Sem VI Cyber Law BSC IT Question Bank MCQ PDF

Title Sem VI Cyber Law BSC IT Question Bank MCQ
Author Mayuree Vare
Course Bsc. Information Technology
Institution University of Mumbai
Pages 18
File Size 600.5 KB
File Type PDF
Total Downloads 263
Total Views 483

Summary

N0 Sr. Questions A B C D1 1In march 1999, which virus caused an estimated damage to US $80 million paralyzing email system CD universe Melissa Slammer Nesses1 2 Which of the following is not a type of cyber-crime? Data theft ForgeryDamage to data and systemsinstalling antivirus for protection1 3 Cog...


Description

UNIT N0

Sr.No.

Questions

A

B

C

D

Melissa

Slammer

Nesses

UNIT 1 1

1

In march 1999, which virus caused an estimated damage to US $80 million paralyzing email system

1

2

Which of the following is not a type of cyber-crime?

1

3

1

4

Cognizable offences as described as Punishment for Breach of Confidentiality and Privacy of IT Act offence is

1

5

Which are the grounds which section 80 covers

1

6

1

7

1 1 1

8 9 10

1

11

1 1

12 13

What is not the definition of Hacking

Section 470 of IPC describes Who are not the authority for justice dispensation system for cybercrimes? crime ___ To be considered a computer crime, what needs to be involved in the crime. Under which section of IT Act, stealing any digital asset or information is written a cyber-crime. InwhichyearIndia’sITActcameintoexistence?

CD universe

Damage to data and systems It is the offence in The police which a police officer is bound officer can arrest It is a bailable to register the offence. the convict FIR even with without the the permission warrant. of Magistrate. Imprisonment up Imprisonment up Imprisonment to 2 years to 3 years up to 5 years of not having to commit of committing committed The gaining of Deliberate unauthorized deception to Breaking into access to data in a computer system secure unfair or system or unlawful gain computer. Forgery for the Forgery for purpose of Forged document purpose of harming cheating reputation Controller of Certifying Certifying High Court Authority Authorities Trace and Trap GPS Encryption Harassment Defamation Abuse

Data theft

Forgery

installing antivirus for protection

FIR not submit

Imprisonment up to 10 years not to commit

valid concept

Making forged document

Adjudicating Officer Bluetooth Damage

Computers

Technology

Data

Networks

Section 69

Section 65

Section 67

Section 70

2003

2001

2002

2000

UNIT N0

Sr.No.

1

14

1

15

1

16

1 1

17 18

1

19

1

20

1

21

1

22

1

23

1

24

1

25

Questions where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of fine. What is the person called when they try to hurt a group of people with the use of a computer.

A

B

C

D

section 67-A

section 69-A

section 66-A

section 72-A

Cyber Terrorist

Whitehat intruder Cracker

India’s Information Technology (IT) Act, 2000

India’s Technology (IT) Act, 2000

What is the name of the IT law that India is having in the Indian legislature? Non cognizable offence is an offence in which a Notice Warrant police-officer cannot arrest any person without The example of computer crime are: Software creation data check Cyber crime is aware of no geographical limitations, FALSE TRUE boundaries or distances. What type of cyber-crime, its laws and punishments does section 66 of the Indian IT Act holds? content, it will cost that person imprisonment of _________ years. What worm emailed people with the words "I LOVE YOU' in the year 2000? An offence in which bail can be granted to the accused as of right is called___

Social Engineer

India’sDigital Information The Technology Act, Technology 2008 (DIT) Act, 2000 Authority Letter permission Cracking

software licence

Putting antivirus into the victim

Stealing data

Cracking or Stealing hardware illegally hack components into any system

4

5

3

2

The Love Bug

The Love

The valentine connection

The darling Link

Non bailable offence

Bailable offence non schedule offence

Data theft

Forgery

Schedule offence Installing antivirus for Which of the following is not a type of cyber crime? protection What is the punishment in India for stealing 3 years of computerdocuments,assetsoranysoftware’s imprisonment and source code from any organization, individual, or a fine of Rs. from any other means? 500,000

Damage to data and systems

1 year of 6 months of 2 years of imprisonment imprisonment and imprisonment and a and a fine of Rs. a fine of Rs. 50,000 fine of Rs. 250,000 100,000

UNIT N0

1

Sr.No.

26

Questions

A

B

All of these

The population of Government India is increasing. Negligence

up to 1 years or fine upto 1 lakhs or with both Non bailable offence

up to 2 years or up to 4 years or fine upto 21 lakhs fine upto 2 lakhs or with both or with both Schedule Bailable offence offence

Which is reason for delaying the justice are____

1

27

1

28

1

29

1 1

30 31

1

32

1

33

When IT ACT 2000 came into effect? 17 October, 2000 Which one of the following is outside the scope of IT Act Electronic gift 2000A. Electronic The term Cyber Law means law governing _________ Transactions

34

Which of the following are issues addressed by cyber law?

