Q: 1 _________ can not be resolved under Cyber Appellate Tribunal.
Hacking a computer system
Using a digital signature for authentication
Publishing sensitive personal data without consent
Tampering with computer source documents
[ Option B ]
The Cyber Appellate Tribunal under the IT Act primarily deals with cybercrimes and disputes related to electronic records and digital transactions such as hacking, data theft, tampering, and unauthorized publishing of sensitive data.
Using a digital signature for authentication is a legal method for authenticating electronic records, not a cyber offense.
Q: 2 Which of the following is not a reason for black hat hackers to break system security? (Choose the most appropriate option from below)
Identity Theft
Monetary Gain
Improving System Performance
Leaking Sensitive Information
[ Option C ]
Black Hat hackers are individuals who illegally break into computer systems with malicious intent such as identity theft (steal personal or financial information), monetary gain (ransomware attacks), or leaking sensitive information (leak confidential data). They aim to exploit, damage, or steal data rather than improve system performance.
Improving system performance is not a reason for black hat hacking. It is usually associated with White Hat hackers who ethically test and strengthen system security.
| BLACK HAT HACKERS | WHITE HAT HACKERS | GRAY HAT HACKERS |
|---|---|---|
Black hat hackers are malicious individuals who break into computer systems illegally with the intention of causing harm or gaining personal benefits. Their goals include stealing sensitive information, committing identity theft, causing financial loss, or disrupting system operations. They operate without permission and often exploit vulnerabilities for personal or criminal gain. | White hat hackers are ethical hackers who test and evaluate system security with permission. Their purpose is to identify vulnerabilities, strengthen security, and improve system performance. They do not have malicious intent and work to protect systems, data, and users from black hat attacks. Companies often hire them for penetration testing and security audits. | Gray hat hackers operate in between black and white hats. They may exploit security weaknesses without explicit permission, but usually without malicious intent. Their actions are often intended to alert the system owner about vulnerabilities or demonstrate security flaws. While their methods may be unauthorized, the outcomes can sometimes help improve system security. |
Q: 3 A plain text message may be hidden in one of two ways. The methods of _________ conceal the existence of the message, whereas the methods of __________ render the message unintelligible to outsiders by various transformations of the text.
Choose the valid ordered pair to fill in the blanks.
steganography, cryptography
cryptography, steganography
encoding, decoding
authentication, hashing
[ Option A ]
A plain text message can be hidden or protected in two main ways. Steganography is the technique used to conceal the existence of the message itself. For example, a secret message might be hidden inside an image or audio file in such a way that outsiders cannot even detect that a message exists.
Cryptography transforms plaintext into ciphertext via encryption, rendering the content unintelligible to outsiders without the decryption key.
Q: 4 What does DDoS stand for?
Data Denial-of-Service
Distributed Denial-of-Service
Distributed Data of Server
Distribution of Data Service
[ Option B ]
DDoS stands for Distributed Denial-of-Service. It is a type of cyberattack where multiple compromised systems flood the bandwidth or resources of a targeted system, usually one or more web servers.
The goal of a DDoS attack is to make the targeted online service or resource unavailable to legitimate users by overwhelming it with a massive volume of traffic or requests. This attack originates from multiple sources, making it more difficult to defend against than a single-source DoS attack.
Q: 5 Data protection is very essential in today’s digital age where millions of data is created and are illegally used by some. In order to protect data, ___________ grants legal rights to creators for their original work.
IPR
Copyright
Trademark
Licensing
[ Option B ]
Copyright is a form of Intellectual Property Right (IPR) that grants legal protection to creators for their original works such as books, music, software, art, and digital content.
| TERM | DESCRIPTION |
|---|---|
| IPR (Intellectual Property Rights) | A broad term that includes copyright, patents, and trademarks. |
| Copyright | Grants legal rights to creators for original works. |
| Trademark | Protects brand names, logos, and symbols used for commercial identity. |
| Licensing | Legal permission to use someone’s copyrighted work. |
Thank you so much for taking the time to read my Computer Science MCQs section carefully. Your support and interest mean a lot, and I truly appreciate you being part of this journey. Stay connected for more insights and updates! If you'd like to explore more tutorials and insights, check out my YouTube channel.
Don’t forget to subscribe and stay connected for future updates.