Final Term Exam Sample Paper - CS - 204

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

Sample Paper

FINALTERM EXAMINATION
Fall 2022
CS204 - Cyber Law

Time: 90 min
Marks: 60

Please choose the correct option (Marks:


01)

1- In Electronic/Cyber Crime Bill _____for offence of "Cyber stalking" the punishment


is 3 year imprisonment.

A. 2009
B. 2006
C. 2007
D. 2004

2- _______ apply to every person who commits an offence, irrespective of


his/her________.

A. Cyber Crime Bill 2010


B. Cyber Crime Bill 2016
C. Cyber Crime Bill 2008
D. Cyber Crime Bill 2007

3- There are 3 types of _____ in cyber law.

A. Cyber Jurisdiction
B. Original Jurisdiction
C. Equal Jurisdiction
D. None of the given

4- _____is cyber jurisdiction..

A. The regulation of electronic devices


B. The allowing of cybercrime
C. The legal authority to hear and determine a case involving a cybercrime
D. The regulation of cybercrime
5- What is the main motivation behind cybersquatting ?

A. To protect personal data


B. To steal personal information
C. To profit from someone else's trademark
D. To defraud consumers

6- Web pages ________ are copyrighted.

A.Text
B.Graphics
C.Color
D.Both Text & Graphics

7- Intellectual Protection Rights (IPR) Protects the use of information and ideas that are
of _______ values.

A.Ethical
B.Moral
C.Social
D.Commercial

8- What type of trademark is protected by law?

A.Common law trademark


B.Unregistered trademark
C.Registered trademark
D.Statutory trademark

9- ______ can not be exploited by assigning or by licensing the rights to others.

A.Patent
B.Design
C.Trademark
D.All of the given

10- What types of crimes are covered under the Electronic Crime Act 2015 ?

A.Physical crimes
B.Cybercrimes
C.Financial crimes
D.Environmental crimes
11- What is the purpose of the Electronic Crime Act 2015?

A.To regulate the use of electronic devices


B.To prevent and combat electronic crimes
C.To protect the privacy of electronic communications
D.To provide guidelines for the use of the Internet

12- What are the penalties for violating the Electronic Crime Act 2015?

A.Imprisonment and fines


B.Community service and fines
C.Suspension of electronic devices
D.Monetary penalties only

13- Warrant issued under sub-section (1) may be extended beyond _______ days.

A.7
B.10
C.5
D.3

14- NR3C stands for ________.

A.National Recovery Centre for Cyber Crimes


B.National Response Centre for Cyber Crimes
C.National Response Centre for Computer Crimes
D.National Requisition Centre for Computer Crimes

15- Which of the following is considered a cyber offense?

A.Hacking into a computer system


B.Shoplifting from a physical store
C.Credit card fraud using a physical card
D.Trespassing on private property

16-What is the purpose of cyber evidence discovery and analysis?


A.To prevent cybercrime
B.To prosecute cybercriminals
C.To regulate the use of electronic devices
D.To protect the privacy of electronic communications
17-________percent of the third party suppliers or joint venture partners as a route
exploited by cyber criminals.

A.20
B.35
C.17
D.15
18-What is the purpose of designating a least trusted network security zone?.

A.To prevent unauthorized access and data theft


B.To provide lower security measures
C.To store sensitive information
D.To have unrestricted access

19-There is no legislation on _______in the parliament..

A.Health Issues
B.National Security
C.Economy
D.Cyber Issues

20-There is no policy to prevent the import of__________with embedded technologies.

A.Software
B.Software and Hardware
C.Hardware
D.None of the given

21-What is the main function of IANA?.

A.To manage and allocate Internet resources, such as IP addresses and


domain names
B.To provide cybersecurity solutions
C.To regulate the use of electronic devices
D.To protect the privacy of electronic communications

22-.aero gTLD is used for _________.

A.For the entire aviation community


B.For museums
C.For business
D.None of the given
23-To avoid conflicts, overlapping and gaps prepare drafts of remaining required laws
with single focal point in the ______.

A.Ministry of Finance
B.Planning Department
C.Federal Government
D.Ministry of Information

24-____ is the main goal of the IT policy in Pakistan.

A.To promote and support the development and growth of the IT industry
B.To prevent the use of technology
C.To regulate the use of electronic devices
D.To protect the privacy of electronic communications

25-_____is the main purpose of the Internet Law and Policy Forum (ILPF).

A.To prevent the use of technology


B.To regulate the use of electronic devices
C.To protect the privacy of electronic communications
D.To get better understanding of the policy issues related to the Internet

26-____________Refers to all the legal and regulatory aspects of the Internet and its
users.

A. Cyber security
B. Cyber Law
C. Cryptography
D. None of the given

27-ETO stands for ________ .

A. Electronic Transaction Ordinance


B. Employment Transfer Ordinance
C. Equal Transaction Ordinance
D. Express Transaction Ordinance

28-Criminal Spamming and spoofing are ________ offences.

A. Compoundable
B. Cognizable
C. Non Cognizable
D. Both Compaundable & Non Cognizable
29-Payment of compenation in a cyber crime includes_____.

A. Punishment
B. Fine
C. Compenation to Victim
D. All of given

30-40% of intentional attacks are by ________ .

A. Outsiders
B. Ex employees
C. Free lance Hackers
D. None of the given

31-____ is a coperartion in Asia that address cyber issues.

A. CPEC
B. NATO
C. SAARC
D. None of the given

32-Strong filetring of websites comes under ________ .

A. Cyber Censorship
B. Cyber Intelligence
C. Cyber Power
D. All of the given

33-ILPF is a ____ forum to create legal environment.

A. Law
B. Policy
C. Both Law & Policy
D. Security

34-Message through email , phone comes under ________ .

A. Pre ETO 2002


B. Post ETO 2002
C. Pre ETO 2006
D. Post ETO 2006

35-Sobotage someones online privacy fine is Rs./________ .

A. 1 million
B. 5 million
C. 10 million
D. None of the given

36- ________ are the types of jurisdiction.

A. Territorial
B. Extra Territorial
C. Cyber
D. All of the mentioned

37-Pakistan Data Protection Act was opted in ________ .

A. 2002
B. 2005
C. 2007
D. 2010

38-_____ are used to control or target IT systems.

A. Computer Virus
B. Worms
C. Malware
D. All of the given

39-_____attacks attempt to collect information through a target's email.

A. Hacking
B. Phishing
C. DoS
D. Ransomware

40-_____ is a type of cybercrime that uses the internet and technology to harass or stalk a
person.

A. Computer Virus
B. Worms
C. Cyber Stalking
D. All of the given

(Marks: 03)
Q41- List down any three main benefits of Post ETO 2002.
Q42- What is meant by Trademark and what rights it gives?
Q43- What gives legal recognition to the invention.?
Q44- Define Cyber terrorism?
Q45- Almost 49 % of cyber-attacks are intentional. Identify the type of people which are
involved in these attacks.

Q46- List down any two needs of Cyber Law?

(Marks: 05)
Q47- When was the first IT-relevant legislation created in Pakistan? Also write the name
of this legislation.

Q48 - With reference to the prevention of electronic crimes ordinance 2007, define the
offence of "Data Damage" and punishments suggested for it.

Q49 - Enlist the categories of cyber crime.

Q50 - List down any 5 areas of e-commerce under ETO 2002.

You might also like