Cyber Secuity QB
Cyber Secuity QB
Answer: Cybercrime refers to all the activities done with criminal intent in cyberspace. The field of
Cybercrime is just emerging and new forms of criminal activities in cyberspace are coming to the
forefront with the passing of each new day.
Cybercrimes can be basically divided into 3 major categories being Cybercrimes against persons,
property and Government.
Answer:
✓ legal recognition to electronic transactions by recognizing digital signatures either by
general public or Govt. official or agency, including publication of rules, regulations or any
other matter including gazette notification.
✓ facilitate electronic filing of documents and retention thereof in govt. records (public cannot
insist for use of electronic mode only)
✓ consequential amendments to other acts
✓ to set up licensing, monitoring and certifying authority
Q4. Are organizations permitted to collect personal sensitive data of Public for their use? What if
they don’t maintain adequate security for the same?
Answer:
According to Information Technology (Reasonable Security Practices and Procedures and Sensitive
Personal Data or Information) Rules, 2011, Organizations may collect personal sensitive data only
on compliance of following guidelines:
a) Information shall not be collected unless it is for lawful purpose, and is considered
necessary for the purpose. The information collected shall be used only for the purpose
for which it is collected and shall not be retained for a period longer than which is
required;
b) Ensure that the person(s) providing information are aware about the fact that the
information is being collected, its purposes & recipients, name and addresses of the
agencies retaining and collecting the information;
Answer:
a) OLAP stands for Online analytical processing. These BI tools enable users to analyze data
along multiple dimensions, which is particularly suited to complex queries and calculations.
b) In real-time BI applications, data is analyzed as it’s created, collected and processed to give
users an up-to-date view of business operations, customer behavior, financial markets and
other areas of interest. The real-time analytics process often involves streaming data and
supports decision analytics uses, such as credit scoring, stock trading and targeted
promotional offers.
c) Embedded business intelligence tools put BI and data visualization functionality directly
into business applications. That enables business users to analyze data within the
applications they use to do their job. Embedded analytics features are most commonly
incorporated by application software vendors, but corporate software developers can also
include them in home grown applications.
5. The key benefits that businesses can get from BI applications include the ability to:
a. speed up and improve decision- b. optimize internal business processes;
making;
c. increase operational efficiency and d. all of the above
productivity;
8. Which among the following is not a Cyber crimes under the IT Act:
a. Tampering with Computer source b. Hacking with Computer systems, Data
documents alteration.
c. Publishing obscene information. d. Sending threatening messages by
email
10. Access someone’s computer without the right authorization of the owner and does not
disturb, alter, misuse, or damage data or system by using wireless internet connection, is
called:
a. Squatting b. Vandalism
c. Hacking d. Trespass
Answer to MCQs