Professional Documents
Culture Documents
Fundamentals of Cyber Laws
Fundamentals of Cyber Laws
Fundamentals of Cyber Laws
A. Statutory
B. Legislative
C. Governmental
D. Voluntary
3) Assessing Computer without prior authorization is a cyber crime that comes under____
A. Section 65
B. Section 66
C. Section 68
D. Section 70
4. Authentication is _________
B. Insertion
C. Modification
D. Integration
5. ____________ means a person who has been granted a licence to issue an electronic signature
certificate.
A. Certifying Authority
B. Certifying Private Key Authority
D. Appropriate Authority
6. The use of the Internet or other electronic means to stalk or harass an individual, a group of
individuals, or an organization is termed:
A. Cyberspace
B.Cyber stalking
C. Pornography
D. None of these
A. Hacking
B.Worm attack
C.Virus attack
D.All of these
A. Denial of Service
D.None of these
A. Computer
B. Computer network
C. Website
D. Calculator
B.Section 66B
C.Section 65
D.Section 67
12. ____________ is the method for keeping sensitive information in email communication &
accounts secure against unofficial access, loss, or compromise.
A. Email security
B. Email hacking
C. Email protection
D. Email safeguarding
14. All of the following are types of intellectual property protection except_______.
A. patents.
B. trademarks.
C. governance.
D. copyrights.
A. Lawful consideration
B. Free consent
A. Cyber Contract
B. Online Contract
C. Digital Contract
A. 2000
B. 2001
C. 2008
D.2009
A.2000 October 17
B. 2001 October 17
C.2000 November 11
D. 2001 November 11
B.4
C. 6
D.2
22. Which is the Act which provides legal framework for e-Governance in India
A. IT (amendment) Act 2008
B. Indian Penal Code
C. IT Act 2000
D. None of the above
23. Which section of IT Act deals with the legal recognition of electronic records?
A) Section 2
(B) Section 5
(C) Section 6
(D) Section 4
24. Which section of IT Act deals with Hacking of computer systems and its penalties?
(A) Section 65
(B) Section 66
(C) Section 62
(D) Section 67
27. 10. What is the maximum penalty for damage to Computer, Computer systems,
unauthorized access, download of data, infecting with virus, denial of access etc as per
Section 43
28. Download copy, extract data from an open system done fraudulently is treated as _________)
(A)cyber-warfare
(B) cyber-security act
(C) data-backup
(D) cyber-crime
29. How many years of imprisonment can an accused person face, if he/she comes under any
cyber-crime listed in section 66 of the Indian IT Act, 2000?
(A) 1 year
(B) 2 years
(C) 3 years
(D) 4 years
30. Using of spy cameras in malls and shops to capture private parts of any person comes under
section 67 of IT Act, 2008 and is punished with imprisonment of ___________
(A) 2 years
(B) 3 years
(C) 4 years
(D) 5 years
31. Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act.
(A) section 65
(B) section 66
(C) section 71
(D) section 72
32. IT Act 2000 amended various sections of which of the following Acts
34. Which Act in India focuses on data privacy and information technology
35. Which are the section of the IT Act deals with Credit card fraud?
36. What is the time limit for filing appeal against the order of Cyber appellate tribunal?
(A) 30 days
(B) 60 days
(C) 45 days
(D) 90 days
39. Which is the appeal court on the orders issued by Cyber appellate tribunal?
(A) 6 years
(B) 3 years
(C) 4 years
(D) 5 years
41.The section deals with legal recognition of digital signature
(A) Section 3
(B) Section 5
(C) Section 4
(D) Section 6
(A) Section 3
(B) Section 5
(C) Section 4
(D) Section 6
43. The things Carried out by means of electronic data interchange, and other means of
electronic communication is commonly referred to as
45. The Central Government may appoint a __________ of Certifying Authority who shall
exercise supervision over the activities of Certifying Authorities
46. _________ is a person in whose name the Digital Signature Certificate is issued
48. The ___________ has the power to suspend or revoke Digital Signature Certificate.
49. An argument for including computer forensic training computer security specialists is:
(B) It provides them with the tools to conduct their own investigations.
50. What are the three general categories of computer systems that can contain digital evidence?