Sem VI Cyber Law BSC IT Question Bank MCQ PDF

Title Sem VI Cyber Law BSC IT Question Bank MCQ
Author Sejal Ghadshi
Course Cyber Security And Laws
Institution University of Mumbai
Pages 19
File Size 710.4 KB
File Type PDF
Total Downloads 216
Total Views 510

Summary

N0 Sr. Questions A B C D UNIT 11 1In march 1999, which virus caused an estimated damage to US $80 million paralyzing email system CD universe Melissa Slammer Nesses1 2 Which of the following is not a type of cyber-crime? Data theft ForgeryDamage to data and systemsinstalling antivirus for protection...


Description

UNIT N0

Sr.No.

Questions

A

B

C

D

CD universe

Melissa

Slammer

Nesses

Data theft

Forgery

Damage to data and systems The police officer is bound to register the FIR even with the permission of Magistrate. Imprisonment up to 5 years

installing antivirus for protection

of committing

not to commit

UNIT 1 1

1

In march 1999, which virus caused an estimated damage to US $80 million paralyzing email system

1

2

Which of the following is not a type of cyber-crime?

1

3

1

4

Cognizable offences as described as Punishment for Breach of Confidentiality and Privacy of IT Act offence is

1

5

Which are the grounds which section 80 covers

1

1

6

7

1 1 1

8 9 10

1

11

1 1

12 13

What is not the definition of Hacking

Section 470 of IPC describes Who are not the authority for justice dispensation system for cybercrimes? crime To be considered a computer crime, what needs to be involved in the crime. Under which section of IT Act, stealing any digital asset or information is written a cyber-crime. In which year India’s IT Act came into existence?

It is the offence in which a police officer can arrest the convict without the warrant. Imprisonment up to 2 years to commit

It is a bailable offence.

Imprisonment up to 3 years of not having committed

FIR not submit

Imprisonment up to 10 years

The gaining of unauthorized Breaking into access to data in a computer system system or computer.

Deliberate deception to valid concept secure unfair or unlawful gain

Forgery for purpose of cheating

Forged document

Forgery for the purpose of harming reputation

Making forged document

Certifying Authority

High Court

Adjudicating Officer

GPS Defamation

Encryption Abuse

Bluetooth Damage

Computers

Technology

Data

Networks

Section 69

Section 65

Section 67

Section 70

2003

2001

2002

2000

Controller of Certifying Authorities Trace and Trap Harassment

UNIT N0

Sr.No.

1

14

1

15

1

16

1 1

17 18

1

19

Questions where it mentioned if anyone publishes sexually explicit digital content then under of IT Act, 2008 he/she has to pay a legitimate amount of fine. What is the person called when they try to hurt a group of people with the use of a computer.

What is the name of the IT law that India is having in the Indian legislature? Non cognizable offence is an offence in which a police-officer cannot arrest any person without The example of computer crime are: Cyber crime is aware of no geographical limitations, boundaries or distances. What type of cyber-crime, its laws and punishments does section 66 of the Indian IT Act holds? content, it will cost that person imprisonment of years.

1

20

1

21

1

22

1

23

What worm emailed people with the words "I LOVE YOU' in the year 2000? An offence in which bail can be granted to the accused as of right is called

1

24

Which of the following is not a type of cyber crime?

25

What is the punishment in India for stealing computer documents, assets or any software’s source code from any organization, individual, or from any other means?

1

A

B

C

D

section 67-A

section 69-A

section 66-A

section 72-A

Cyber Terrorist

Whitehat intruder Cracker

India’s Information Technology (IT) Act, 2000

India’s Technology (IT) Act, 2000

India’s Digital Information The Technology Act, Technology 2008 (DIT) Act, 2000

Notice

Warrant

Authority Letter permission

Software creation

data check

Cracking

FALSE

TRUE

Putting antivirus into the victim

Stealing data

Cracking or Stealing hardware illegally hack components into any system

4

5

3

2

The Love Bug

The Love

The valentine connection

The darling Link

Schedule offence

Non bailable offence

Bailable offence non schedule offence

antivirus for

Data theft

Forgery

3 years of 6 months of imprisonment and imprisonment and a fine of Rs. a fine of Rs. 50,000 500,000

Social Engineer

software licence

Damage to data and systems

1 year of 2 years of imprisonment imprisonment and a and a fine of Rs. fine of Rs. 250,000 100,000

UNIT N0

1

Sr.No.

