Internal Security·MCQ Practice

Social Media and Radicalization — MCQ Practice

Constitution VerifiedUPSC Verified
Version 1Updated 7 Mar 2026

Interactive MCQ Practice

Test your knowledge. Click “Solve” to reveal options, select your answer, then check the result. 5 questions available.

Q1medium

Which of the following provisions of the Information Technology Act, 2000, empowers the Central Government to block public access to information through any computer resource in the interest of national security?

Q2hard

Consider the following statements regarding the Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021: 1. They mandate social media intermediaries to remove unlawful content within 36 hours of notification. 2. They require significant social media intermediaries to enable the identification of the first originator of a message. 3. They apply only to social media platforms and not to digital news media. Which of the statements given above is/are correct?

Q3medium

Which of the following psychological mechanisms is most directly exploited by social media algorithms to accelerate radicalization by creating 'filter bubbles'?

Q4hard

Which of the following is NOT a primary challenge posed by end-to-end encryption in combating social media radicalization?

Q5easy

The 'Radicalization Funnel Model' developed by Vyyuha, linking psychological vulnerabilities with technological design, primarily aims to illustrate:

Featured
🎯PREP MANAGER
Your 6-Month Blueprint, Updated Nightly
AI analyses your progress every night. Wake up to a smarter plan. Every. Single. Day.
Ad Space
🎯PREP MANAGER
Your 6-Month Blueprint, Updated Nightly
AI analyses your progress every night. Wake up to a smarter plan. Every. Single. Day.