Title | Sem VI Cyber Law BSC IT Question Bank MCQ |
---|---|
Author | Mayuree Vare |
Course | Bsc. Information Technology |
Institution | University of Mumbai |
Pages | 18 |
File Size | 600.5 KB |
File Type | |
Total Downloads | 263 |
Total Views | 483 |
N0 Sr. Questions A B C D1 1In march 1999, which virus caused an estimated damage to US $80 million paralyzing email system CD universe Melissa Slammer Nesses1 2 Which of the following is not a type of cyber-crime? Data theft ForgeryDamage to data and systemsinstalling antivirus for protection1 3 Cog...
UNIT N0
Sr.No.
Questions
A
B
C
D
Melissa
Slammer
Nesses
UNIT 1 1
1
In march 1999, which virus caused an estimated damage to US $80 million paralyzing email system
1
2
Which of the following is not a type of cyber-crime?
1
3
1
4
Cognizable offences as described as Punishment for Breach of Confidentiality and Privacy of IT Act offence is
1
5
Which are the grounds which section 80 covers
1
6
1
7
1 1 1
8 9 10
1
11
1 1
12 13
What is not the definition of Hacking
Section 470 of IPC describes Who are not the authority for justice dispensation system for cybercrimes? crime ___ To be considered a computer crime, what needs to be involved in the crime. Under which section of IT Act, stealing any digital asset or information is written a cyber-crime. InwhichyearIndia’sITActcameintoexistence?
CD universe
Damage to data and systems It is the offence in The police which a police officer is bound officer can arrest It is a bailable to register the offence. the convict FIR even with without the the permission warrant. of Magistrate. Imprisonment up Imprisonment up Imprisonment to 2 years to 3 years up to 5 years of not having to commit of committing committed The gaining of Deliberate unauthorized deception to Breaking into access to data in a computer system secure unfair or system or unlawful gain computer. Forgery for the Forgery for purpose of Forged document purpose of harming cheating reputation Controller of Certifying Certifying High Court Authority Authorities Trace and Trap GPS Encryption Harassment Defamation Abuse
Data theft
Forgery
installing antivirus for protection
FIR not submit
Imprisonment up to 10 years not to commit
valid concept
Making forged document
Adjudicating Officer Bluetooth Damage
Computers
Technology
Data
Networks
Section 69
Section 65
Section 67
Section 70
2003
2001
2002
2000
UNIT N0
Sr.No.
1
14
1
15
1
16
1 1
17 18
1
19
1
20
1
21
1
22
1
23
1
24
1
25
Questions where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of fine. What is the person called when they try to hurt a group of people with the use of a computer.
A
B
C
D
section 67-A
section 69-A
section 66-A
section 72-A
Cyber Terrorist
Whitehat intruder Cracker
India’s Information Technology (IT) Act, 2000
India’s Technology (IT) Act, 2000
What is the name of the IT law that India is having in the Indian legislature? Non cognizable offence is an offence in which a Notice Warrant police-officer cannot arrest any person without The example of computer crime are: Software creation data check Cyber crime is aware of no geographical limitations, FALSE TRUE boundaries or distances. What type of cyber-crime, its laws and punishments does section 66 of the Indian IT Act holds? content, it will cost that person imprisonment of _________ years. What worm emailed people with the words "I LOVE YOU' in the year 2000? An offence in which bail can be granted to the accused as of right is called___
Social Engineer
India’sDigital Information The Technology Act, Technology 2008 (DIT) Act, 2000 Authority Letter permission Cracking
software licence
Putting antivirus into the victim
Stealing data
Cracking or Stealing hardware illegally hack components into any system
4
5
3
2
The Love Bug
The Love
The valentine connection
The darling Link
Non bailable offence
Bailable offence non schedule offence
Data theft
Forgery
Schedule offence Installing antivirus for Which of the following is not a type of cyber crime? protection What is the punishment in India for stealing 3 years of computerdocuments,assetsoranysoftware’s imprisonment and source code from any organization, individual, or a fine of Rs. from any other means? 500,000
Damage to data and systems
1 year of 6 months of 2 years of imprisonment imprisonment and imprisonment and a and a fine of Rs. a fine of Rs. 50,000 fine of Rs. 250,000 100,000
UNIT N0
1
Sr.No.
26
Questions
A
B
All of these
The population of Government India is increasing. Negligence
up to 1 years or fine upto 1 lakhs or with both Non bailable offence
up to 2 years or up to 4 years or fine upto 21 lakhs fine upto 2 lakhs or with both or with both Schedule Bailable offence offence
Which is reason for delaying the justice are____
1
27
1
28
1
29
1 1
30 31
1
32
1
33
When IT ACT 2000 came into effect? 17 October, 2000 Which one of the following is outside the scope of IT Act Electronic gift 2000A. Electronic The term Cyber Law means law governing _________ Transactions
34
Which of the following are issues addressed by cyber law?
