Thursday, 30 December 2021

CYBER CRIME QUESTIONS OF IIBF EXAM (MEmoRY BaSed previous Years

 CYBER CRIME QUESTIONS OF IIBF EXAM (MEmoRY BaSed previous Years

Q1.what is honey pot.

Q2. What are steps involved in a Ecommerce transactions.

Q3. Difference between durability and consistency.

Q4. What is firewell.

Q5 .what is wankworm and NASA.

Q6. Eucp published in which year.

Q7.OLA is not a popular app store.

Q8.what is circumstantial evidences. 

Q9.BOSS (Bharat operating system solution) was developed by which organizations -CDAC 

Q10.what is malicious code writer's. 

Q11.What is multilayered security 

Q12. What is data. 

Q13.blackmailing is an example of cyber extortion. 

Q14 what is SCADA.

Q15.what is cryptolocker

Q16.smart card in metro railway stations are examples 

Q17.packet filter firewall.

Q18. micro ATM.

Q19.cross site Scripting.

Q20. What is A hectivist...

Q21. Rupay card is issued in which year. 

Q22. what is Trojan hourse. 

Q23. What is malware.

Q.24. data backup is an example of which type of control.

Q25. what is Lebance loop modus oprendi in atm card frauds.

Q26.CCTV is an example of which control.

Q27.what is Cyber Smearing.

Q28.what is operating system Vulnerability

Q29.what is full form of CISA cyber security information sharing Act.

Q30 what is Zeus viruses.

Q31.what is hashh value and integrity.

Q32.what difference between Authorization and Authentication.

Q33. What is INFO stealer?

Q34.what is A back End Access.

Q35.what is meaning of phrase of "Ab initio Unlawfully or Unlegally.

Q36.what is security Administration and Quality Assurance.

Q37.what is CAPTCHA.

Q38.Intentionally misrepresentation of Data is called A Fraud.

Q39.What is definition of Control.

Q40.What is John Deo Order. ...

Q41.what is payment walked and digital wallet

Q42 what is Anonymous.

Q43. What is trapdoor access.

Q44.Total branch automation TMA.

Q45. .com and .org are TLD.

Q46. TCS fraud in Andhra Pradesh is an example of reasonable security practises and procedures.

Q47. The PVCL case in India refers to which Act of IT act Act_69 power to moniter, intercept or Block URL.

Q48.one question on CBS and TBA total branch Automations.

Q49. Sys admin sys user or teller all are examples of Spoofing.

Q50.what is A network Analysis.

Q51.what is vulnerability

Q52.what is DNS sinkholding.

Q53.e.Contactless smart card are example of which.

Q54 . Lebance Loop card fraud rubber band type material inside Atm Fraud.

Q55.what is Contigency planning.

Q56.what is Nigrean 419 Fraud.

Q57.Dumpster Diving.

Q58.what is difference between Steersman and script kiddle ,

Q59.Staganography.

Q60. What is SSL injections and Cross Site Scripting......

Q61. Preventive detective and compensating contol.

Q62. DRONES ARE developed by Drdo.

Q63.income tax.

Q64.Director of DRDO and it's powers.

Q65 .differencebetween Cert india and nasscom.

Q66.TSP/IP. Q67.DDos Attack.

Q68. CyberSmearing and Cyber Defamation.

Q69. Cyberwarfare and Cyber terrorism.

Q70. BECKDOOR access.

Q71.digital signature.

Q72.symmetric and AsymmetricEncryption

Q73.public and private keys.

Q74.command Injections and SQL injections.

Q75.details of Masquerding Attack.

Q76. Trapdoor access and BYOT device.

Q77.Sec.43 and Sec 46 of IT act.....

Q78.Sec. 69 B deals with......

Q79.Blue Hat hackers are a Part of testing team.

Q80.what is crypyolocker and INFO Stealer

Q81.WHAT IS zeus virus

Q82.What do you understand by Mean rea or destructive Mindset.

