Cyber Law MCQ
Cyber Law MCQ
(a) Bailable
(b) Non-bailable
(c) Non-cognizable
(2) Every appeal to Cyber Appellate Tribunal shall be filed within a period of _____.
(a) 60 days
(b) 90 days
(c) 45 days
(d) 30 days
(a) 67 C
(b) 67 A
(c) 67 B
(d) 67 D
(d) E-governance
(7) Which section of IT Act deals with the legal recognition of electronic records ?
(a) Section 4
(b) Section 2
(c) Section 5
(d) Section 6
(a) 66 C
(b) 66 B
(c) 66 D
(d) 66 F
(9) What is the maximum penalty for damage to computer, computer system ?
(d) 5 lakh
(12) Which are the Sections of IT Act that deal with credit card fraud ? (66c)
(a) 66, 66 C, 66 D
(d) None
(13) Which section of IT Act deals with the punishment for cheating by
imprisonment by using computer resource ?
(a) Section 66 D
(b) Section 66 C
(c) Section 66 F
(d) Section 66 B
(14) Those who fail to furnish documents, return, report to the Controller of
Certifying Authorities will be penalized upto :
a period of :
(a) 5 yrs
(b) 10 yrs
(c) 2 yrs
(d) 7 yrs
(18) Copying of a web-page or website and storing that copy for the purpose of
speeding up
(a) Browsing
(c) Caching
(d) Downloading
(20) Punishment for child pornography is provided under Section _______ of the I.T.
Act.
(a) 66
(b) 67-A
(c) 67-B
(d) 67-C
(22) The term computer is defined under Section ________ of the I.T. Act.
(d) 2(1) (h
(23) According to Section 78 of the IT Act, a ________ shall investigate any offence
under the Act.
(24) Sending of unsolicited bulk and commercial messages over the internet is
________.
(a) Stalking
(b) Phishing
(c) Spamming
(d) Spoofing
(25) Permitted use of disruptive activities or the threat thereof in cyber space is
called _______.
(a) Commerce
(a) 1999
(b) 2000
(c) 2008
(d) 2012
(a) Programme
(b) File
(c) Disk
(d) Audio
(d) Cryptography
(a) 2005
(b) 2008
(c) 2011
(d) 2015
(32) Private key U/s 2(1) (ZC) is key of a secure key pair used to create a digital
signature :
(b) Not listed in the DSC issued to the subscriber by a Certifying Authority
(a) An individual
(35) In the scheme of the Act, S. 43 to S. 45 are the ones that fall in the category of
:
(a) Originator
(b) Addressee
(a) Hacking
(b) Squatting
(c) Stalking
(d) Phishing
(40) Against offence of cybers quatting victim is entitled to involve the provision :
(a) Phishing
(d) Pornography
(42) Information Technology Act, 2000 describes the offence of child pornography
and prescribed punishment for it :
(a) Phishing
(b) Pornography
(44) ______ servers have chat rooms in which people from anywhere of the world
can came
(a) Channels
(b) Operators
(46) ––––– Monitors all internet and other network activity, looking for suspicious
data and preventing unauthorized access
(a) Firewall
(47) Out of following which is the main authority is at the top and its main
function is to issue licence to the certifying authority and to supervise his
functions.
(a) Intermediator
(c) subscriber
(48) –––––– means a system of a secure key pair consisting of a private key for
creating digital signature and public key for verifying digital signature.
(a) Cryptography
(49) –––––– means a person who sends, generates, store or transmit any electronic
massage.
(a) Intermediary
(b) Addressee
(c) Originator
(d) Controller.
(a) Virus
(b) Spoofing
(c) Spam
(d) Worms
(52) Dot com job scam are cyber crimes included under –––––.
(54) The dispute resolution policy for domain name system comes from
(a) ICANN
(b) IANA
(c) ISOC
(d) IRTF
(a) Encryption
(b) Decryption
(60) ––––– is the protected system used for identifying the person.
(b) Biometrics
(a) 1999
(b) 2000
(c) 2008
(d) 2012
(63) The science of sending secret cypher and decoding it, is called _____.
(a) Photography
(b) Cyprography
(d) Cryptography
(64) Buying and selling of goods and services on the internet is called_____.
