

18. What is the name of a Cyber Attack where sensitive information such as usernames, passwords, and credit card details are acquired directly from users by deceiving them?

Answer: Phishing

19. What is Tampering in Cyber Attack?

Answer: Malicious Modification and Alteration of Data

20. What are the different Channels used by Cyber Attackers?

1) Email
2) Phone Call
3) SMS
4) Pop-ups
5) DNS

Related: 100+ Maths General Knowledge Questions And Answers PDF

21. What is the Full Form of CSAM?

Answer: Child S*xual Abuse Material

22. What are the Major Types of Cyber Attackers?

1) Cyber Criminals
2) Hacktivists
3) State-Sponsored Attackers
4) Insider Threats

23. What is the full form of NSA?

Answer: National Security Agency

24. What are the Major Insider Threats?

1) Accidental Leaks
2) Malicious
3) Data Theft
4) Negligent
5) Compromised Users

25. What does MAC Address stand for?

Answer: Media Access Control Address

26. What is the full form of DNS?

Answer: Domain Name System

27. What is the full form of SIEM?

Answer: Security Information and Event Management

28. What are some of the Major Cyber Security Job Titles?

1) Security Analyst
2) Security Engineer
3) Security Architect
4) Security Administrator
5) Chief Information Security Officer (CISO)
6) Chief Security Officer (CSO)
7) Security Consultant
8) Security Specialist
9) Security Intelligence

29. What does FTP stand for?

Answer: File Transfer Protocol

30. What is the use of Anti Virus?

1) Data Security
2) Protection from Viruses, Spyware, Malware
3) Protection from Rootkits, Trojans, Phishing Attacks, Spam Attack
4) Protection from Cyber Threats

Related: List Of All Apple iOS Version History And The First iPhone (2024)

31. What does CAPTCHA stand for?

Answer: Completely Automated Public Turing (test to tell) Computers and Humans Apart

32. When was the Major Amendment made for the Indian Information Technology Act?

Answer: 2008

33. What is Section 67?

Answer: Offence for publishing information that is obscene in electronic form

34. What is the penalty for Section 67 Offence?

Answer: Imprisonment for 5 Years with ₹1,000,000 Fine

35. Which Cyber Offence is Imprisonment for Lifetime?

Answer: Acts of Cyber Terrorism (Section 66F)

36. Which Cyber Offence is Imprisonment for 10 Years?

Answer: Securing access or attempting to secure access to a protected system (Section 70)

37. Which Indian Non-Profit Organisations Work on Cyber Safety?

1) Information Sharing and Analysis Center (ISAC)
2) End Now Foundation
3) Incognito Forensic Foundation
4) Filternet Foundation

38. What is the name of the Cyber-Attack that targets the vulnerabilities on the Databases?

Answer: SQL Injection

39. What are the 3 Main Types of Vulnerability in Cyber Security?

1) Porous Defenses
2) Risky Resource Management
3) Insecure Interaction Between Components

40. What is the name of the Famous Operating System majorly developed for Hackers and Software Testers?

Answer: Kali Linux

Related: List Of All macOS Version History (1997 to 2024)

41. What is Machine Code written in?

Answer: Machine Language

42. What is the X in Email X, MAC X, and Biometric X?

Answer: Spoofing

43. What does SSL Stand for?

Answer: Secure Sockets Layer

44. What does TLS Stand for?

Answer: Transport Layer Security

45. Nonprofit Organisations that safeguard public and private organizations against Cyber Threats?

Answer: Center for Internet Security (CIS)

46. The Technique to obtain sensitive information such as usernames and passwords of Facebook?

Answer: Phishing

47. The other name of Poké Virus?

Answer: Pikachu virus

48. What is the Name of the First Personal Computer Virus?

Answer: Elk Cloner (1982)

49. Name of the First Computer virus for MS-DOS?

Answer: Brain (1986)

50. Who is known for the Invention of Computer Virus Defense Techniques?

Answer: Fred Cohen

Related: List of Programming Languages and Their Developers

Types Of Security And Privacy

1Access Control11Firewall
2Anti-Keyloggers12Intrusion Detection System (IDS)
3Anti-Malware13Intrusion Prevention System (IPS)
4Anti-Spyware14Log Management Software
5Anti-Subversion Software15Parental Control
6Anti-Tamper Software16Records Management
8Antivirus Software18Security Information Management
9Cryptographic Software19SIEM
10Computer-Aided Dispatch (CAD)20Software and Operating System Update

51. Who made McAfee Antivirus?
Answer: John McAfee

52. Which Company developed Norton Antivirus?
Answer: Symantec Corporation

53. Who coined the term “Computer Virus”?
Answer: Fred Cohen

54. What does the term Threat, Vulnerability, and Risk mean?
1) Threat: The Potential to cause harm by destroying the data of a system
2) Vulnerability: Weaknesses in a Computer System
3) Risk: Potential Damage when threat exploits the vulnerability

55. What are the full forms of IDS and IPS?
IDS: Intrusion Detection Systems
IPS: Intrusion Prevention Systems

56. What is CDN?
Answer: Content Delivery Network

57. What is Error 404 Not Found?
Answer: HTTP response code where the browser was able to communicate with a given server, but the server could not find the requested webpage.

