Governance & Public Policies

Cyber Laws & Internet Governance MCQs with Answer

Cyber law primarily deals with:
A) Regulation of digital transactions
B) Only social media rules
C) Offline business practices
D) Manual record keeping

Answer
A) Regulation of digital transactions

Which law is commonly used to prevent cybercrimes?
A) IT Act, 2000 (India)
B) Motor Vehicle Act
C) Agriculture Law
D) Civil Procedure Code

Answer
A) IT Act, 2000 (India)

What does GDPR stand for?
A) General Data Protection Regulation
B) Global Digital Privacy Rules
C) General Digital Public Rights
D) Government Data Protection Rights

Answer
A) General Data Protection Regulation

Which organization oversees internet governance globally?
A) ICANN
B) WHO
C) FIFA
D) WTO

Answer
A) ICANN

Cybercrime includes:
A) Identity theft, hacking, and phishing
B) Buying groceries online
C) Watching online videos
D) Sending emails to friends

Answer
A) Identity theft, hacking, and phishing

Which international law deals with cyber security?
A) Budapest Convention
B) Geneva Convention
C) Paris Agreement
D) Vienna Protocol

Answer
A) Budapest Convention

Which of the following is NOT a cybercrime?
A) Digital payments
B) Phishing
C) Ransomware attack
D) Cyberbullying

Answer
A) Digital payments

What does ICANN stand for?
A) Internet Corporation for Assigned Names and Numbers
B) International Cybersecurity and Network Norms
C) Information Control and Network Naming
D) Internet Community for All Nations

Answer
A) Internet Corporation for Assigned Names and Numbers

What is the role of CERT in cybersecurity?
A) Handling cybersecurity incidents
B) Developing road infrastructure
C) Regulating offline markets
D) Conducting social surveys

Answer
A) Handling cybersecurity incidents

Which law protects consumer rights in e-commerce?
A) Consumer Protection (E-Commerce) Rules, 2020
B) Wildlife Protection Act
C) Land Revenue Act
D) Factory Act

Answer
A) Consumer Protection (E-Commerce) Rules, 2020

What is “phishing” in cybersecurity?
A) Fraudulent attempts to steal sensitive information
B) Secure file sharing
C) Legal hacking practices
D) Software development technique

Answer
A) Fraudulent attempts to steal sensitive information

Which of the following is an internet governance issue?
A) Net neutrality
B) Traditional farming techniques
C) Brick-and-mortar retail sales
D) Postal service regulations

Answer
A) Net neutrality

What is a key principle of GDPR?
A) Data privacy and protection
B) Unlimited data sharing
C) Open access to personal information
D) Banning digital transactions

Answer
A) Data privacy and protection

Which type of cyberattack locks users out of their systems?
A) Ransomware
B) Email fraud
C) Phishing
D) Cookie tracking

Answer
A) Ransomware

Which law governs intellectual property on the internet?
A) Digital Millennium Copyright Act (DMCA)
B) Traffic Control Act
C) Water Conservation Act
D) Labour Law Regulations

Answer
A) Digital Millennium Copyright Act (DMCA)

What does “DDoS” stand for in cybersecurity?
A) Distributed Denial of Service
B) Digital Domain of Security
C) Data Distribution over Servers
D) Dynamic Defense of Systems

Answer
A) Distributed Denial of Service

Which cyber law deals with electronic signatures?
A) IT Act, 2000
B) Motor Vehicles Act
C) Factory Regulations Act
D) Civil Rights Act

Answer
A) IT Act, 2000

Which organization develops global internet policies?
A) Internet Governance Forum (IGF)
B) World Bank
C) NATO
D) UNESCO

Answer
A) Internet Governance Forum (IGF)

Which act provides cybercrime penalties in the USA?
A) Computer Fraud and Abuse Act (CFAA)
B) Cyberbullying Prevention Act
C) Net Safety Protection Act
D) Cyber Taxation Act

Answer
A) Computer Fraud and Abuse Act (CFAA)

Which is an example of a cyber law violation?
A) Hacking into a government database
B) Purchasing books online
C) Using an official email account
D) Learning coding from a free website

Answer
A) Hacking into a government database

What is an essential feature of cyber laws?
A) Protection against digital crimes
B) Increasing paperwork
C) Banning online banking
D) Restricting internet access

Answer
A) Protection against digital crimes

What is “cyberstalking”?
A) Repeated harassment using digital means
B) Online shopping
C) Secure data transmission
D) Ethical hacking

Answer
A) Repeated harassment using digital means

Which organization helps secure websites against cyberattacks?
A) Cybersecurity and Infrastructure Security Agency (CISA)
B) World Health Organization
C) International Monetary Fund
D) World Trade Organization

Answer
A) Cybersecurity and Infrastructure Security Agency (CISA)

What is an example of digital evidence in cyber law?
A) Encrypted emails
B) Handwritten letters
C) Physical documents
D) Paper invoices

Answer
A) Encrypted emails

Which policy aims at global internet freedom?
A) The Open Internet Policy
B) Data Localization Act
C) Cyber Ban Protocol
D) Global Internet Censorship Rule

Answer
A) The Open Internet Policy

Which of the following is an online financial fraud?
A) Credit card fraud
B) Cash payment at a store
C) Bank cheque transactions
D) Physical gold purchase

Answer
A) Credit card fraud

Which organization regulates domain names?
A) ICANN
B) WHO
C) UNESCO
D) IMF

Answer
A) ICANN

Which of the following can help prevent cybercrimes?
A) Strong passwords and multi-factor authentication
B) Using simple and common passwords
C) Clicking on unknown links
D) Sharing passwords with others

Answer
A) Strong passwords and multi-factor authentication

Which cyber law concept helps in resolving internet disputes?
A) Cyber arbitration
B) Traditional legal process
C) Postal resolution system
D) Paper-based complaint filing

Answer
A) Cyber arbitration

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button