1
1 1
The punishment for criminal hacking is___________ An offence in which bail can be granted to the accused as of right is called___ An attempt to harm, damage or cause threat to a System hijacking system or network is broadly termed as ______ Which sections for Monetary penalties, adjudication Section 43,44,45 and appeals under IT Act, 2000
35
Which one is within the scope of IT ACT?
36
Which act states the statement "80 Power of police officer and other officers to enter, search etc."
1
37
1
38
C
Non cognizable offence refers to what? When the accused if found at public place, all the IT Act offences would become _____________.
The lack of responsibility and sensitibility and having slow attitude. up to 3 years or fine upto 2 lakhs or with both corrective actions
Cyber-crime
Cyber Attack
Section 42,44,46
Section 42,44,47 Section 42,44,48
11 November, 2000 17 October, 2001 Power of Attorney Electronic with digital message Electronic Cyber Space Commerce Intellectual Electronic property rights Cyber transactions and Data marketing Protection and Electronic Agreement of sale of Trust Will immovable property with digital Information Section 80 Code of criminal Technology act Information procedure, 1973 1990 Technology act Police have no authority to Police can take Police can file FIR aprehend a action person for crime. non cognizable
D
criminal
Heinous
Digital crime
11 November, 2001 Electronic Evidenc cyber crime
data concept
Truncated Cheque
code of criminal procedure, 1974 Police can arrest without warrant Cognizable
UNIT N0
Sr.No.
1
39
1
40
1
41
1
1
42
43
1
44
1
45
1
46
1
47
Questions What is full form of FIR ? Arrest and investigation of offences under IT Act and other Cyber Crimes should be conducted by whom? What are the grounds of arrest as per section 80 of IT Act 2000?
Which of the following statements are correct about cyber crime and cyber criminal?
A has committed offence of hacking from his house, under IT Act section 66. Which of the following statements is correct? "If A from a cyber café in Mumbai, is alleged to have hacked the defence systems installed in computer network in Defence Ministry at Delhi." Which of the following statement is correct in this context. Cyber crime is criminal activity which can be conducted using what of the following? How much time was taken by the famous "I Love You" virus to spread all over the globe?
Who are Phreakers?
A
B
C
D
False information record A Police officer not below the rank of DGP of having committed
First Information Record A Police officer not below the rank of DSP
First information report A Police officer not below the rank of Sub of being about to commit
Future information report
Geographic distances and borders are revelant to cyber crime. After commiting offence, A goes to hotel. He can be arrested without warrent.
of commiting A cyber criminal sitting in one corner of the globe may hack into the victim's bank's computer located in another corner. After committing offence, he remains at home. he cannot be arrested without warrent as per section 80. He can be arrested without warrant , if he remains in cyber café or found in some public place
He cannot be arrested without warrant , if he remains in cyber café or found in computer, network Revolver or network device
A Police officer All of the above
A cyber criminal is here, there, every where and yet nowhere
None of the above
Cannot be arrested at all.
Can be arrested only at public place
He can be arrested without warrant , if he goes home
None of the above
Using Internet
2 Hours
2 Weeks
1 Hour
30 Minutes
Who have knowledge of computer operations
Who have deep knowledge of internet and telecommunication systems.
Who have knowledge of high level languages.
Who have knowledge of cryptography
UNIT N0
Sr.No.
Questions
A
48
Who are the code hackers?
1 1 1
49 50 51
1
52
Hacking refers to __________ hacking? The offence of cheating in india is called ______. Cheating is defined in the Indian penal code under which 678 section?
1
53
1
54
Section 405, 406 are for which offence? Types of ecommerce transactions include what of the following?
1
55
A _________ agreement is mostly found as part of the installation process of software packages.
1 1
56 57
1
58
1
59
1
1 1
60
61 62
Which of the following statements are correct? Cyber crime is increasing at what rate?
C
Those who have who have Those who have the knowledgeof knowledge of knowledge of coding intricacies of telecommunication language. computer systems. systems and their breaking into a breaking into breaking into a house computer system mobile phone 77(3) 80(1) 66(1) 220 320 120
1
The click-wrap agreement should be stated in a manner such that it can be viewed before the option of acceptance or rejection is exercised The person making the proposal is called the ____ In India, there is no decision on the validity of a shrink-wrap contract. Non-disclosure/confidentiality clauses seek to protect ________ property The mechanism of arbitration has been strengthened by legislating the Arbitration and Conciliation act,1996,which is based on __________
B
D Who have Knowledge of internet
stealing information 90(2) 420
233
415
420
murder
cheating
criminal breach of trust
cyber crime
Information Access
Interpersonal communication
shoping services
All the above
click-wrap
click-wrap contracts
Type and click
icon clicking
TRUE
FALSE
promiser
proposal maker
TRUE
FALSE
private
confidential
Jurisdictional law Arbitrators law The group of In year 2017, hackers, called G hackers from Force Pakistan Pakistan hacked 40 hacked Indian Indian web-sites. organizations 10% per week 5.2% per month
proposal acceptor all of the above
sufficient
intellectual
Unicitral model Foreign arbitration law law Pakistan Hackers club has hacked All of the above sites of Indian Parliament. 4.1% per week
4.1% per year
UNIT N0 1
1
Sr.No.
63
64
Questions Any person intentinally destroys or alters any computer source code, when it is required to be kept by law, is said to commit the offence and is punishable with protected system as declared by a notification in the official gazette by the Government shall be liable for which punishment?
A
imprisonment upto imprisonment upto 3 years or fine upto 4 years 2 lakhs or both Imprisonment upto Imprisonment upto 15 years and liable 12 years and liable to fine to fine ISP who offer services such as hosting content
1
65
B
Who are Network service providers as per IT Act?
Access providers who specialize in offering access to the internet
C
D
fine upto 4 lakhs
imprisonment upto 1 year
Imprisonment Imprisonment upto 8 upto 10 years and years and liable to fine liable to fine Online service providers who All of the above provide proprietry content for
UNIT 2
2
1
2
2
2 2 2
3 4 5
2
6
buying and selling of goods and services, or the transmitting of funds or data, over an electronic network, primarily the internet is known as generates, stores or transmits any electronic message to be sent, generated, stored or transmitted to any other person and does not include an Intermediary is known as according to the IT Act, 2008 is a person who is intended by the originator to receive the electronic record but does not include any Intermediary make a proposal is called as “invitationtotreat”isonetypesofa Necessary element for determining knowledge of the offeree and acknowledgement is received by him then called as The offeror is able to revoke the offer any time
2
7 Which one of the following element is not necessary for a contract ?
2
8
E Commerce
E contract
E Business
E Market
Originator
Addressee
Agent
Leader
Originator
Addressee
Agent
Leader
Agreement Agreement
Contract Contract
Offer Deal
Deal Offer
Offer Completed
Agreement Completed
Offer Partial Completed
Offer InCompleted
After the communication of acceptance is complete
before the communication of After Agreement Before Contract acceptance is complete
Competent parties
Reasonable terms Free consent and conditions.
Lawful consideration
UNIT N0
Sr.No. void ?
2
9
2
10
2 2 2
11 12 13
1
14
2
15
2
16
2
17
2
2
2
2
2
Questions
Which of the following is cannot be contractual Party?
A
B
C
Acceptance
Free Consent
Unlawful Object Lawful consideration
Originator
Natural And Legal Person End-user Loyalty Agreement Dealer Dealer
Autonomous Computer End-user Agreement Promisee Promisee
End-License Agreement Promisor Promisor
Addressee End-user License Agreement Accepter Accepter
Shrink Wrap
Click Wrap
Click Shrink
Browse-Wrap
Click Wrap
Shrink Wrap
Browse-Wrap
Click Shrink
Click Wrap agreement Click wrap agreement.
Click Shrink agreement Click Shrink agreement
shrink wrap agreement. shrink wrap agreement.
Browse-Wrap agreement Browse-Wrap agreement
Offer
Acceptance
Unlawful Consideration
Free Consent
Which one of the following element is necessary for Autonomous a contract ? Computer
Certainty of terms
Anonymous Computer
Incompetent Parties
Which one of the following element is necessary for Autonomous a contract as a Competent Parties ? Computer
Incompetent Parties
Anonymous Computer
Natural And Legal Operator
E Commerce
E contract
E Business
E Market
It is by free consent of the parties.
Parties are competent.
It is enforceable Acceptance by law.
EULA stands for? The person making Proposal is called as The person accepting Proposal is called as agreements are those which can only be read and accepted by the consumer after the opening of a particular product is called as Agreement comes into force when an online buyer or user clicks on the I AGREE button on a webpage to purchase or download a program is called as Installing software from a CD into your PC is an example of a Choosing to make payments online or choosing to reject it is an example of a Which one of the following element is not necessary for a contract ?
18
19
20
21
22
D
An enforceable agreement created and signed in electronicform—thatistosay,nopaperorother hard copies are used is called as An agreement becomes a contract if :
UNIT N0 2
Sr.No.
Questions
A
B
C
D
Garantee
Arbitration Clauses
Infringe Right of Parties Electronic Domain Interchange personal communication indian contract act 1972 take-it-or-leaveit promisor
Goverment Law Clause
agreement
communication of rejection offer
non revocation
admissibili...