1

1 1

The punishment for criminal hacking is___________ An offence in which bail can be granted to the accused as of right is called___ An attempt to harm, damage or cause threat to a System hijacking system or network is broadly termed as ______ Which sections for Monetary penalties, adjudication Section 43,44,45 and appeals under IT Act, 2000

35

Which one is within the scope of IT ACT?

36

Which act states the statement "80 Power of police officer and other officers to enter, search etc."

1

37

1

38

C

Non cognizable offence refers to what? When the accused if found at public place, all the IT Act offences would become _____________.

The lack of responsibility and sensitibility and having slow attitude. up to 3 years or fine upto 2 lakhs or with both corrective actions

Cyber-crime

Cyber Attack

Section 42,44,46

Section 42,44,47 Section 42,44,48

11 November, 2000 17 October, 2001 Power of Attorney Electronic with digital message Electronic Cyber Space Commerce Intellectual Electronic property rights Cyber transactions and Data marketing Protection and Electronic Agreement of sale of Trust Will immovable property with digital Information Section 80 Code of criminal Technology act Information procedure, 1973 1990 Technology act Police have no authority to Police can take Police can file FIR aprehend a action person for crime. non cognizable

D

criminal

Heinous

Digital crime

11 November, 2001 Electronic Evidenc cyber crime

data concept

Truncated Cheque

code of criminal procedure, 1974 Police can arrest without warrant Cognizable

UNIT N0

Sr.No.

1

39

1

40

1

41

1

1

42

43

1

44

1

45

1

46

1

47

Questions What is full form of FIR ? Arrest and investigation of offences under IT Act and other Cyber Crimes should be conducted by whom? What are the grounds of arrest as per section 80 of IT Act 2000?

Which of the following statements are correct about cyber crime and cyber criminal?

A has committed offence of hacking from his house, under IT Act section 66. Which of the following statements is correct? "If A from a cyber café in Mumbai, is alleged to have hacked the defence systems installed in computer network in Defence Ministry at Delhi." Which of the following statement is correct in this context. Cyber crime is criminal activity which can be conducted using what of the following? How much time was taken by the famous "I Love You" virus to spread all over the globe?

Who are Phreakers?

A

B

C

D

False information record A Police officer not below the rank of DGP of having committed

First Information Record A Police officer not below the rank of DSP

First information report A Police officer not below the rank of Sub of being about to commit

Future information report

Geographic distances and borders are revelant to cyber crime. After commiting offence, A goes to hotel. He can be arrested without warrent.

of commiting A cyber criminal sitting in one corner of the globe may hack into the victim's bank's computer located in another corner. After committing offence, he remains at home. he cannot be arrested without warrent as per section 80. He can be arrested without warrant , if he remains in cyber café or found in some public place

He cannot be arrested without warrant , if he remains in cyber café or found in computer, network Revolver or network device

A Police officer All of the above

A cyber criminal is here, there, every where and yet nowhere

None of the above

Cannot be arrested at all.

Can be arrested only at public place

He can be arrested without warrant , if he goes home

None of the above

Using Internet

2 Hours

2 Weeks

1 Hour

30 Minutes

Who have knowledge of computer operations

Who have deep knowledge of internet and telecommunication systems.

Who have knowledge of high level languages.

Who have knowledge of cryptography

UNIT N0

Sr.No.

Questions

A

48

Who are the code hackers?

1 1 1

49 50 51

1

52

Hacking refers to __________ hacking? The offence of cheating in india is called ______. Cheating is defined in the Indian penal code under which 678 section?

1

53

1

54

Section 405, 406 are for which offence? Types of ecommerce transactions include what of the following?

1

55

A _________ agreement is mostly found as part of the installation process of software packages.

1 1

56 57

1

58

1

59

1

1 1

60

61 62

Which of the following statements are correct? Cyber crime is increasing at what rate?

C

Those who have who have Those who have the knowledgeof knowledge of knowledge of coding intricacies of telecommunication language. computer systems. systems and their breaking into a breaking into breaking into a house computer system mobile phone 77(3) 80(1) 66(1) 220 320 120

1

The click-wrap agreement should be stated in a manner such that it can be viewed before the option of acceptance or rejection is exercised The person making the proposal is called the ____ In India, there is no decision on the validity of a shrink-wrap contract. Non-disclosure/confidentiality clauses seek to protect ________ property The mechanism of arbitration has been strengthened by legislating the Arbitration and Conciliation act,1996,which is based on __________

B

D Who have Knowledge of internet

stealing information 90(2) 420

233

415

420

murder

cheating

criminal breach of trust

cyber crime

Information Access

Interpersonal communication

shoping services

All the above

click-wrap

click-wrap contracts

Type and click

icon clicking

TRUE

FALSE

promiser

proposal maker

TRUE

FALSE

private

confidential

Jurisdictional law Arbitrators law The group of In year 2017, hackers, called G hackers from Force Pakistan Pakistan hacked 40 hacked Indian Indian web-sites. organizations 10% per week 5.2% per month

proposal acceptor all of the above

sufficient

intellectual

Unicitral model Foreign arbitration law law Pakistan Hackers club has hacked All of the above sites of Indian Parliament. 4.1% per week

4.1% per year

UNIT N0 1

1

Sr.No.

63

64

Questions Any person intentinally destroys or alters any computer source code, when it is required to be kept by law, is said to commit the offence and is punishable with protected system as declared by a notification in the official gazette by the Government shall be liable for which punishment?

A

imprisonment upto imprisonment upto 3 years or fine upto 4 years 2 lakhs or both Imprisonment upto Imprisonment upto 15 years and liable 12 years and liable to fine to fine ISP who offer services such as hosting content

1

65

B

Who are Network service providers as per IT Act?

Access providers who specialize in offering access to the internet

C

D

fine upto 4 lakhs

imprisonment upto 1 year

Imprisonment Imprisonment upto 8 upto 10 years and years and liable to fine liable to fine Online service providers who All of the above provide proprietry content for

UNIT 2

2

1

2

2

2 2 2

3 4 5

2

6

buying and selling of goods and services, or the transmitting of funds or data, over an electronic network, primarily the internet is known as generates, stores or transmits any electronic message to be sent, generated, stored or transmitted to any other person and does not include an Intermediary is known as according to the IT Act, 2008 is a person who is intended by the originator to receive the electronic record but does not include any Intermediary make a proposal is called as “invitationtotreat”isonetypesofa Necessary element for determining knowledge of the offeree and acknowledgement is received by him then called as The offeror is able to revoke the offer any time

2

7 Which one of the following element is not necessary for a contract ?

2

8

E Commerce

E contract

E Business

E Market

Originator

Addressee

Agent

Leader

Originator

Addressee

Agent

Leader

Agreement Agreement

Contract Contract

Offer Deal

Deal Offer

Offer Completed

Agreement Completed

Offer Partial Completed

Offer InCompleted

After the communication of acceptance is complete

before the communication of After Agreement Before Contract acceptance is complete

Competent parties

Reasonable terms Free consent and conditions.

Lawful consideration

UNIT N0

Sr.No. void ?

2

9

2

10

2 2 2

11 12 13

1

14

2

15

2

16

2

17

2

2

2

2

2

Questions

Which of the following is cannot be contractual Party?

A

B

C

Acceptance

Free Consent

Unlawful Object Lawful consideration

Originator

Natural And Legal Person End-user Loyalty Agreement Dealer Dealer

Autonomous Computer End-user Agreement Promisee Promisee

End-License Agreement Promisor Promisor

Addressee End-user License Agreement Accepter Accepter

Shrink Wrap

Click Wrap

Click Shrink

Browse-Wrap

Click Wrap

Shrink Wrap

Browse-Wrap

Click Shrink

Click Wrap agreement Click wrap agreement.

Click Shrink agreement Click Shrink agreement

shrink wrap agreement. shrink wrap agreement.

Browse-Wrap agreement Browse-Wrap agreement

Offer

Acceptance

Unlawful Consideration

Free Consent

Which one of the following element is necessary for Autonomous a contract ? Computer

Certainty of terms

Anonymous Computer

Incompetent Parties

Which one of the following element is necessary for Autonomous a contract as a Competent Parties ? Computer

Incompetent Parties

Anonymous Computer

Natural And Legal Operator

E Commerce

E contract

E Business

E Market

It is by free consent of the parties.

Parties are competent.

It is enforceable Acceptance by law.

EULA stands for? The person making Proposal is called as The person accepting Proposal is called as agreements are those which can only be read and accepted by the consumer after the opening of a particular product is called as Agreement comes into force when an online buyer or user clicks on the I AGREE button on a webpage to purchase or download a program is called as Installing software from a CD into your PC is an example of a Choosing to make payments online or choosing to reject it is an example of a Which one of the following element is not necessary for a contract ?

18

19

20

21

22

D

An enforceable agreement created and signed in electronicform—thatistosay,nopaperorother hard copies are used is called as An agreement becomes a contract if :

UNIT N0 2

Sr.No.

Questions

A

B

C

D

Garantee

Arbitration Clauses

Infringe Right of Parties Electronic Domain Interchange personal communication indian contract act 1972 take-it-or-leaveit promisor

Goverment Law Clause

agreement

communication of rejection offer

non revocation

admissibili...


Similar Free PDFs