Fundamentals of Cyber Laws

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

AECC-306-FUNDAMENTALS OF CYBER LAWS

1) The Information Technology Act 2000 is an Act of Indian Parliament notified on

A. 27th October 2000

B. 15th December 2000

C. 17th November 2000

D. 17th October 2000

2) Digital Signature Certificate is ____________ requirement under various applications

A. Statutory

B. Legislative

C. Governmental

D. Voluntary

3) Assessing Computer without prior authorization is a cyber crime that comes under____

A. Section 65

B. Section 66

C. Section 68

D. Section 70

4. Authentication is _________

A. To assure identity of user on a remote system

B. Insertion

C. Modification

D. Integration

5. ____________ means a person who has been granted a licence to issue an electronic signature
certificate.

A. Certifying Authority
B. Certifying Private Key Authority

C. Certifying system controller

D. Appropriate Authority

6. The use of the Internet or other electronic means to stalk or harass an individual, a group of
individuals, or an organization is termed:

A. Cyberspace

B.Cyber stalking

C. Pornography

D. None of these

7. Which of the following is a cybercrime?

A. Hacking

B.Worm attack

C.Virus attack

D.All of these

8. In cyber law terminology ‘DoS’ means:

A. Denial of Service

B.Disc operating System

C.Distant operator Service

D.None of these

9. Which are the following is not part of cyber space:

A. Computer

B. Computer network

C. Website

D. Calculator

10. Tempering of computer source code cover in:


A. Section 66A

B.Section 66B

C.Section 65

D.Section 67

11. What is the full form of ITA-2000?


A. Information Tech Act -2000
B. Indian Technology Act -2000
C. International Technology Act -2000
D. Information Technology Act -2000

12. ____________ is the method for keeping sensitive information in email communication &
accounts secure against unofficial access, loss, or compromise.

A. Email security

B. Email hacking

C. Email protection

D. Email safeguarding

13. Which of them is not a proper method for email security?

A. Use Strong password

B. Use email Encryption

C. Spam filters and malware scanners

D. Click on unknown links to explore.

14. All of the following are types of intellectual property protection except_______.

A. patents.

B. trademarks.
C. governance.

D. copyrights.

15. E-Contract is an agreement with

A. Lawful consideration

B. Free consent

C. Without hidden motive

D. All of the above

16. E-Contracts are referred as

A. Cyber Contract

B. Online Contract

C. Digital Contract

D. All of the above

17. Cyber security is the protection of?


A. Internet connected systems
B. Non-Internet connected systems
C. Both A and B
D. None of the above
18. India's first cyber police station
A. Delhi
B. Bangalore
C.Chennai
D. Mumbai
19. Information Technology Amendment Act form in year

A. 2000

B. 2001

C. 2008

D.2009

20. When IT Act 2000 came into effect?

A.2000 October 17
B. 2001 October 17
C.2000 November 11
D. 2001 November 11

21. How many schedules are there in IT Act 2000?


A.3

B.4
C. 6
D.2

22. Which is the Act which provides legal framework for e-Governance in India
A. IT (amendment) Act 2008
B. Indian Penal Code

C. IT Act 2000
D. None of the above

23. Which section of IT Act deals with the legal recognition of electronic records?
A) Section 2
(B) Section 5
(C) Section 6
(D) Section 4
24. Which section of IT Act deals with Hacking of computer systems and its penalties?

(A) Section 65
(B) Section 66
(C) Section 62
(D) Section 67

25. Which section of IT Act deals with Cyber terrorism?

(A) Section 66C


(B) Section 66B
(C) Section 66F
(D) Section 66A
26.. Which section of IT Act was invalidated by Supreme Court of India

(A) Section 66F


(B) Section 66B
(C) Section 66D
(D) Section 66A

27. 10. What is the maximum penalty for damage to Computer, Computer systems,
unauthorized access, download of data, infecting with virus, denial of access etc as per
Section 43

(A) Rs. 50 lakhs


(B) Rs.1 crore
(C) Rs. 5 crore
(D) Rs,75 lakh

28. Download copy, extract data from an open system done fraudulently is treated as _________)
(A)cyber-warfare
(B) cyber-security act
(C) data-backup
(D) cyber-crime