26

1

27

1

28

1

29

1 1

30 31

1 1

1

32

Questions

A

B

All of these

The population of Government India is increasing. Negligence

The lack of responsibility and sensitibility and having slow attitude.

up to 1 years or fine upto 1 lakhs or with both Non bailable offence

up to 2 years or fine upto 21 lakhs or with both

up to 3 years or fine upto 2 lakhs or with both

System hijacking

Cyber-crime

Cyber Attack

Section 43,44,45

Section 42,44,46

Section 42,44,47 Section 42,44,48

17 October, 2000

11 November, 2000 Power of Attorney with digital

17 October, 2001 Electronic message Electronic Commerce Intellectual property rights and Data Protection and

Which is reason for delaying the justice are

The punishment for criminal hacking is An offence in which bail can be granted to the accused as of right is called An attempt to harm, damage or cause threat to a system or network is broadly termed as Which sections for Monetary penalties, adjudication and appeals under IT Act, 2000 When IT ACT 2000 came into effect? Which one of the following is outside the scope of IT Act 2000A.

33

The term Cyber Law means law governing

34

Which of the following are issues addressed by cyber law?

Electronic gift

1

35

Which one is within the scope of IT ACT?

36

Which act states the statement "80 Power of police officer and other officers to enter, search etc."

Cyber Space

Cyber transactions

Electronic marketing

Information Technology act 1990 Police can take action

1

37

1

38

Non cognizable offence refers to what? When the accused if found at public place, all the IT Act offences would become .

Bailable offence

Electronic Transactions

Trust

1

C

non cognizable

up to 4 years or fine upto 2 lakhs or with both Schedule offence

D

corrective actions Digital crime

11 November, 2001 Electronic Evidenc cyber crime

data concept

Electronic Agreement of sale of Will immovable property with digital Section 80 Code of criminal Information procedure, 1973 Technology act Police have no authority to Police can file FIR aprehend a person for crime.

code of criminal procedure, 1974

criminal

Cognizable

Heinous

Truncated Cheque

Police can arrest without warrant

UNIT N0

Sr.No.

1

39

1

40

1

41

1

1

42

43

1

44

1

45

1

46

1

47

Questions What is full form of FIR ? Arrest and investigation of offences under IT Act and other Cyber Crimes should be conducted by whom? What are the grounds of arrest as per section 80 of IT Act 2000?

Which of the following statements are correct about cyber crime and cyber criminal?

A

B

C

D

False information record A Police officer not below the rank of DGP of having committed

First Information Record A Police officer not below the rank of DSP

First information report A Police officer not below the rank of Sub of being about to commit

Future information report

Geographic distances and borders are revelant to cyber crime.

After commiting offence, A goes to A has committed offence of hacking from his house, under hotel. He can be arrested without IT Act section 66. Which of the following warrent. statements is correct? He cannot be "If A from a cyber café in Mumbai, is alleged to have arrested without hacked the defence systems installed in computer warrant , if he network in Defence Ministry at Delhi." Which of the remains in cyber following statement is correct in this context. café or found in Cyber crime is criminal activity which can be conducted computer, network using what of the following? or network device How much time was taken by the famous "I Love You" 2 Hours virus to spread all over the globe?

Who are Phreakers?

Who have knowledge of computer operations

of commiting A cyber criminal sitting in one corner of the globe may hack into the victim's bank's computer located in another corner. After committing offence, he remains at home. he cannot be arrested without warrent as per section 80. He can be arrested without warrant , if he remains in cyber café or found in some public place

A Police officer All of the above

A cyber criminal is here, there, every where and yet nowhere

None of the above

Cannot be arrested at all.

Can be arrested only at public place

He can be arrested without warrant , if he goes home

None of the above

Revolver

Using Internet

2 Weeks

1 Hour

30 Minutes

Who have deep knowledge of internet and telecommunication systems.

Who have knowledge of high level languages.

Who have knowledge of cryptography

UNIT N0

Sr.No.

Questions

1

48

Who are the code hackers?

1 1 1

49 50 51

1

52

Hacking refers to hacking? The offence of cheating in india is called . Cheating is defined in the Indian penal code under which section?

1

53

1

54

1

55

1 1

56 57

1

58

1

59

1

1 1

60

61 62

Section 405, 406 are for which offence? Types of ecommerce transactions include what of the following? A agreement is mostly found as part of the installation process of software packages.

The click-wrap agreement should be stated in a manner such that it can be viewed before the option of acceptance or rejection is exercised The person making the proposal is called the In India, there is no decision on the validity of a shrink-wrap contract. Non-disclosure/confidentiality clauses seek to protect property The mechanism of arbitration has been strengthened by legislating the Arbitration and Conciliation act,1996,which is based on

Which of the following statements are correct? Cyber crime is increasing at what rate?

