MCQ on Cyber Lawsmcq PDF

Title MCQ on Cyber Lawsmcq
Author karan mutha
Course diploma in cyber law
Institution Savitribai Phule Pune University
Pages 9
File Size 100.8 KB
File Type PDF
Total Downloads 9
Total Views 139

Summary

Mcq on cyber law...


Description

MCQ ON CYBER LAWS 1. Many Cyber Crimes comes under Indian Penal Code Which one of the following is an example? A. Sending Threatening message by Email B. Forgery of Electronic Record C. Bogus Website D. All of above 2. The Information Technology Act 2000 is an Act of Indian Parliament notified on A. 27th October 2000 B. 15th December 2000 C. 17th November 2000 D. 17th October 2000 3. Digital Signature Certificate is ____________ requirement under various applications A. Statutory B. Legislative C. Govenmental D. Voluntary 4. Assessing Computer without prior authorization is a cyber crime that comes under____ A. Section 65 B. Section 66 C. Section 68 D. Section 70 5. ____________ means a person who has been granted a licence to issue a electronic signature certificate. A. Certifying Authority B. Certifying Private Key Authority C. Certifying system controller D. Appropriate Authority 6. ________ is a data that has been organized or presented in a meaningful manner. A. A process B. Software C. Storage D. Information

7. _______ is an application of information and communication technology (ICT) for delivering Government Service. A. Governance B. Electronic Governance C. Governance and Ethics D. Risk and Governance. 8. The Altering of data so that it is not usable unless the changes are undone is A. Biometrics B. Encryption C. Ergonomics D. Compression 9. Authentication is _________ A. To assure identity of user on a remote system B. Insertion C. Modification D. Integration 10. The following cannot be exploited by assigning or by licensing the rights of others A. Patent B. Design C. Trademark D. All of the above 11. The investigator has to take the following precautions while collecting evidence (which option is incorrect): a. videotaping the scene, to document the system configuration and the initial condition of the site before arrival b. photograph the equipment with it serial number, model number & writing schemes. c. seeks Magistrates permission before investigating a cognizable offence d. labelling the evidence 12. Section 70 - Access or attempt to access by any unauthorized person, a protected computer system as notified by the Government in the Official Gazette where punishment may extend up to 10 yrs. and fine is: a. Cognizable, Bailable b. Non-Cognizable, Bailable c. Cognizable, Non-Bailable

d. Non- Cognizable, Non-Bailable 13. Section 74 – Publication of Digital Signature Certificate for fraudulent purpose, where imprisonment may extend to 2 yrs. or with fine which may extend to Rs. 1 lakh or both is : a. Cognizable, Non-Bailable b. Non-Cognizable, Non- Bailable c. Cognizable, Bailable d. Non-Cognizable, Bailable 14. When to start investigation: a. after receiving permission from Cyber Cell b. after receiving authority from Sr. Inspector of Police c. in case of cognizable offence after lodging of the FIR under Section 154 of Cr. P. C. d. as soon as non-cognizable offence is brought to the notice of Police 15. Hacking means: a. unauthorized attempts to bypass the security mechanisms of an information system or network. b. use of information and communication technologies to support deliberate, repeated and hostile behaviour c. a form of fraud or cheating of another persons’ identity in which someone pretends to be someone else by assuming that person’s identity. d. without the permission of the owner to download computer data. 16. Data theft includes: a. unauthorized attempts to bypass the security mechanisms of an information system or network. b. use of information and communication technologies to support hostile behaviour c. a form of fraud or cheating of another persons’ identity d. without the permission of the person who is in charge of the computer, to download, copy or extract any data, computer data base or information from computer. 17. In the following case the Hon’ble Supreme Court struck down Section 66 A of eh I.T. Act: a. Kartar Singh v/s State of Punjab b. Maneka Gandhi v/s UOI c. K. A. Abbas v/s UOI d. Shreya Singhal v/s UOI 18. The following laws / sections were amended / passed to combat pornography of an aggravated form:

a. Section 134 of the Indian Evidence Act, 1872 b. Sections 66 A and 66 B of the I.T. (Amendment) Act, 2008 c. Section 13 of the POCSO Act, 2012 was passed to deal with such offences d. Section 376 of the Indian Penal Code 19. Prosecution has to give copies of: a. all electronic records relied upon by the prosecution to the Accused b. only those copies of the electronic records which are contained external hard disk, pen drives, CD;s, etc. c. non-electronic records involved in the case to the Accused d. only certain electronic documents to the Accused 20. The following Section draws a presumption that a secure electronic record has not been altered since the point of time to which the secure status relates: a. Section 85 B of the Indian Evidence Act, 1872 b. Section 3 of the I.T. Act, 2000 c. Section 192 of the Indian Penal Code, 1860 d. Section 200 of Cr. P. C. 21. Which of the following is not a type of cyber crime? a) Data theft b) Forgery c) Damage to data and systems d) Installing antivirus for protection 22. Cyber-laws are incorporated for punishing all criminals only. a) True b) False 23. Cyber-crime can be categorized into ________ types. a) 4 b) 3 c) 2 d) 6 24. Which of the following is not a type of peer-to-peer cyber-crime? a) Phishing b) Injecting Trojans to a target victim c) MiTM