(a) E–Trade
(b) E–Commerce
(c) E–Challan
(d) E–Training
(a) Section 17
(b) Section 15
(c) Section 10
(d) Section 5
(66) Which of the following Acts provides legal framework for e-governance in
India ?
(a) Programme
(b) Audio
(c) File
(d) Disk
(69) Widely used security measure for blocking traffic in the network :
(a) 31
(b) 127
(c) 63
(d) 25
(a) UNTCAD
(b) UNO
(c) UNCITRAL
(d) UNICEF
(a) Addresses
(b) Location
(c) Information
(d) Website
(a) Country
(b) Government
(c) District
(d) World
(77) The Information Technology Act, 2000 was amended in the year _________.
(a) 2013
(b) 2012
(c) 2008
(d) 2011
(a) Profession
(b) Business
(c) Trade
(d) Art
(a) Public-personal
(b) Private-personal
(c) Personal-private
(d) Public-private
(83) The names with which companies exist in cyber world are called :
(a) Sec. 64
(b) Sec. 65
(c) Sec. 66
(d) Sec. 63
(a) Tool
(b) Target
(a) Property
(b) Identity
(c) Money
(90) The cyber offence in which frauds are committed by inviting people to invest
money and sharing financial information is :
(a) Hacking
(b) Squatting
(c) Piracy
(d) Fishing
92. Which among the following with regard to Information Technology Act, 2000
is NOT correct?
(A)It shall extend to the whole of India
(B)it does not apply to any offence or contravention thereunder committed
outside India by any person
(C)it is an act to provide legal recognition for transactions carried out by means of
electronic data
(D)It is the primary law in India dealing with cybercrime and electronic commerce
94. Who was the President of India who signed the Information Technology Act,
2000?
(A)A P J Abdul Kalam
(B)K R Narayanan
(C)Atal Bihari Vajpayee
(D)Pratibha Patil
(A)Data license
(B)IP address in India
(C)digital signatures
(D)internet service provider license
97. Information Technology Act, 2000 amended which among the following to
make them compliant with new technologies? i. Indian Penal Code, 1860 ii. Indian
Evidence Act, 1872 iii. Banker’s Book Evidence Act, 1891 iv. Reserve Bank of India
Act, 1934
(A)i only
(B)i and iii only
(C)ii, iii and iv only
(D)All the above
98. A major amendment to Information Technology Act, 2000 was made in the
year?
(A)2001
(B)2016
(C)2012
(D)2008
99. Which among the following was established under IT Act, 2000 to resolve
disputes arising from the law?
(A)Cyber Appellate Tribunal
(B)Technology Disputes Bureau
(C)Cyber Administrative Tribunal
(D)IT Disputes Tribunal
100. Section 66A which penalized sending “offensive messages” was introduced in
IT Act, 2000 through?
(A)Information Technology (Amendment) Act, 2008
(B)Information Technology (Amendment) Act, 2003
(C)Information Technology (Amendment) Act, 2015
(D)Information Technology (Amendment) Act, 2005
101. Which among the following is/are the major insertions in IT Act,2000 through
Information Technology (Amendment) Act, 2008?
(A)Section 66A which penalized sending “offensive messages”
(B)Section 69, which gave authorities the power of “interception or monitoring or
decryption of any information through any computer resource
(C)it introduced provisions addressing – pornography, child porn, cyber terrorism and
voyeurism
(D)All the above
102. Which among the following offence under IT Act,2000 has the maximum
penalty of imprisonment up to life?
(A)Using password of another person
(B)Securing access or attempting to secure access to a protected system
103. Section 66A of IT Act,2000 has been struck down by Supreme Court’s Order
dated 24th March, 2015 in which case?
(A)Shreya Singhal vs. Union of India
(B)Puttuswamy v. Union of India
(C)Shayara Bano vs Union Of India
(D)Indra Sawhney and Union of India
104. In the year 2020, Indian Government banned 59 Chinese mobile apps,
including TikTok invoking which Section of IT Act, 2000?
(A)Section 66A
(B)Section 66F
(C)Section 72A
(D)Section 69A
105. The data privacy rules was introduced in IT Act, 2000 in the year?
(A)2008
(B)2011
(C)2015
(D)2020
(a) Sec. 64
(b) Sec. 65
(c) Sec. 66