Cyber Crime – 50 Full-Length MCQ Questions & Answers | ComputerGS
Website: https://www.computergs.online
Category: Cyber Security | Computer Awareness | Competitive Exams
Cyber Crime – 50 Detailed MCQs
1. What is Cyber Crime?
A) Crime without technology
B) Crime using computers and internet
C) Only banking fraud
D) Manual crime
Answer: B
2. Which law deals with cyber crime in India?
A) IPC
B) IT Act 2000
C) RBI Act
D) Banking Act
Answer: B
3. What is hacking?
A) Legal data access
B) Unauthorized access to system
C) Typing
D) Data storage
Answer: B
4. What is phishing?
A) Virus removal
B) Fake emails to steal data
C) File transfer
D) Data backup
Answer: B
5. Malware refers to:
A) Safe software
B) Malicious software
C) Hardware device
D) Antivirus
Answer: B
6. Which of the following is NOT malware?
A) Virus
B) Worm
C) Keyboard
D) Trojan
Answer: C
7. Ransomware is used to:
A) Speed up system
B) Lock data and demand money
C) Delete OS
D) Print files
Answer: B
8. Identity theft means:
A) Creating ID
B) Stealing personal identity
C) Deleting data
D) Editing files
Answer: B
9. Which device protects computer from threats?
A) Mouse
B) Antivirus
C) Printer
D) Monitor
Answer: B
10. IT Act was passed in:
A) 1999
B) 2000
C) 2005
D) 2010
Answer: B
11. Section 66 of IT Act deals with:
A) Hardware
B) Computer-related offences
C) Software
D) Networking
Answer: B
12. Section 66C relates to:
A) Virus
B) Identity theft
C) Email
D) Firewall
Answer: B
13. Section 66D relates to:
A) Cheating by impersonation
B) Data storage
C) Hardware
D) Virus
Answer: A
14. Cyber stalking refers to:
A) Physical tracking
B) Online harassment
C) Gaming
D) Data storage
Answer: B
15. Which is a cyber crime?
A) Typing
B) Phishing
C) Printing
D) Scanning
Answer: B
16. Trojan horse is:
A) Hardware
B) Malware
C) Antivirus
D) Software tool
Answer: B
17. Firewall is used for:
A) Printing
B) Security
C) Gaming
D) Typing
Answer: B
18. Keylogger records:
A) Screen
B) Keystrokes
C) Audio
D) Video
Answer: B
19. Data breach means:
A) Data storage
B) Unauthorized data access
C) Data backup
D) Data delete
Answer: B
20. Which is a cyber threat?
A) Monitor
B) Virus
C) Keyboard
D) Printer
Answer: B
21. Worm spreads through:
A) Manual input
B) Network automatically
C) Printer
D) CPU
Answer: B
22. Spyware is used to:
A) Protect system
B) Monitor user activity
C) Delete files
D) Install OS
Answer: B
23. Adware displays:
A) Files
B) Ads
C) Programs
D) Games
Answer: B
24. HTTPS ensures:
A) Speed
B) Security
C) Storage
D) Processing
Answer: B
25. Strong password should contain:
A) Only letters
B) Only numbers
C) Combination of symbols
D) Only name
Answer: C
26. OTP stands for:
A) One Time Password
B) Only Text Password
C) Open Transfer Password
D) One Type Password
Answer: A
27. Cyber law refers to:
A) Traffic rules
B) Internet laws
C) Banking rules
D) Office rules
Answer: B
28. Antivirus helps in:
A) Gaming
B) Protection
C) Typing
D) Printing
Answer: B
29. Backup is used for:
A) Delete data
B) Store duplicate data
C) Print data
D) Edit data
Answer: B
30. Spam email means:
A) Important mail
B) Unwanted mail
C) Official mail
D) Personal mail
Answer: B
31. Social engineering is:
A) Programming
B) Manipulating people
C) Networking
D) Typing
Answer: B
32. Botnet is:
A) Antivirus
B) Network of infected systems
C) Hardware
D) Software
Answer: B
33. Encryption is:
A) Data deletion
B) Data protection
C) Data copying
D) Data transfer
Answer: B
34. Decryption means:
A) Encode data
B) Decode data
C) Delete data
D) Copy data
Answer: B
35. Digital signature ensures:
A) Speed
B) Authentication
C) Storage
D) Editing
Answer: B
36. VPN provides:
A) Storage
B) Secure connection
C) Speed
D) Printing
Answer: B
37. Cookies store:
A) Hardware
B) User data
C) Programs
D) Virus
Answer: B
38. Phishing websites are:
A) Real
B) Fake
C) Secure
D) Fast
Answer: B
39. Cyber terrorism targets:
A) Individual
B) Nation security
C) Files
D) Printer
Answer: B
40. Online fraud relates to:
A) Typing
B) Financial crime
C) Printing
D) Storage
Answer: B
41. Firewall blocks:
A) Authorized access
B) Unauthorized access
C) Printing
D) Typing
Answer: B
42. Cloud security protects:
A) Hardware
B) Online data
C) Printer
D) CPU
Answer: B
43. Public Wi-Fi risk is:
A) Speed
B) Data theft
C) Storage
D) Printing
Answer: B
44. Cyber ethics refers to:
A) Illegal use
B) Safe internet behavior
C) Hacking
D) Virus
Answer: B
45. Authentication means:
A) Access
B) Verify identity
C) Delete
D) Store
Answer: B
46. Cyber attack is:
A) Physical attack
B) Digital attack
C) Manual attack
D) Road attack
Answer: B
47. Best cyber protection is:
A) Antivirus only
B) Awareness
C) Password only
D) Internet
Answer: B
48. Which is NOT safe practice?
A) Strong password
B) Sharing OTP
C) Antivirus
D) Updates
Answer: B
49. Which is safe browsing?
A) HTTP
B) HTTPS
C) FTP
D) SMTP
Answer: B
50. Cyber security aims to protect:
A) Only hardware
B) Only software
C) Data, system, network
D) Only files
Answer: C
Suggested Important Links for UPTET Exam 2026
Conclusion
These 50 Full-Length Cyber Crime MCQs are highly important for UPTET Exam 2026, SSC, Banking, Railway, UPSI, and Computer Operator exams. Practice regularly to strengthen your cyber security concepts.
👉 Visit: https://www.computergs.online
👉 Follow ComputerGS for more MCQs & Notes

No comments:
Post a Comment