The government is set to launch the most ambitious bets to ward off cybercrime in its Rs 1,000-crore National Cyber Coordination Centre project slated to begin operations by the end of this month. According to government officials, the Centre is meant to monitor the cyber traffic in the country and prevent possible large-scale cyber attacks by analyzing the traffic. It will begin with tracking the networks of a handful of Internet Service Providers (ISPs) and data centers. Which of the following statements most strongly supports the argument?

The government is set to launch the most ambitious bets to ward off cybercrime in its Rs 1,000-crore National Cyber Coordination Centre project slated to begin operations by the end of this month. According to government officials, the Centre is meant to monitor the cyber traffic in the country and prevent possible large-scale cyber attacks by analyzing the traffic. It will begin with tracking the networks of a handful of Internet Service Providers (ISPs) and data centers. Which of the following statements most strongly supports the argument? Correct Answer In the wake of large-scale cyber attacks in the country recently, the government has taken several measures to contain the spread of cybercrime.

Almost all the options are in support with the passage. As B underlines the main cause, it is the strongest argument among all the given options.

Related Questions

The question given below consists of a statement, followed by three arguments numbered I, II and III. You have to decide which of the arguments is/are ‘strong’ arguments and which is/are ‘weak’ arguments and accordingly choose your answer from the alternatives given below each question. Statement: India’s telecom watchdog has suggested regulation of all entities dealing with consumer data—devices such as iPhones, operating systems such as Android, browsers like Google’s Chrome and apps such as Facebook, Paytm, Uber or Zomato— by bringing them under licence conditions that apply to telecom service providers until a general data protection law is put in place by the government. Which of the following argument weakens the above statement in the best possible manner? Arguments: I. The Telecom Regulatory Authority of India (Trai) said the framework for protection of personal information is ‘not sufficient’ and that the issue of data ownership, privacy, and security is complex and multi-dimensional. It suggested expanding the ambit of licence conditions governing telcos to all entities handling customer information and empowerment of customers to keep their data secure. II. The telecom watchdog further said that individual users owned their data, or personal information, and entities such as devices were ‘mere custodians’ and do not have primary rights over that information. III. Telcos and internet service providers (ISPs) though welcomed recommendations that sought to bring app makers under the same regulations. However, content providers have been opposed to being brought under more regulation. 
In the question below, are given a statement followed by three courses of actions numbered I, II and III. On the basis of the information given, you have to assume everything in the statement to be true, and then decide which of the suggested course of action logically follow (s) for pursuing. Statement: The India Risk Survey 2017 report ranks 'Information & Cyber Insecurity' as the biggest risk facing Indian companies. Indian organizations, both public and private, had witnessed over 27,000 incidents of security threat, from January 2017 till June 2017 alone. Phishing, scanning/probing, website intrusions and defacements, virus/malicious code, ransomware, Denial of Service attacks, and data breaches are some ways in which hackers attack business websites, which can cause operational disruptions and potentially steal sensitive information. Small and medium businesses (SMBs), unfortunately, have been seeing rising incidences of cybercrime. In fact, 70 percent of cyberattacks occur at organizations with lesser than 100 employees  Courses of action: I. Mandate basic security practices and policies for all employees, such as 2-factor authentication, internet use guidelines and create and enforce rules on handling and protecting sensitive data. Conduct frequent training to sensitize employees about opening suspicious emails, encrypting their data, using strong passwords on their devices, installing security apps, and limiting activity over public Wi-Fi. Implement and enforce incident reporting to help ensure that even the smallest breach is report to management as well as the IT teams. II. Basics still matter and are some of the best defenses against viruses, malware, and other online threats. Assess the assets that are most at risk - data, servers, network - and ensure that the systems are updated with the latest security software, web browser, and operating system. Implement firewall security and run antivirus software after each update.  III. Ensure regular backup of all critical data - whether stored in-house or on the cloud. Run scheduled attack drills and stress tests to identify vulnerabilities and ensure that data restoration and business continuity are executed as planned.
Jio is a big shot at reducing the cost of Internet access in India. The U.S., despite being the richest country in the world, lags far behind in terms of cost and penetration of Internet access. Cheap access to the Internet is an important step in bridging the access gap – access to good education, good healthcare, etc. But the market reaction to Jio is similar to the U.S. markets reaction to firms announcing their intention to diversify. (A)The final group of losers is the current shareholders of RIL. On announcement of Jio, the stock price of RIL fell. (B) It shows that the markets short-term reaction is usually proven correct in the long-run. (C) On losing end, the first groups of losers are the shareholders of other telecom companies. (D)The large amount of revenue the Government of India gets from auctioning off the nations natural resources is not necessarily a good thing because the Government does not have a stellar track record when it comes to spending the money. A large fraction of Government spending is wasted. (E) The second loser is the Government of India. The big money the Indian Government was raking in selling cellular bandwidth was actually coming from the pockets of the cellular consumers. (F)The first obvious winners of this scheme are customers. (G) The second winner is Mr. Ambani; he can potentially make a lasting impact as the man who brought Internet to millions of Indians. Question: Which of the following supports the decision of other companies opposing Reliance JIO Scheme?