Title | Sem VI Cyber Law BSC IT Question Bank MCQ |
---|---|
Author | Sejal Ghadshi |
Course | Cyber Security And Laws |
Institution | University of Mumbai |
Pages | 19 |
File Size | 710.4 KB |
File Type | |
Total Downloads | 216 |
Total Views | 510 |
N0 Sr. Questions A B C D UNIT 11 1In march 1999, which virus caused an estimated damage to US $80 million paralyzing email system CD universe Melissa Slammer Nesses1 2 Which of the following is not a type of cyber-crime? Data theft ForgeryDamage to data and systemsinstalling antivirus for protection...
UNIT N0
Sr.No.
Questions
A
B
C
D
CD universe
Melissa
Slammer
Nesses
Data theft
Forgery
Damage to data and systems The police officer is bound to register the FIR even with the permission of Magistrate. Imprisonment up to 5 years
installing antivirus for protection
of committing
not to commit
UNIT 1 1
1
In march 1999, which virus caused an estimated damage to US $80 million paralyzing email system
1
2
Which of the following is not a type of cyber-crime?
1
3
1
4
Cognizable offences as described as Punishment for Breach of Confidentiality and Privacy of IT Act offence is
1
5
Which are the grounds which section 80 covers
1
1
6
7
1 1 1
8 9 10
1
11
1 1
12 13
What is not the definition of Hacking
Section 470 of IPC describes Who are not the authority for justice dispensation system for cybercrimes? crime To be considered a computer crime, what needs to be involved in the crime. Under which section of IT Act, stealing any digital asset or information is written a cyber-crime. In which year India’s IT Act came into existence?
It is the offence in which a police officer can arrest the convict without the warrant. Imprisonment up to 2 years to commit
It is a bailable offence.
Imprisonment up to 3 years of not having committed
FIR not submit
Imprisonment up to 10 years
The gaining of unauthorized Breaking into access to data in a computer system system or computer.
Deliberate deception to valid concept secure unfair or unlawful gain
Forgery for purpose of cheating
Forged document
Forgery for the purpose of harming reputation
Making forged document
Certifying Authority
High Court
Adjudicating Officer
GPS Defamation
Encryption Abuse
Bluetooth Damage
Computers
Technology
Data
Networks
Section 69
Section 65
Section 67
Section 70
2003
2001
2002
2000
Controller of Certifying Authorities Trace and Trap Harassment
UNIT N0
Sr.No.
1
14
1
15
1
16
1 1
17 18
1
19
Questions where it mentioned if anyone publishes sexually explicit digital content then under of IT Act, 2008 he/she has to pay a legitimate amount of fine. What is the person called when they try to hurt a group of people with the use of a computer.
What is the name of the IT law that India is having in the Indian legislature? Non cognizable offence is an offence in which a police-officer cannot arrest any person without The example of computer crime are: Cyber crime is aware of no geographical limitations, boundaries or distances. What type of cyber-crime, its laws and punishments does section 66 of the Indian IT Act holds? content, it will cost that person imprisonment of years.
1
20
1
21
1
22
1
23
What worm emailed people with the words "I LOVE YOU' in the year 2000? An offence in which bail can be granted to the accused as of right is called
1
24
Which of the following is not a type of cyber crime?
25
What is the punishment in India for stealing computer documents, assets or any software’s source code from any organization, individual, or from any other means?
1
A
B
C
D
section 67-A
section 69-A
section 66-A
section 72-A
Cyber Terrorist
Whitehat intruder Cracker
India’s Information Technology (IT) Act, 2000
India’s Technology (IT) Act, 2000
India’s Digital Information The Technology Act, Technology 2008 (DIT) Act, 2000
Notice
Warrant
Authority Letter permission
Software creation
data check
Cracking
FALSE
TRUE
Putting antivirus into the victim
Stealing data
Cracking or Stealing hardware illegally hack components into any system
4
5
3
2
The Love Bug
The Love
The valentine connection
The darling Link
Schedule offence
Non bailable offence
Bailable offence non schedule offence
antivirus for
Data theft
Forgery
3 years of 6 months of imprisonment and imprisonment and a fine of Rs. a fine of Rs. 50,000 500,000
Social Engineer
software licence
Damage to data and systems
1 year of 2 years of imprisonment imprisonment and a and a fine of Rs. fine of Rs. 250,000 100,000
UNIT N0
1
Sr.No.
26
1
27
1
28
1
29
1 1
30 31
1 1
1
32
Questions
A
B
All of these
The population of Government India is increasing. Negligence
The lack of responsibility and sensitibility and having slow attitude.
up to 1 years or fine upto 1 lakhs or with both Non bailable offence
up to 2 years or fine upto 21 lakhs or with both
up to 3 years or fine upto 2 lakhs or with both
System hijacking
Cyber-crime
Cyber Attack
Section 43,44,45
Section 42,44,46
Section 42,44,47 Section 42,44,48
17 October, 2000
11 November, 2000 Power of Attorney with digital
17 October, 2001 Electronic message Electronic Commerce Intellectual property rights and Data Protection and
Which is reason for delaying the justice are
The punishment for criminal hacking is An offence in which bail can be granted to the accused as of right is called An attempt to harm, damage or cause threat to a system or network is broadly termed as Which sections for Monetary penalties, adjudication and appeals under IT Act, 2000 When IT ACT 2000 came into effect? Which one of the following is outside the scope of IT Act 2000A.
33
The term Cyber Law means law governing
34
Which of the following are issues addressed by cyber law?
Electronic gift
1
35
Which one is within the scope of IT ACT?
36
Which act states the statement "80 Power of police officer and other officers to enter, search etc."
Cyber Space
Cyber transactions
Electronic marketing
Information Technology act 1990 Police can take action
1
37
1
38
Non cognizable offence refers to what? When the accused if found at public place, all the IT Act offences would become .
Bailable offence
Electronic Transactions
Trust
1
C
non cognizable
up to 4 years or fine upto 2 lakhs or with both Schedule offence
D
corrective actions Digital crime
11 November, 2001 Electronic Evidenc cyber crime
data concept
Electronic Agreement of sale of Will immovable property with digital Section 80 Code of criminal Information procedure, 1973 Technology act Police have no authority to Police can file FIR aprehend a person for crime.
code of criminal procedure, 1974
criminal
Cognizable
Heinous
Truncated Cheque
Police can arrest without warrant
UNIT N0
Sr.No.
1
39
1
40
1
41
1
1
42
43
1
44
1
45
1
46
1
47
Questions What is full form of FIR ? Arrest and investigation of offences under IT Act and other Cyber Crimes should be conducted by whom? What are the grounds of arrest as per section 80 of IT Act 2000?
Which of the following statements are correct about cyber crime and cyber criminal?
A
B
C
D
False information record A Police officer not below the rank of DGP of having committed
First Information Record A Police officer not below the rank of DSP
First information report A Police officer not below the rank of Sub of being about to commit
Future information report
Geographic distances and borders are revelant to cyber crime.
After commiting offence, A goes to A has committed offence of hacking from his house, under hotel. He can be arrested without IT Act section 66. Which of the following warrent. statements is correct? He cannot be "If A from a cyber café in Mumbai, is alleged to have arrested without hacked the defence systems installed in computer warrant , if he network in Defence Ministry at Delhi." Which of the remains in cyber following statement is correct in this context. café or found in Cyber crime is criminal activity which can be conducted computer, network using what of the following? or network device How much time was taken by the famous "I Love You" 2 Hours virus to spread all over the globe?
Who are Phreakers?
Who have knowledge of computer operations
of commiting A cyber criminal sitting in one corner of the globe may hack into the victim's bank's computer located in another corner. After committing offence, he remains at home. he cannot be arrested without warrent as per section 80. He can be arrested without warrant , if he remains in cyber café or found in some public place
A Police officer All of the above
A cyber criminal is here, there, every where and yet nowhere
None of the above
Cannot be arrested at all.
Can be arrested only at public place
He can be arrested without warrant , if he goes home
None of the above
Revolver
Using Internet
2 Weeks
1 Hour
30 Minutes
Who have deep knowledge of internet and telecommunication systems.
Who have knowledge of high level languages.
Who have knowledge of cryptography
UNIT N0
Sr.No.
Questions
1
48
Who are the code hackers?
1 1 1
49 50 51
1
52
Hacking refers to hacking? The offence of cheating in india is called . Cheating is defined in the Indian penal code under which section?
1
53
1
54
1
55
1 1
56 57
1
58
1
59
1
1 1
60
61 62
Section 405, 406 are for which offence? Types of ecommerce transactions include what of the following? A agreement is mostly found as part of the installation process of software packages.
The click-wrap agreement should be stated in a manner such that it can be viewed before the option of acceptance or rejection is exercised The person making the proposal is called the In India, there is no decision on the validity of a shrink-wrap contract. Non-disclosure/confidentiality clauses seek to protect property The mechanism of arbitration has been strengthened by legislating the Arbitration and Conciliation act,1996,which is based on
Which of the following statements are correct? Cyber crime is increasing at what rate?