Q83.what is DDL DATA definition language

Q84.what is packet filteration Firewall

Q85.what do you understand by the word ANONMOUS

Q85.what is computer vandalism

Q86.WHAT IS FRONT END validation control

Q87.what is DATA

Q88.WHAT IS Locard Exchange PRINCIPLE

Q89.WHAT is penalty under SECTION 46 AND 47 of IT AMENDMENT ACT

Q90.What is xss cross site scripting

Q91.what is TCS fraud IN andhrapredseh is EXAMPLE OF

Q92.WHAT is cybersmearing

Q93.what is STEERSMAN

Q94.WHAT do you mean by ALITE HECKER

Q95.IDS is palced between internet and firewell

Q96.what is PCIDSS

Q97.WHAT is Matrix code barcoding

Q98.WHAT is software Piarcy

Q99.what is DNS SINKHOLDING

Q100.WHAT do you understand by traditional criminals

Q101.WHAT is beck end access

Q102.IN WHICH year ekyc published and its detail

Q103.BYOD DEVICE q Q104.WHAT is trapdoor

Q105.what is PURPOSE OF FIREWELL

Q106. BATCH processing is an example of oltp online transition

Precessing

Q107.WHAT IS UTM

Q108. Loss of reputation is a serous adverse effect of DDOS ATTACK

Q109.THE discussion paper held on payment and settlement system of RBI held on 2013 was main focus on ENHANCED USE OF ENTERNET BANKING AND E COMMERCE Q110.what is B2G business to government E COMMERCE TRANSCTION

Q111.boss was developed by cdac

Q112.WHAT IS STAGANOGRAPHY Q113. WHAT IS ALGORITHM

Q114.WHT IS PKI Q.115 WHAT IS HONEY POT q116. WHAT IS MICROATM

Q117.DETAILS ABOUT I4C AND CERTIN Q118.SATYAM AND SIFY CASE

Q119.PUCL CASE IS AN example of sec.69 Q120.WHAT IS VBV THESE ARE

RECOLLECTED QUESTION OF PAPER ON 15 SEPTEMBER 2018

20.10.2018 cyber crime question

1.cyber crime definition

2.3 factor pressure, opportunity, rationalisation

3.cybernetics,kybernetes,steersman,governor,cyberpunk----given 4 option

4.honey pot

5.1st worm

6.denial of service

7.buffer overflow

8.shoulder surfing

9.access control

10.script kiddles

11.john doe order

12.nigrria419

13cyber warfare

14 email spoofing

15 cyber stalking

16 domain name .in represent

17.Satyam infoway ltd vs siffynet supreme court

18 cyber warfare

19 phishing

20 zeus

21.non repudiation

22 tailgating

23.trapdoor

24.captcha.

25 .blue hat hacker

26.phreaking

27. Ethical hacking

28.anonymous

29.bar code matrix code

30.RFID

31.data manipulation and data definition language

32.symmetic encryption

33.Encryption and decryption

34.lo-card exchange principle

35.C-Dac

36.payment getway

37.payment and settlements system 2007

38 acquiring bank

39 brute force attack

40.man in the middle attack

41session hijacking

42.digital wallet

43OLTP

44 Ucpdc

45.EMV card

46.netra drdo

47CBI Specialized structure

48.electonic signature

49.DSCI set up byNASSCOM

50.US Initiative -cyber security information sharing act

51.it act andit amendment act.

52.Pki

53 .authenticity

54.maximum value that can be stored in a prepaid card 50000

55. SWIFT


By pritee Hardiha

Cyber fraud management exam recollected questions on 17.11.2018

The regulator of uav,

Netra developed by,

Script kiddies,

Ethical hacking,

Blue hat hacking,

Nigeria 419,

Social engineering,

When a NRI contacted u by phone to transfer 500000 lakh rupee to another account

in another branch. what action will be taken by you as a Branch manager.

.org,.com are Tld or Sld,

Cyber crime definition,

Cyber smearing,

Masquerading attack,

Email spoofing,

In a software application at end of page we use to see "I agree with term and

conditions". what do you mean by that.

A.p case vs Tcs case,

Eucp started in which year- Approved in 2001& effective from 2002

Steps involved in online transfer processing.

Where scada is used.

Anonymous definition,

Tail gating,

Tress passing,

Harrasing a lady over mail comes under which crime,

Cyber warfare,

Definition of Durability,

Odd man out of the given below which is not an app

1.ola 2.google store.3.black berry.4.apple

Locard principle,

Malicious code writers,



By rama

Cyber crime definition

3 factors induce to commit fraud

Internet of things

Wank worm first hacktivist attack

Stuxnet

Script kiddies

Spoofing

CcTLD

Ransomware

SCADA

Vishing

Authorisation authentication difference

BYOD

authentication tech for e mail

Digital signature

Internet addiction disorder

CAPTCHA

blue hat hacker

2D bar coding known as matrix code

DML

Prevention control

Detection control

Digital footprints

Brute force attack

Payment wallets

SWIFT

prepaid cards

Shoulder surfing

PCIDSS

TCS vs state of AP case

IPC forgery of electronic records

3 domain servers of security initiative

Compulsive disorders

Stylometry

Jilani working group

FSDC

to combat computer related crimes, CBI has following specialized

structure

CBI Interpol

Cyber crime and fraud management recollected on 28.12.2019

Recollected questions:

Cyber crimes are handled by which organization in india

Type 1 crime

Preventive control

Detective control

Deterrent control

Logical control

Sections and their fine with imprisonment in years

Committes of it security ,it governance, it controls

Netra by which organisation

Fast flux

Stux net

Phising

Shoulder surfing

Digital signature

Oldest agency in india

Few questions on cert in

Passive attack

Active attack

Direct attack

In direct attack

Logic bomb

Zeus

India own operating system boss in under whom

Confidentiality

Availability

Integrity

Conventional crime

Cyber crime

Same features of conv and cyber crime

Tailgating


imp topics are

1differences between viruses and worm

2 it act

3 different types of cyber crimes

4 various types of cards

5 gate way payment

6 prevention and detection control

7 pss act

8 2 tier authentication

9 passive and active attacks

mostly questions from 2 and 3 and 4...units


Cyber terrorism

1. Who Coordinates with Interpol in India ? - CBI

2. Which department was designated as Nodal Agency for Cyber Crime prevention -

CERT-IN

3. What is the difference between Virus and Worm - Virus need human intervention

to activate or multiply whereas worm automatically get multiplied

4. Worms are mainly used by hackers to - Occupy more space in the system/heavy

usage of bandwidth in the network

5. One of the employee carefully watching the password entered by the Manager.

What type of threat it is - Shoulder Surfing

6. Leaving a Logged in Computer by an employee - is human negligence

7. Hackers scans the computer pre attack to identify - Vulnerability in the system

8. Hackers inject worms/virus into the network to reach the target system and it -

exploits the Vulnerability

9. Non updation of antivirus is - one of the major vunerability

10. One customer recieved a call in his mobile phone and the person posing himself

as a bank manager collected the card credentials from him.This type is called -

Phising

11. Online Banking sites are borne to what risk - Phising/IP spoofing

12. Data transfer between systems vide Network can be secured by - PKI

13. Customers can make sure that they deal with the authenticated website - by

checking the Lock icon near the address bar

14.In https, S denotes - Secured/Security

15.This kind of worms directly attacks the root directory - Rootkits

16. This worms are really hard to detuct and delete - Rootkits

17. The compromised systems in the network are commonly termes as - Zombies

18. Customer security credentials were compromised by way of fraudulent SMS is

called - smishing

19. The employees who try to hack their own company's site/find the vulnerabilities

are called - White hat hackers

20.DDos - Distributed Denial of Service

21.Ransomware which blocks the access to the website demanding ransom for the

same is - Denial of Service attack

22. Using same method for both encryption and decryption is called - symmetric

encryption

23. Providing Last Login detail in Internet banking site is to - to detect any

unauthorised usage earlier

24.Limits for retrying the passwords is - to avoid the unauthorised access

25. To safeguard from the Key Loggers attack - Use Virtual Key board to enter

passwords

26.UTM stands for - Unified Threat Management

27.Setting up smoke detectors in the branch is - Detective Method

28.Placing Security guard in system room to avoid - Physical damage/attack on

systems

29. Following the authorised person to enter into system room and making entry into

the room is - Tailgatting

30.Dumbster Driving is a method - Searching for vulnerability in deleted files and

data

31.FIrewall is - Intrusion Detection System

32.Authentication of electronic data/document can be assertained by - Digital

Signature

33. When two or more persons illegally tries to enter into a critical room with single

id/same id - Masquerading

34.Detection is normally - Post incedent

35. Post incident study mainly for the purpose of - study the impact of the attack and

lessons for future prevention

36. Indian Agency working on Digital Forensics and Cyber security - C-DAC

37. OLTP refers to - On line Transaction Processing

38. OLTP is also termed as - Payment Gateway

39. Payment Gateway the Acquiring Bank to - Issuing bank through the Card Scheme

to complete the transaction

40.Security Concerns arise in Payment Gateways are - At the User Level, Bank level

and Merchant POS

41. Credit Card data theft through POS is falls under - Merchant PoS Security

42.Data encrypted using Private key can be decrypted by the public key available

with - the Receiver

43. Cross verifying the Signature on the Slip against the Signature in the back side of

the ATM card is doen by - the Merchant

44.Data should be secured in the following stages - Saved, Transit and Retrival

45.Intruder software in a network which attacks the data while in trnasit and thus

commits data theft - Man in the Middle Attack

46. Captures a widows sessio for the purpose of data theft before it reaches the

recipient is - Session Hijacking

47. Limits set for retrying of password is to avoid - Brute Force attack

48. ISSP stands for - Information System Security Policy

49.ICANN stands for - International Corporation for Assigned Names and Numbers

50.TLD stands for - Top Level Domain

51.Globally recognized set of rules defined for electronic records is - e-UCP

52.Technique used to redirect traffic from the infected device is called - Sinkholding

53. The technique which can intercept unencrypted data transit of mobile apps is

called - Wi FI Snifing

54. This is one type of malware which doesnot affect the system/network - Ad-ware

55. This usually comes as a Pop up/add on screen which carries link for dubious

websites - Ad-ware

56.EMV cards follow standard of - ISO/IEC No 7816

57. EMV cards follow this standard for Contactless card - ISO/IEC 14443

58. NFC is the technique used in contactless cards - Near Field Communication

59.PCI - DSS stands for - Plastic Card Industries - Data Security Standards

60. NFC cards works under - RFID Technology

61. Providing Access controls to employess based on roles/need is - Risk based

Authentication

62. Seeking PIN to complete a transaction in PoS is - 2FA

63.SSL - Secure Socket Layering

64.SSL ensures - Encrypted link between a web server and a browser

65. Sending annoying messages to a person causing irritation/nuisance - Cyber

Stalking

66. Black mailing a person using Computer/or network is - Cyber Extortion

67. Ransomware is type of - Cyber Extortion

68. Disputes on Domain names and protest are redressed globally by - UDRP

69. Phising/Vishing is type of - Cyber Cheating

70. Group of people attacks a Computer/ group of computers for propagating a

objective - Cyber Terrorists

71. Hackers with common interest attack rival government's department site and

database are - Cyber terrorists

72. ____ refers to the quality of secrecy associated with the data and the state of

keeping an information asset secret - Confidentiality

73.____ refers to the state of remaining in the same format and not allowing for any

tampering/manipulation - Integrity

74. ____ refers to the state o confirmation that the user has the authority to issue the

command to the system - Authorisation

75. Quality of non denial, the stake holders are not permitted to denythe particular act

of doing the act is - Non-repudiation

76. CAPTCHA refers to - Completely Automated Public Turing test to Tell

Computers and Humans Apart

77. Placing letters in different sizes and styles which is hard to read by systems/robots

is called - CAPTCHA

78. _______ is an important component for study and analysis to under the modus

operandi of a Cyber Attack - Threat Vector

79. In cyber Crime, Threat landscape is denoted as - Study of entire overview of the

network which was attacked

80. Conventional Crimes are - Physical crimes that involve thet of systems and

hardware devices

81.Cyber Crimes are - System Crimes that involves data theft or tampering

82.Insider Attack Threat is - attack on the system/network by own employee without

any permission/authentication

83.______ is the most dangerous attack in cyber crimes - Insider Attack

84. An employee copied and sold the sensitive information to a competitor concern is

an example of - Insider Attack

85. Hackers scan the port/system and develop worm or codes to attack the same based

on this - Vulnerability

86. ____ does not wait for any executable file to run for getting activated in the target

system - Worm

87.____ refers to small piece of programs injected into the target system to spy on the

activities - Spyware

88. Drones are classified as - Spying Devices

89. UAV stands for - Unmanned Aerial Vehicle

90. Most of the UAV used by the polic/defence authorities for - Survelliance

purposes

91.The persons who are hired by companies to hack their own website/to identify the

Vulnerability are - Blue Hat Hackers

92. System of effectively taking care of URL filterig, web-filtering, anti-virus, as all

in one solution is referred as - Unified Threat Management

93. Force Log out option in Internet banking after certain time of Idleness is to guard

the system against - Session Hijacking

94. Installing anti virus into the system is - Preventive Method

95.A statement used to create, alter, drop objects in a database is called - Data

Definition Language

96. Fault Detection, isolation and recovery are closely associated wiht - Detection

Control

97. Installing Bio Metric devices to check unauthorised entry is - Physical Control

98. Unless properly logged, straightaway accessing the database through a SQL is

termed as - Back end Access

99.IT Act 2008 describes the activity of hacking as a criminal activity in section no

66

100. IT Act 2000 came in force on - 17 October 2000

101. IT Amendment Act came into force on - 27 October 2009

101. IT Act consists of - 13 Chapters and 90 Sections

102. The Section which deals with cyber crimes as civil offence - Section 43

103. The Section deals with cyber crimes as Criminal Offences - Section 66

104. IT Amendment Act included the following which is not in the IT Act 2000 -

Electronic Signature

105. Electronic Signature has been dealt in - Section 15

106. Under Section 43A, if any body corporate handling any sensitive personal data is

negligent in implementing and maintaining reasonable security the compensation may go upto - five crore rupees

