0% found this document useful (0 votes)
48 views3 pages

Cyber Secuity QB

Uploaded by

sekhar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views3 pages

Cyber Secuity QB

Uploaded by

sekhar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

CMA Final Law – Question Bank

Law and Regulations Related to Cyber Security and Data


Privacy
Self Practice Questions

Q1. What is Cyber Crime and its categories?

Answer: Cybercrime refers to all the activities done with criminal intent in cyberspace. The field of
Cybercrime is just emerging and new forms of criminal activities in cyberspace are coming to the
forefront with the passing of each new day.
Cybercrimes can be basically divided into 3 major categories being Cybercrimes against persons,
property and Government.

Q2. Is Cyber terrorism a Crime against Government?


Answer: The third category of Cybercrimes relate to Cybercrimes against Government. Cyber
Terrorism is one distinct kind of crime in this category. The growth of Internet has shown that the
medium of Cyberspace is being used by individuals and groups to threaten the international
governments and also to terrorise the citizens of a country. The use of hate websites and e-mails
being the most popular way in doing so.

Q3. What are the objectives of IT Act, 2000?

Answer:
✓ legal recognition to electronic transactions by recognizing digital signatures either by
general public or Govt. official or agency, including publication of rules, regulations or any
other matter including gazette notification.
✓ facilitate electronic filing of documents and retention thereof in govt. records (public cannot
insist for use of electronic mode only)
✓ consequential amendments to other acts
✓ to set up licensing, monitoring and certifying authority

Q4. Are organizations permitted to collect personal sensitive data of Public for their use? What if
they don’t maintain adequate security for the same?

Answer:
According to Information Technology (Reasonable Security Practices and Procedures and Sensitive
Personal Data or Information) Rules, 2011, Organizations may collect personal sensitive data only
on compliance of following guidelines:
a) Information shall not be collected unless it is for lawful purpose, and is considered
necessary for the purpose. The information collected shall be used only for the purpose
for which it is collected and shall not be retained for a period longer than which is
required;
b) Ensure that the person(s) providing information are aware about the fact that the
information is being collected, its purposes & recipients, name and addresses of the
agencies retaining and collecting the information;

P a g e 12.1 | CA Shivangi Agrawal


CMA Final Law – Question Bank

c) Offer the person(s) providing information an opportunity to review the information


provided and make corrections, if required;
d) Maintain the security of the information provided; and
e) Designate a Grievance Officer, whose name and contact details should be on the website
who shall be responsible to address grievances of information providers expeditiously.
According to Section 43A, Whenever a corporate body possesses or deals with any sensitive
personal data or information, and is negligent in maintaining a reasonable security to
protect such data or information, which thereby causes wrongful loss or wrongful gain to
any person, then such body corporate shall be liable to pay damages to the person(s) so
affected.

Q5. Write short notes on following BI tools:


a) OLAP
b) Real Time BI
c) Embedded BI

Answer:
a) OLAP stands for Online analytical processing. These BI tools enable users to analyze data
along multiple dimensions, which is particularly suited to complex queries and calculations.
b) In real-time BI applications, data is analyzed as it’s created, collected and processed to give
users an up-to-date view of business operations, customer behavior, financial markets and
other areas of interest. The real-time analytics process often involves streaming data and
supports decision analytics uses, such as credit scoring, stock trading and targeted
promotional offers.
c) Embedded business intelligence tools put BI and data visualization functionality directly
into business applications. That enables business users to analyze data within the
applications they use to do their job. Embedded analytics features are most commonly
incorporated by application software vendors, but corporate software developers can also
include them in home grown applications.

Multiple Choice Questions

1. Certifying Authority get licence to operate from:


a. Ministry of IT b. SEBI
c. Controller of Certifying Authority d. none of the above

2. Which among the following is not an offence under IT Act.


a. tampering with computer source b. hacking: destruction, deletion,
documents alteration of nay data in any computer
with an intention of damage/ injury
c. misrepresentation to controller or d. making a faulty contract
certifying authorities

3. Information Technology (Reasonable Security Practices And Procedures And Sensitive


Personal Data Or Information) Rules, was notified in the year:
a. 2011 b. 2012
c. 2013 d. 2014

P a g e 12.2 | CA Shivangi Agrawal


CMA Final Law – Question Bank

4. OSBI stands for.


a. Operational source Business b. Open source business Innovation
Intelligence
c. Open source Business intelligence d. none

5. The key benefits that businesses can get from BI applications include the ability to:
a. speed up and improve decision- b. optimize internal business processes;
making;
c. increase operational efficiency and d. all of the above
productivity;

6. Decision of Cyber appellate Tribunal can be appealed to;


a. High Court b. supreme Court
c. None of the above d. Not appealable

7. Information Technology (Reasonable Security Practices And Procedures And Sensitive


Personal Data Or
Information) Rules, 2011.
a. only apply to bodies corporate and b. only apply to bodies corporate and
persons located in India. persons located out of India.
c. Apply to individuals d. All of the above

8. Which among the following is not a Cyber crimes under the IT Act:
a. Tampering with Computer source b. Hacking with Computer systems, Data
documents alteration.
c. Publishing obscene information. d. Sending threatening messages by
email

9. Which of the following is not an cyber Offence to Public


a. Terrorism b. Warfare
c. Piracy d. Data alteration

10. Access someone’s computer without the right authorization of the owner and does not
disturb, alter, misuse, or damage data or system by using wireless internet connection, is
called:
a. Squatting b. Vandalism
c. Hacking d. Trespass

Answer to MCQs

1 (c) 2 (d) 3 (a) 4 (c) 5 (d)


6 (a) 7 (a) 8 (d) 9 (d) 10 (d)

P a g e 12.3 | CA Shivangi Agrawal

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy