Sunday, March 29, 2026

Cyber Crime based 50 MCQ with answer | UPTET Exam 2026 | ComputerGS

Cyber Crime – 50 Full-Length MCQ Questions & Answers | ComputerGS

Website: https://www.computergs.online

UPTET Exam 2026


Category: Cyber Security | Computer Awareness | Competitive Exams


Cyber Crime – 50 Detailed MCQs


1. What is Cyber Crime?

A) Crime without technology
B) Crime using computers and internet
C) Only banking fraud
D) Manual crime
Answer: B


2. Which law deals with cyber crime in India?

A) IPC
B) IT Act 2000
C) RBI Act
D) Banking Act
Answer: B


3. What is hacking?

A) Legal data access
B) Unauthorized access to system
C) Typing
D) Data storage
Answer: B


4. What is phishing?

A) Virus removal
B) Fake emails to steal data
C) File transfer
D) Data backup
Answer: B


5. Malware refers to:

A) Safe software
B) Malicious software
C) Hardware device
D) Antivirus
Answer: B


6. Which of the following is NOT malware?

A) Virus
B) Worm
C) Keyboard
D) Trojan
Answer: C


7. Ransomware is used to:

A) Speed up system
B) Lock data and demand money
C) Delete OS
D) Print files
Answer: B


8. Identity theft means:

A) Creating ID
B) Stealing personal identity
C) Deleting data
D) Editing files
Answer: B


9. Which device protects computer from threats?

A) Mouse
B) Antivirus
C) Printer
D) Monitor
Answer: B


10. IT Act was passed in:

A) 1999
B) 2000
C) 2005
D) 2010
Answer: B


11. Section 66 of IT Act deals with:

A) Hardware
B) Computer-related offences
C) Software
D) Networking
Answer: B


12. Section 66C relates to:

A) Virus
B) Identity theft
C) Email
D) Firewall
Answer: B


13. Section 66D relates to:

A) Cheating by impersonation
B) Data storage
C) Hardware
D) Virus
Answer: A


14. Cyber stalking refers to:

A) Physical tracking
B) Online harassment
C) Gaming
D) Data storage
Answer: B


15. Which is a cyber crime?

A) Typing
B) Phishing
C) Printing
D) Scanning
Answer: B


16. Trojan horse is:

A) Hardware
B) Malware
C) Antivirus
D) Software tool
Answer: B


17. Firewall is used for:

A) Printing
B) Security
C) Gaming
D) Typing
Answer: B


18. Keylogger records:

A) Screen
B) Keystrokes
C) Audio
D) Video
Answer: B


19. Data breach means:

A) Data storage
B) Unauthorized data access
C) Data backup
D) Data delete
Answer: B


20. Which is a cyber threat?

A) Monitor
B) Virus
C) Keyboard
D) Printer
Answer: B


21. Worm spreads through:

A) Manual input
B) Network automatically
C) Printer
D) CPU
Answer: B


22. Spyware is used to:

A) Protect system
B) Monitor user activity
C) Delete files
D) Install OS
Answer: B


23. Adware displays:

A) Files
B) Ads
C) Programs
D) Games
Answer: B


24. HTTPS ensures:

A) Speed
B) Security
C) Storage
D) Processing
Answer: B


25. Strong password should contain:

A) Only letters
B) Only numbers
C) Combination of symbols
D) Only name
Answer: C


26. OTP stands for:

A) One Time Password
B) Only Text Password
C) Open Transfer Password
D) One Type Password
Answer: A


27. Cyber law refers to:

A) Traffic rules
B) Internet laws
C) Banking rules
D) Office rules
Answer: B


28. Antivirus helps in:

A) Gaming
B) Protection
C) Typing
D) Printing
Answer: B


29. Backup is used for:

A) Delete data
B) Store duplicate data
C) Print data
D) Edit data
Answer: B


30. Spam email means:

A) Important mail
B) Unwanted mail
C) Official mail
D) Personal mail
Answer: B


31. Social engineering is:

A) Programming
B) Manipulating people
C) Networking
D) Typing
Answer: B


32. Botnet is:

A) Antivirus
B) Network of infected systems
C) Hardware
D) Software
Answer: B


33. Encryption is:

A) Data deletion
B) Data protection
C) Data copying
D) Data transfer
Answer: B


34. Decryption means:

A) Encode data
B) Decode data
C) Delete data
D) Copy data
Answer: B


35. Digital signature ensures:

A) Speed
B) Authentication
C) Storage
D) Editing
Answer: B


36. VPN provides:

A) Storage
B) Secure connection
C) Speed
D) Printing
Answer: B


37. Cookies store:

A) Hardware
B) User data
C) Programs
D) Virus
Answer: B


38. Phishing websites are:

A) Real
B) Fake
C) Secure
D) Fast
Answer: B


39. Cyber terrorism targets:

A) Individual
B) Nation security
C) Files
D) Printer
Answer: B


40. Online fraud relates to:

A) Typing
B) Financial crime
C) Printing
D) Storage
Answer: B


41. Firewall blocks:

A) Authorized access
B) Unauthorized access
C) Printing
D) Typing
Answer: B


42. Cloud security protects:

A) Hardware
B) Online data
C) Printer
D) CPU
Answer: B


43. Public Wi-Fi risk is:

A) Speed
B) Data theft
C) Storage
D) Printing
Answer: B


44. Cyber ethics refers to:

A) Illegal use
B) Safe internet behavior
C) Hacking
D) Virus
Answer: B


45. Authentication means:

A) Access
B) Verify identity
C) Delete
D) Store
Answer: B


46. Cyber attack is:

A) Physical attack
B) Digital attack
C) Manual attack
D) Road attack
Answer: B


47. Best cyber protection is:

A) Antivirus only
B) Awareness
C) Password only
D) Internet
Answer: B


48. Which is NOT safe practice?

A) Strong password
B) Sharing OTP
C) Antivirus
D) Updates
Answer: B


49. Which is safe browsing?

A) HTTP
B) HTTPS
C) FTP
D) SMTP
Answer: B


50. Cyber security aims to protect:

A) Only hardware
B) Only software
C) Data, system, network
D) Only files
Answer: C


Suggested Important Links for UPTET Exam 2026

Conclusion

These 50 Full-Length Cyber Crime MCQs are highly important for UPTET Exam 2026, SSC, Banking, Railway, UPSI, and Computer Operator exams. Practice regularly to strengthen your cyber security concepts.

👉 Visit: https://www.computergs.online
👉 Follow ComputerGS for more MCQs & Notes



No comments:

Post a Comment

Email: Definition, Features, Working, Advantages & Examples | ComputerGS | UPTET 2026 | UP Police

📘 Introduction Email (Electronic Mail) is a method of sending and receiving messages digitally over the internet. It is one of the fastest...