58. What is XSS?
Answer: Cross-Site Scripting

59. What is CSRF?
Answer: Cross-Site Request Forgery

60. What does BIOS stand for?
Answer: Basic Input/Output System

Related: Qualcomm Snapdragon Processor List (2024 Updated)

61. What is the CIA in Cyber Security?
Answer: Confidentiality, Integrity, and Availability

62. What does WWW stand for?
Answer: World Wide Web

63. What is the full form of Malware?
Answer: Malicious Software

64. Which attacks take place when there is an excessive amount of data flow that the system cannot handle?
Answer: The Buffer Overflow Attack

65. An example of Physical Hacking?
Answer: Inserting Malware loaded USB to a Computer System

66. Which method of Cyber Attack will record all your Keystrokes?
Answer: keylogging

67. What is a Computer Worm?
Answer: It is Malware that spreads copies of itself without any human interaction from computer to computer.

68. What is Stuxnet?
Answer: Computer Worm

69. A program used for recording and tracking users’ keystrokes?
Answer: keylogger

70. Which Cyber Attack is not wireless?
Answer: Phishing

Related: List Of All Social Networking Sites And Their Founders (2024 Updated)

71. How many key elements constitute the Security Structure?
Answer: 4 (Four)

72. What is Integrity in Cyber Security?
Answer: Protection of your data from modification by unknown users

73. What is Confidentiality in Cyber Security?
Answer: Protection of your information from being accessed by unknown users

74. When does Data Tampering occur in Cyber Security?
Answer: Lack of Integrity in a Security System

75. Expert groups, that handle Computer Security Incidents?
Answer: Computer emergency response team (CERT)

76. Name the technical Intelligence Agency that acts under the National Security Advisor of India in the Prime Minister’s Office?
Answer: National Technical Research Organisation (NTRO)

77. When was NTRO founded?
Answer: 2004

78. Which Database is used by Google?
Answer: Bigtable

79. What is the name of the First Computer Virus that fills up the hard drive until a Computer could not operate any further?
Answer: Creeper System

80. What Is Data Encryption?
Answer: Convert Data into another form so that only people with a secret key or password can read it.

Related: List Of Top Websites On the Internet And Their Founders

81. Full form of Computer “VIRUS”?
Answer: Vital Information Resources Under Seize

82. What is a Trojan Horse?
Answer: A Computer Virus

83. What is a Code Red?
Answer: Computer Worm

84. Which hacker was arrested in 1995 and Prisoned for 5 Years?
Answer: Kevin Mitnick

85. What is the name of the Act that governs Internet usage in India?
Answer: Information Technology Act (2000)

86. What are the Top 5 Cyber Crimes?
1) Phishing scams
2) Online Harassment
3) Identity Theft scam
4) Invasion of privacy
5) Cyberstalking

87. How can I report Cyber Crime?
Answer: Filing a Complaint on National Cyber Crime Reporting Portal

88. Plan of Actions designed to improve the security and resilience of national infrastructures and services in India?
Answer: National Cyber Security Strategy (NCSS)

89. What Technology is used for Hiding Information inside a picture?
Answer: Steganography

90. What is the name of the Attack that uses a Fraudulent Server with a relay address?
Answer: Man-In-The-Middle Attack (MITM)

Related: Android Operating System History: Version, Name, Release Date

91. Why would a Hacker use a Proxy Server?
Answer: To hide Malicious Activity on the Internet

92. What is the Penalty for Publishing Child P*rn?
Answer: ₹1,000,000 Fine and 5 Years in Prison

93. Name the response protocol that is widely used for querying databases?
Answer: WHOIS

94. What is the name of the tool that can be used for SNMP Enumeration?
Answer: IP Network Browser

95. What is the full form of SNMP?
Answer: Simple Network Management Protocol

96. Which form of Encryption does WPA use?
Answer: Temporal Key Integrity Protocol (TKIP)

97. What does URL Stand for?
Answer: Uniform Resource Locator

98. Who manages the Domain Name registration process and the assignment of IP) addresses to the ISPs?
Answer: Internet Corporation for Assigned Names and Numbers (ICANN)

99. Which type of scan contains a Sequence Number of 0 and sets NO flags?
Answer: Null Scan

100. What is a Proxy Server?
Answer: Server that acts as a gateway between You and the Internet

List Of Offenses And Corresponding Penalties

65Tampering with Computer Source Documents₹200,0003 Years
66Hacking with Computer System₹500,0003 Years
66BReceiving Stolen Computer or Communication Device₹100,0003 Years
66CUsing the Password of Another Person₹100,0003 Years
66DCheating using Computer Resource₹100,0003 Years
66EPublishing Private Images of Others₹200,0003 Years
66FActs of Cyber TerrorismLifetime
67Publishing Information which is Obscene in Electronic Form₹1,000,0005 Years
67APublishing Images Containing S*xual Acts₹1,000,0007 Years
67BPublishing Child P*rn or Predating Children Online₹1,000,0005 Years
67CFailure to Maintain Records3 Years
68Failure/Refusal to Comply with Orders₹100,0002 Years
69Failure/Refusal to Decrypt Data7 Years
70Securing Access or Attempting to Secure Access to a Protected System10 Years
71Misrepresentation₹100,0002 Years
Read More


Please enter your comment!
Please enter your name here