A
B
C
D
breaking into a house 77(3) 220
Those who have Those who have the knowledgeof knowledge of coding intricacies of language. computer systems and their breaking into breaking into a computer system mobile phone 80(1) 66(1) 320 120
90(2) 420
678
233
415
420
murder
cheating
criminal breach of trust
cyber crime
Information Access
Interpersonal communication
shoping services
All the above
click-wrap
click-wrap contracts
Type and click
icon clicking
TRUE
FALSE
promiser
proposal maker
TRUE
FALSE
private
confidential
sufficient
Jurisdictional law
Arbitrators law
Unicitral model Foreign arbitration law law
who have knowledge of telecommunication systems.
In year 2017, hackers from Pakistan hacked 40 Indian web-sites. 10% per week
The group of hackers, called G Force Pakistan hacked Indian organizations 5.2% per month
Who have Knowledge of internet
stealing information
proposal acceptor all of the above
intellectual
Pakistan Hackers club has hacked All of the above sites of Indian Parliament. 4.1% per week
4.1% per year
UNIT N0 1 1
Sr.No.
63 64
Questions Any person intentinally destroys or alters any computer source code, when it is required to be kept by law, is said to commit the offence and is punishable with protected system as declared by a notification in the official gazette by the Government shall be liable for which punishment?
A imprisonment upto 4 years Imprisonment upto 15 years and liable to fine ISP who offer services such as hosting content
1
65
Who are Network service providers as per IT Act?
B imprisonment upto 3 years or fine upto 2 lakhs or both Imprisonment upto 12 years and liable to fine Access providers who specialize in offering access to the internet
C
D
fine upto 4 lakhs
imprisonment upto 1 year
Imprisonment Imprisonment upto 8 upto 10 years and years and liable to fine liable to fine Online service providers who provide All of the above proprietry content for
UNIT 2
2
1
2
2
2 2 2
3 4 5
2
6
buying and selling of goods and services, or the transmitting of funds or data, over an electronic network, primarily the internet is known as generates, stores or transmits any electronic message to be sent, generated, stored or transmitted to any other person and does not include an Intermediary is known as according to the IT Act, 2008 is a person who is intended by the originator to receive the electronic record but does not include any Intermediary make a proposal is called as “invitation to treat” is one types of a Necessary element for determining knowledge of the offeree and acknowledgement is received by him then called as The offeror is able to revoke the offer any time
2
7 Which one of the following element is not necessary for a contract ?
2
8
E Commerce
E contract
E Business
E Market
Originator
Addressee
Agent
Leader
Originator
Addressee
Agent
Leader
Agreement Agreement
Contract Contract
Offer Deal
Deal Offer
Offer Completed
Agreement Completed
Offer Partial Completed
Offer InCompleted
After the before the communication of communication of acceptance is acceptance is complete complete Competent parties
Reasonable terms and conditions.
After Agreement Before Contract
Free consent
Lawful consideration
UNIT N0
Sr.No.
2
9
2
10
2 2 2
11 12 13
1
14
2
15
2
16
2
17
2
2
2
2
2
Questions void ? Which of the following is cannot be contractual Party?
A
B
C
Acceptance
Free Consent
Unlawful Object Lawful consideration
Originator
Addressee
Autonomous Computer End-user Agreement Promisee Promisee
End-License Agreement Promisor Promisor
Accepter Accepter
Natural And Legal Person End-user Loyalty Agreement Dealer Dealer
Shrink Wrap
Click Wrap
Click Shrink
Browse-Wrap
Click Wrap
Shrink Wrap
Browse-Wrap
Click Shrink
Click Wrap agreement Click wrap agreement.
Click Shrink agreement Click Shrink agreement
shrink wrap agreement. shrink wrap agreement.
Browse-Wrap agreement Browse-Wrap agreement
Offer
Acceptance
Unlawful Consideration
Free Consent
Which one of the following element is necessary for a Autonomous contract ? Computer
Certainty of terms
Anonymous Computer
Incompetent Parties
Which one of the following element is necessary for a Autonomous contract as a Competent Parties ? Computer
Incompetent Parties
Anonymous Computer
Natural And Legal Operator
E Commerce
E contract
E Business
E Market
It is by free consent of the parties.
Parties are competent.
It is enforceable Acceptance by law.
EULA stands for? The person making Proposal is called as The person accepting Proposal is called as agreements are those which can only be read and accepted by the consumer after the opening of a particular product is called as Agreement comes into force when an online buyer or user clicks on the I AGREE button on a webpage to purchase or download a program is called as Installing software from a CD into your PC is an example of a Choosing to make payments online or choosing to reject it is an example of a Which one of the following element is not necessary for a contract ?
18
19
20
21
22
D
An enforceable agreement created and signed in electronic form—that is to say, no paper or other hard copies are used is called as An agreement becomes a contract if :
License