29. How many years of imprisonment can an accused person face, if he/she comes under any
cyber-crime listed in section 66 of the Indian IT Act, 2000?
(A) 1 year
(B) 2 years
(C) 3 years
(D) 4 years

30. Using of spy cameras in malls and shops to capture private parts of any person comes under
section 67 of IT Act, 2008 and is punished with imprisonment of ___________
(A) 2 years
(B) 3 years
(C) 4 years
(D) 5 years

31. Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act.
(A) section 65
(B) section 66
(C) section 71
(D) section 72

32. IT Act 2000 amended various sections of which of the following Acts

(A) Indian Penal Code 1860


(B) Indian Evidence Act 1872 & Bankers Book Evidence Act 1891
(C) Reserve Bank of India Act 1934
(D) All the above

33.Which section of IT Act deals with Child pornography

(A) Section 67D


(B) Section 67F
(C) Section 67C
(D) Section 67B

34. Which Act in India focuses on data privacy and information technology

(A) IT Act 2000


(B) Banking Regulation Act 1949
(C) Indian Penal Code
(D) IT (amendment) Act 2008

35. Which are the section of the IT Act deals with Credit card fraud?

(A) 66, 66C, 66D


(B) 42, 67, 67A, 67B
(C) 43, 66, 66C, 66D
(D) None of the above

36. What is the time limit for filing appeal against the order of Cyber appellate tribunal?

(A) 30 days
(B) 60 days
(C) 45 days
(D) 90 days

37. What is the punishment for hacking of computers

(A) Life Imprisonment


(B) Three-year imprisonment or 10 lakh rupees penalty or both
(C) Three-year imprisonment or 5 lakh rupees penalty or both
(D) Three-year imprisonment or 2 lakh rupees penalty or both

38. What is the penalty for destroying computer source code

(A) Three year imprisonment or 5 lakh rupees penalty or both


(B) Three year imprisonment or 3 lakh rupees penalty or both
(C) Two year imprisonment or 2 lakh rupees penalty or both
(D) Three year imprisonment or 2 lakh rupees penalty or both

39. Which is the appeal court on the orders issued by Cyber appellate tribunal?

(A) Supreme Court


(B District Court
(C) High Court
(D) Munsiff Court
40. What is the term of the office of the presiding officer of Cyber appellate tribunal?

(A) 6 years
(B) 3 years
(C) 4 years
(D) 5 years
41.The section deals with legal recognition of digital signature

(A) Section 3
(B) Section 5
(C) Section 4
(D) Section 6

42. The section deals with legal recognition of electronic records

(A) Section 3
(B) Section 5
(C) Section 4
(D) Section 6

43. The things Carried out by means of electronic data interchange, and other means of
electronic communication is commonly referred to as

(A)e-communication b. e- governance c. e- record d. e-commerce

44. Verification of electronic record is possible through


a. Public key b. Private Key c. Digital Signature d. e- governance

45. The Central Government may appoint a __________ of Certifying Authority who shall
exercise supervision over the activities of Certifying Authorities

a. commissioner b. Controller c. executive d. president

46. _________ is a person in whose name the Digital Signature Certificate is issued

a. certified authority b. subscriber c. holder d. controller

47. E- records and digital signatures are used to

a. Filling of any form in government b. issue of grant c. making


payment d. all of the above

48. The ___________ has the power to suspend or revoke Digital Signature Certificate.

a. Commissioner b. Certifying Authority c. subscriber d. controller

49. An argument for including computer forensic training computer security specialists is:

(A) It provides an additional credential.

(B) It provides them with the tools to conduct their own investigations.

(C) It teaches them when it is time to call in law enforcement.

(D) None of the above.

50. What are the three general categories of computer systems that can contain digital evidence?

(A) Desktop, laptop, server

(B) Personal computer, Internet, mobile telephone

(C) Hardware, software, networks


(D)Open computer systems, communication systems, embedded systems

51. Computers can be involved in which of the following types of crime?

(A)Homicide and sexual assault

(B) Computer intrusions and intellectual property theft

(C) Civil disputes

(D) All of the above

You might also like