checking user
checking user
checking user
checking user
Similar Questions
2017
Exam:UPSC CSE
Paper:Prelims GS
Topic:Current<br>Affairs
Difficulty:medium

In India, it is legally mandatory for which of the following to report on cyber security incidents?

  1. Service providers
  2. Data centres
  3. Body corporate
    Select the correct answer using the code given below:
2020
Exam:UPSC CSE
Paper:Prelims GS
Topic:ECONOMICS
Difficulty:medium

Which of the following factors/policies were affecting the price of rice in India in the recent past?

  1. Minimum Support Price
  2. Government's trading
  3. Government's stockpiling
  4. Consumer subsidies
    Select the correct answer using the code given below.
2017
Exam:UPSC CSE
Paper:Prelims GS
Topic:Polity and<br>Governance
Difficulty:medium

Which of the following are envisaged by the Right against Exploitation in the Constitution of India?

  1. Prohibition of traffic in human beings and forced labour
  2. Abolition of untouchability
  3. Protection of the interests of minorities
  4. Prohibition of employment of children in factories and mines
    Select the correct answer using the code given below:
2024
Exam:UPSC CSE
Paper:Prelims GS
Topic:Economic s
Difficulty:medium

In India, which of the following can trade in Corporate Bonds and Government Securities?

  1. Insurance Companies
  2. Pension Funds
  3. Retail Investors
    Select the correct answer using the code given below:
2014
Exam:UPSC CSE
Paper:Prelims GS
Topic:Polity
Difficulty:medium

Which of the following are associated with 'Planning' in India?

  1. The Finance Commission
  2. The National Development Council
  3. The Union Ministry of Rural Development
  4. The Union Ministry of Urban Development
  5. The Parliament
    Select the correct answer using the code given below:
Q. 69
DiscussAttempt

In India, under cyber insurance for individuals, which of the following benefits are generally covered, in addition to payment for the funds and other benefits?

  1. Cost of restoration of the computer system in case of malware disrupting access to one's computer.
  2. Cost of a new computer if some miscreant wilfully damages it, if proved so.
  3. Cost of hiring a specialized consultant to minimize the loss in case of cyber extortion.
  4. Cost of defence in the Court of Law if any third party files a suit.
    Select the correct answer using the code given below:

A

1, 2, and 4 only

B

1, 3, and 4 only

C

2 and 3 only

D

1, 2, 3, and 4

Kepler. Discussing PYQs. Q.no. 69
Q69: CURRENT AFFAIRS | UPSC CSE 2020