Professional Documents
Culture Documents
Final Term Exam Sample Paper - CS - 204
Final Term Exam Sample Paper - CS - 204
Final Term Exam Sample Paper - CS - 204
FINALTERM EXAMINATION
Fall 2022
CS204 - Cyber Law
Time: 90 min
Marks: 60
A. 2009
B. 2006
C. 2007
D. 2004
A. Cyber Jurisdiction
B. Original Jurisdiction
C. Equal Jurisdiction
D. None of the given
A.Text
B.Graphics
C.Color
D.Both Text & Graphics
7- Intellectual Protection Rights (IPR) Protects the use of information and ideas that are
of _______ values.
A.Ethical
B.Moral
C.Social
D.Commercial
A.Patent
B.Design
C.Trademark
D.All of the given
10- What types of crimes are covered under the Electronic Crime Act 2015 ?
A.Physical crimes
B.Cybercrimes
C.Financial crimes
D.Environmental crimes
11- What is the purpose of the Electronic Crime Act 2015?
12- What are the penalties for violating the Electronic Crime Act 2015?
13- Warrant issued under sub-section (1) may be extended beyond _______ days.
A.7
B.10
C.5
D.3
A.20
B.35
C.17
D.15
18-What is the purpose of designating a least trusted network security zone?.
A.Health Issues
B.National Security
C.Economy
D.Cyber Issues
A.Software
B.Software and Hardware
C.Hardware
D.None of the given
A.Ministry of Finance
B.Planning Department
C.Federal Government
D.Ministry of Information
A.To promote and support the development and growth of the IT industry
B.To prevent the use of technology
C.To regulate the use of electronic devices
D.To protect the privacy of electronic communications
25-_____is the main purpose of the Internet Law and Policy Forum (ILPF).
26-____________Refers to all the legal and regulatory aspects of the Internet and its
users.
A. Cyber security
B. Cyber Law
C. Cryptography
D. None of the given
A. Compoundable
B. Cognizable
C. Non Cognizable
D. Both Compaundable & Non Cognizable
29-Payment of compenation in a cyber crime includes_____.
A. Punishment
B. Fine
C. Compenation to Victim
D. All of given
A. Outsiders
B. Ex employees
C. Free lance Hackers
D. None of the given
A. CPEC
B. NATO
C. SAARC
D. None of the given
A. Cyber Censorship
B. Cyber Intelligence
C. Cyber Power
D. All of the given
A. Law
B. Policy
C. Both Law & Policy
D. Security
A. 1 million
B. 5 million
C. 10 million
D. None of the given
A. Territorial
B. Extra Territorial
C. Cyber
D. All of the mentioned
A. 2002
B. 2005
C. 2007
D. 2010
A. Computer Virus
B. Worms
C. Malware
D. All of the given
A. Hacking
B. Phishing
C. DoS
D. Ransomware
40-_____ is a type of cybercrime that uses the internet and technology to harass or stalk a
person.
A. Computer Virus
B. Worms
C. Cyber Stalking
D. All of the given
(Marks: 03)
Q41- List down any three main benefits of Post ETO 2002.
Q42- What is meant by Trademark and what rights it gives?
Q43- What gives legal recognition to the invention.?
Q44- Define Cyber terrorism?
Q45- Almost 49 % of cyber-attacks are intentional. Identify the type of people which are
involved in these attacks.
(Marks: 05)
Q47- When was the first IT-relevant legislation created in Pakistan? Also write the name
of this legislation.
Q48 - With reference to the prevention of electronic crimes ordinance 2007, define the
offence of "Data Damage" and punishments suggested for it.