Kerala PSC Computers Question and Answers - 37

1. The process of recovering deleted & damaged files from criminal's computer comes under:

2. A computer system set up to act as a decoy to lure cyber attackers is known as:

3. What is the name of the fraudulent attempt to obtain sensitive information such as usernames, passwords & credit card details by disguising as a trustworthy entity in an electronic communication?

4. The creation of e-mail messages with a forged sender address is known as:

5. What is the name of the spamming technique that sends out unsolicited e-mails using spoofed sender data?

6. Which is the nodal authority to curb online child pornography, sexual violence & rape videos?

7. In which year was NCRB established?

8. Where is the headquarters of the NCRB?

9. What CCTNS stands for?

10. Which committee studied the cyber crime especially online hate speech?

11. Which case resulted in the striking down of Section-66A of the IT Act-2000 by the Supreme Court?

12. Under which section of the IT Act, the central government has the authroity to block access to information on website if it threatens the national interest?

13. In which year was the Information Technology (Procedure & Safeguards for Blocking for Access of Information by Public) Rules passed?

14. An electronic signature used to authenticate the identity of the sender & signer of a message or document is known as:

15. In India, which Act envisaged the concept of digital signature for the first time?

16. In which year was the National Cyber Security Policy formulated?

17. Which Section of the IT Act 2000 mentions about the Indian Computer Emergency Response Team which shall serve as the national agency for cyber security?

18. The Information Technology Act came into effect from:

19. Which Section of the IT Act deals with data privacy?

20. A computer program that provides a service to another computer program/its user is known as: