Cyber Law (MCQs) December 19, 2025October 16, 2024 by u930973931_answers 30 min Score: 0 Attempted: 0/30 Subscribe 1. What is the primary objective of Cyber Law? (A) To protect individuals and organizations in the digital environment (B) To regulate traditional business practices (C) To enhance physical security (D) To govern international trade 2. Which of the following is considered a cybercrime? (A) Hacking (B) All of the above (C) Phishing (D) Identity theft 3. What does the term “data breach” refer to? (A) A system upgrade (B) A software update (C) A network outage (D) Unauthorized access to confidential data 4. What is the main purpose of encryption in cybersecurity? (A) To protect data by making it unreadable to unauthorized users (B) To slow down data transfer (C) To enhance internet speed (D) To create backups 5. Which law governs electronic contracts in many countries? (A) The Privacy Act (B) The Cybersecurity Act (C) The Data Protection Act (D) The Electronic Communications and Transactions Act (ECTA) 6. What does the term “phishing” refer to? (A) A form of online shopping (B) A secure payment method (C) A cybersecurity software (D) Fraudulent attempts to obtain sensitive information via email or websites 7. Which of the following is a key component of Cyber Law? (A) Data privacy (B) Intellectual property rights (C) Cybercrime regulations (D) All of the above 8. What is the role of the Computer Emergency Response Team (CERT)? (A) To provide support during cybersecurity incidents (B) To develop software (C) To enforce cyber laws (D) To regulate internet service providers 9. What is the GDPR? (A) The General Data Protection Regulation, a data protection law in the EU (B) A cybersecurity certification (C) A type of malware (D) A form of encryption 10. What type of cybercrime involves the unauthorized use of someone else’s computer resources? (A) Identity theft (B) Phishing (C) Cyberbullying (D) Hacking 11. Which of the following is a legal requirement under GDPR? (A) Obtaining consent for data processing (B) Collecting as much data as possible (C) Selling data to third parties (D) Keeping data indefinitely 12. What does the term “cyberbullying” refer to? (A) Physical bullying (B) Workplace harassment (C) Using electronic communication to bully or harass someone (D) Verbal threats 13. What is the main purpose of the Digital Millennium Copyright Act (DMCA)? (A) To promote internet access (B) To regulate cybercrime (C) To protect copyright holders in the digital environment (D) To enforce data privacy 14. Which of the following is a common defense against cybercrime? (A) Ignoring suspicious emails (B) Disabling security updates (C) Sharing passwords (D) Using firewalls and antivirus software 15. What is a “cookie” in the context of online privacy? (A) A type of malware (B) A method of encryption (C) A security breach (D) A small piece of data stored on a user’s computer by a web browser 16. Which of the following acts governs the interception of electronic communications in the U.S.? (A) The Electronic Communications Privacy Act (ECPA) (B) The Freedom of Information Act (C) The Digital Millennium Copyright Act (D) The Computer Fraud and Abuse Act 17. What is the consequence of violating copyright laws in cyberspace? (A) Legal penalties, including fines and imprisonment (B) Increased popularity (C) No consequences (D) Reward points 18. Which of the following is NOT a principle of data protection under GDPR? (A) Transparency (B) Data minimization (C) Accuracy (D) Data monopolization 19. What is a denial-of-service (DoS) attack? (A) A type of cyber insurance (B) A method of data encryption (C) A software update (D) An attempt to make a service unavailable by overwhelming it with traffic 20. What does “identity theft” involve? (A) Using someone else’s name for shopping (B) Creating fake identities (C) Stealing someone’s personal information for fraudulent purposes (D) Hacking social media accounts 21. What is the primary focus of the Cybersecurity Act? (A) To protect intellectual property (B) To regulate financial transactions (C) To enhance the security of networks and information systems (D) To promote online education 22. Which of the following is considered an ethical hacking practice? (A) Hacking for personal gain (B) Phishing for information (C) Testing systems for vulnerabilities with permission (D) Spreading malware 23. What is the purpose of a privacy policy on a website? (A) To collect user data (B) To sell data to third parties (C) To inform users how their data will be used and protected (D) To enhance website design 24. Which of the following actions is illegal under Cyber Law? (A) Distributing malware (B) Using strong passwords (C) Reporting cybersecurity incidents (D) Educating others about online safety 25. What does the term “spyware” refer to? (A) A software for tracking fitness (B) A type of encryption (C) A security application (D) Malware designed to gather information about a person or organization without their knowledge 26. Which of the following is a common method to protect personal data online? (A) Using two-factor authentication (B) Sharing passwords (C) Ignoring software updates (D) Public Wi-Fi networks 27. What is the role of the Federal Trade Commission (FTC) regarding Cyber Law? (A) To regulate internet service providers (B) To promote online education (C) To enforce copyright laws (D) To protect consumers from unfair and deceptive practices in cyberspace 28. Which of the following is a requirement for compliance with GDPR? (A) Providing users with the right to access their personal data (B) Ignoring user requests for data access (C) Keeping data indefinitely (D) Sharing data without consent 29. What is “cyber espionage”? (A) Hacking for personal gain (B) Data encryption (C) The act of spying on individuals or organizations to obtain confidential information (D) Social media marketing 30. Which of the following actions can lead to criminal charges under Cyber Law? (A) Unauthorized access to a computer system (B) Creating a secure website (C) Reporting a security breach (D) Educating others about cybersecurity