d) Credit card details leak in deep web 25. Which of the following is not an example of a computer as weapon cyber-crime? a) Credit card fraudulent b) Spying someone using keylogger c) IPR Violation d) Pornography 26. Which of the following is not done by cyber criminals? a) Unauthorized account access b) Mass attack using Trojans as botnets c) Email spoofing and spamming d) Report vulnerability in any system 27. What is the name of the IT law that India is having in the Indian legislature? a) India’s Technology (IT) Act, 2000 b) India’s Digital Information Technology (DIT) Act, 2000 c) India’s Information Technology (IT) Act, 2000 d) The Technology Act, 2008 28. In which year India’s IT Act came into existence? a) 2000 b) 2001 c) 2002 d) 2003 29. What is the full form of ITA-2000? a) Information Tech Act -2000 b) Indian Technology Act -2000 c) International Technology Act -2000 d) Information Technology Act -2000 30. The Information Technology Act -2000 bill was passed by K. R. Narayanan. a) True b) False 31. Under which section of IT Act, stealing any digital asset or information is written a cybercrime. a) 65 b) 65-D

c) 67 d) 70 32. What is the punishment in India for stealing computer documents, assets or any software’s source code from any organization, individual, or from any other means? a) 6 months of imprisonment and a fine of Rs. 50,000 b) 1 year of imprisonment and a fine of Rs. 100,000 c) 2 years of imprisonment and a fine of Rs. 250,000 d) 3 years of imprisonment and a fine of Rs. 500,000 33. What is the updated version of the IT Act, 2000? a) IT Act, 2007 b) Advanced IT Act, 2007 c) IT Act, 2008 d) Advanced IT Act, 2008 34. In which year the Indian IT Act, 2000 got updated? a) 2006 b) 2008 c) 2010 d) 2012 35. What type of cyber-crime, its laws and punishments does section 66 of the Indian IT Act holds? a) Cracking or illegally hack into any system b) Putting antivirus into the victim c) Stealing data d) Stealing hardware components 36. Tampering with Computer Source Documents is ______ offence. (a) Bailable (b) Non-bailable (c) Non-cognizable (d) Both (a) and (c) 37. Every appeal to Cyber Appellate Tribunal shall be filed within a period of _____. (a) 60 days (b) 90 days (c) 45 days (d) 30 days

38. Order passed by Controller is challengeable before : (a) High Court (b) Cyber Appellate Tribunal (c) Adjudicatory Officer (d) Supreme Court 39. Child pornography is an offence under section ________. (a) 67 C (b) 67 A (c) 67 B (d) 67 D 40. Section 66 A is striked down by the judiciary in the case of : (a) Shreya Singhal v/s U.O.I. (b) Syed Asifuddin v/s State of A.P. (c) Ranjit Udeshi v/s State of Maharashtra (d) Regina v/s Hicklin 41. The authentication to be affected by use of asymmetric crypto system and hash function is known as : (a) Public key (b) Private key (c) Digital signature (d) E-governance 42. Which section of IT Act deals with the legal recognition of electronic records ? (a) Section 4 (b) Section 2 (c) Section 5 (d) Section 6 43. Which Section deals with cyber terrorism ? (a) 66 C (b) 66 B (c) 66 D (d) 66 F 44. What is the maximum penalty for damage to computer, computer system ? (a) Rs. 50 lakh

(b) Rs. 1 crore (c) Rs. 5 crore (d) 5 lakh 45. What is the penalty for destroying computer source code ? (a) Three yrs imprisonment or 5 lakh Rs. or both (b) Three yrs imprisonment or 1 lakh Rs. or both (c) Two yrs imprisonment or 2 lakh Rs. or both (d) Three yrs imprisonment or 2 lakh penalty or both 46. Amendment to IT Act 2000 came into effect on _______. (a) 2008 Oct. 2 (b) 2009 July 3 (c) 2008 June 1 (d) 2009 Oct. 27 47. Which section of IT Act deals with the punishment for cheating by imprisonment by using computer resource ? (a) Section 66 D (b) Section 66 C (c) Section 66 F (d) Section 66 B 48. Those who fail to furnish documents, return, report to the Controller of Certifying Authorities will be penalized upto : (a) Rs. 5,000 per day (b) Rs. 50,000 (c) Rs. 25,000 per day (d) Rs. 1.5 lakh 49. Licence to a Certifying Authority to issue electronic signature certificate will be valid for a period of : (a) 5 yrs (b) 10 yrs (c) 2 yrs (d) 7 yrs 50. Cyber squatting is associated with : (a) Domain Name Dispute (b) IP addressing dispute

(c) e-mail dispute (d) Password dispute 51. Copying of a web-page or website and storing that copy for the purpose of speeding up subsequent access is called : (a) Browsing (b) File Swapping (c) Caching (d) Downloading 52. The term EFT stands for : (a) Emergency Fund Transfer (b) Electric Fund Transfer (c) Electronic Fund Transfer (d) Electronic Fund Transmission 53. Punishment for child pornography is provided under Section _______ of the I.T. Act. (a) 66 (b) 67-A (c) 67-B (d) 67-C 54. ICANN stands for : (a) Internet Corporation for Assigned Names and Numbers (b) International Commission for Assigned Names and Numbers (c) International Corporation for Assisted Names and Numbers (d) Internet Computer Assigned Names and Numbers...


Similar Free PDFs