107. Under Section 43, if one found guilty on Data theft/alters/destroys the same the

penalty/compensation may go upto - One Crore rupees

108. Tampering with Computer Source Documents - Section 65

109. Punishment under Section 65 may go upto - Three years imprisonment and

extend upto Two Lakhs Fine

110. Computer Related offences which were dealt under section 43 can also be dealt

as criminal offence under section - 66

111. Punishment under Section 66 may go upto - two three years and/or fine upto five

lakhs rupees

112. Crime of Cyber Stalking ( sending electronic messages for the purpose of

causing annoyance/inconvenience/decieve/mislead the recipient) may lead to - two

three years imprisonment

113. Identity Theft is dealt under Section - 66c

114. Punishment of Identity Theft - may extend to three years term and/or fine upto

One lakhs rupees

115. Puishment for Cyber Cheating - may extend to three years term and/or fine upto

One lakhs rupees

116. Cyber Cheating is dealt under - Section 66D

117. Punishment for Cyber Terrorism may extend upto - Life time Imprisonment

118. Cyber Terrorism is dealt under - Section 66F

119. Publishing obscene material in electronic form dealt under - Section 67

120. Punishment under Section 67 may extend upto - two three years term and/or five lakhs fine

121. Punishment for Sudsequent conviction of the same crime under section 67 is - 5

years term and/or ten lakhs rupees fine

122. Sexually explicit content in electronic form dealt under - Section 67A

123. Punishment under Section 67A is - Five years term with fine

124.Punishment for Sudsequent conviction of the same crime under section 67A is – 7 years term and/or ten lakhs rupees fine

125. CERT-IN has been designated as Nodal agency for Critical Information

Infrastructure Protection under Section - 70B

126. Mispresentation/Suppression of material Fact dealt under - Section 71

127. Penalty under Section 71 - Two years term and/or fine upto One lakh rupees

128. Breach of confidentiality and Privacy dealt under Section - 72

129. Analysing the style of writing or the langauage style for the purpose of Crime

Investigation is - Stylometry

130. RBI issues licenses for Payment Banks in India based on approval from - BPSS

131. NTRO stands for - National Technical Research Organisation

132. Netra, the light weight UAV was developed by - DRDO

133.NCIIPC stands for - National Critical Information Infrastructure Protection

Centre

134. DSCI - Data Security Council of India, established by NASSCOM

135. Digital Forensic tools used by our Police Department were developed by - CDAC

136. C-DAC stands for - Centre for Development of Advanced Computing

137. NTRO works under - Prime Minister's Office

138. Two acts which are mainly handled by ED - FEMA and PMLA

139. Money laundering using banking systems/Internet banking is – Conventional Crime

140. Obtaining an IP address similar to some other and demanding a ransom for

forego the same is - Cyber Squatting

141. Data Protection while in transit using non repudiation techniques can be

achieved through - Public Key Infrastructure

142. Card Skimming is a technique mostly used th steal the card details and it mostly

placed on - ATM manchines

143. Card Skimming Data Theft can be avoided using - Contactless Cards/NFC Cards

144. To avoid the Card Credentials in Online sites these cards were introduced -

Virtual Cards durability and consistency.

145. Smart Cards which are loaded with Money prior to issue is called - Prepaid

Cards

146. Virtual Cards normally comes with a validity of - 24 hours to 48 hours

147. Maximum loading permitted in a Prepaid as per RBI instruction is - 50000/-

148. Hackers try to capture the login credentials by analysing the keys pressed in the

Key boards. the worms captures such data is called as - Key Loggers

149. By clicking unauthenticated link, customers may diverted to fake websites to

capture the sensitive personal. This is type of - Website spoofing/IP Spoofing

150. Ad wares are used not to harm the computers but to - make a catch by making

the user to click on the dubious link to fake websites

Q4. What is firewell.

Q5 .what is wankworm and NASA.

Q6. Eucp published in which year.

Q7.OLA is not a popularapp store.

Q8.what is circumstantial evidences


26-12-2021 Vishal

Mens Rea

FastFlux

Stuxnet

Wank Worm

ISO 27001

Digital Signature issued by

ITAA Sec 43

ITAA Sec 66

ITAA Sec 70

ITAA Sec 71

Masquarding

Tailgating

Blue Hat Hacker

White Hat Hacker

Script Kiddies

DDL

DML

Schema