A

B

C

D

breaking into a house 77(3) 220

Those who have Those who have the knowledgeof knowledge of coding intricacies of language. computer systems and their breaking into breaking into a computer system mobile phone 80(1) 66(1) 320 120

90(2) 420

678

233

415

420

murder

cheating

criminal breach of trust

cyber crime

Information Access

Interpersonal communication

shoping services

All the above

click-wrap

click-wrap contracts

Type and click

icon clicking

TRUE

FALSE

promiser

proposal maker

TRUE

FALSE

private

confidential

sufficient

Jurisdictional law

Arbitrators law

Unicitral model Foreign arbitration law law

who have knowledge of telecommunication systems.

In year 2017, hackers from Pakistan hacked 40 Indian web-sites. 10% per week

The group of hackers, called G Force Pakistan hacked Indian organizations 5.2% per month

Who have Knowledge of internet

stealing information

proposal acceptor all of the above

intellectual

Pakistan Hackers club has hacked All of the above sites of Indian Parliament. 4.1% per week

4.1% per year

UNIT N0 1 1

Sr.No.

63 64

Questions Any person intentinally destroys or alters any computer source code, when it is required to be kept by law, is said to commit the offence and is punishable with protected system as declared by a notification in the official gazette by the Government shall be liable for which punishment?

A imprisonment upto 4 years Imprisonment upto 15 years and liable to fine ISP who offer services such as hosting content

1

65

Who are Network service providers as per IT Act?

B imprisonment upto 3 years or fine upto 2 lakhs or both Imprisonment upto 12 years and liable to fine Access providers who specialize in offering access to the internet

C

D

fine upto 4 lakhs

imprisonment upto 1 year

Imprisonment Imprisonment upto 8 upto 10 years and years and liable to fine liable to fine Online service providers who provide All of the above proprietry content for

UNIT 2

2

1

2

2

2 2 2

3 4 5

2

6

buying and selling of goods and services, or the transmitting of funds or data, over an electronic network, primarily the internet is known as generates, stores or transmits any electronic message to be sent, generated, stored or transmitted to any other person and does not include an Intermediary is known as according to the IT Act, 2008 is a person who is intended by the originator to receive the electronic record but does not include any Intermediary make a proposal is called as “invitation to treat” is one types of a Necessary element for determining knowledge of the offeree and acknowledgement is received by him then called as The offeror is able to revoke the offer any time

2

7 Which one of the following element is not necessary for a contract ?

2

8

E Commerce

E contract

E Business

E Market

Originator

Addressee

Agent

Leader

Originator

Addressee

Agent

Leader

Agreement Agreement

Contract Contract

Offer Deal

Deal Offer

Offer Completed

Agreement Completed

Offer Partial Completed

Offer InCompleted

After the before the communication of communication of acceptance is acceptance is complete complete Competent parties

Reasonable terms and conditions.

After Agreement Before Contract

Free consent

Lawful consideration

UNIT N0

Sr.No.

2

9

2

10

2 2 2

11 12 13

1

14

2

15

2

16

2

17

2

2

2

2

2

Questions void ? Which of the following is cannot be contractual Party?

A

B

C

Acceptance

Free Consent

Unlawful Object Lawful consideration

Originator

Addressee

Autonomous Computer End-user Agreement Promisee Promisee

End-License Agreement Promisor Promisor

Accepter Accepter

Natural And Legal Person End-user Loyalty Agreement Dealer Dealer

Shrink Wrap

Click Wrap

Click Shrink

Browse-Wrap

Click Wrap

Shrink Wrap

Browse-Wrap

Click Shrink

Click Wrap agreement Click wrap agreement.

Click Shrink agreement Click Shrink agreement

shrink wrap agreement. shrink wrap agreement.

Browse-Wrap agreement Browse-Wrap agreement

Offer

Acceptance

Unlawful Consideration

Free Consent

Which one of the following element is necessary for a Autonomous contract ? Computer

Certainty of terms

Anonymous Computer

Incompetent Parties

Which one of the following element is necessary for a Autonomous contract as a Competent Parties ? Computer

Incompetent Parties

Anonymous Computer

Natural And Legal Operator

E Commerce

E contract

E Business

E Market

It is by free consent of the parties.

Parties are competent.

It is enforceable Acceptance by law.

EULA stands for? The person making Proposal is called as The person accepting Proposal is called as agreements are those which can only be read and accepted by the consumer after the opening of a particular product is called as Agreement comes into force when an online buyer or user clicks on the I AGREE button on a webpage to purchase or download a program is called as Installing software from a CD into your PC is an example of a Choosing to make payments online or choosing to reject it is an example of a Which one of the following element is not necessary for a contract ?

18

19

20

21

22

D

An enforceable agreement created and signed in electronic form—that is to say, no paper or other hard copies are used is called as An agreement becomes a contract if :

License


Similar Free PDFs