0% found this document useful (0 votes)
114 views22 pages

Cyber Law MCQ

The document contains a series of multiple-choice questions related to cyber law and the Information Technology Act in India, covering topics such as cyber crimes, penalties, and legal definitions. It includes questions about specific sections of the IT Act, types of cyber offenses, and the roles of various authorities. The content appears to be intended for educational purposes, possibly for students studying law or computer applications.

Uploaded by

Rutuja Salunkhe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
114 views22 pages

Cyber Law MCQ

The document contains a series of multiple-choice questions related to cyber law and the Information Technology Act in India, covering topics such as cyber crimes, penalties, and legal definitions. It includes questions about specific sections of the IT Act, types of cyber offenses, and the roles of various authorities. The content appears to be intended for educational purposes, possibly for students studying law or computer applications.

Uploaded by

Rutuja Salunkhe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

lOMoARcPSD|22391984

Cyber law mcq

Research Methods & Computer Application (Hemchand Yadav Vishwavidyalaya)

Studocu is not sponsored or endorsed by any college or university


Downloaded by Jaydeep Gaikwad (jaydeepgaikwad10@gmail.com)
lOMoARcPSD|22391984

(1) Tampering with Computer Source Documents is ______ offence.

(a) Bailable

(b) Non-bailable

(c) Non-cognizable

(d) Both (a) and (c)

(2) Every appeal to Cyber Appellate Tribunal shall be filed within a period of _____.

(a) 60 days

(b) 90 days

(c) 45 days

(d) 30 days

(3) Order passed by Controller is challengeable before :

(a) High Court

(b) Cyber Appellate Tribunal

(c) Adjudicatory Officer

(d) Supreme Court

(4) Child pornography is an offence under section ________.

(a) 67 C

(b) 67 A

(c) 67 B

(d) 67 D

(5) Section 66 A is striked down by the judiciary in the case of :

(a) Shreya Singhal v/s U.O.I.

(b) Syed Asifuddin v/s State of A.P.

(c) Ranjit Udeshi v/s State of Maharashtra

(d) Regina v/s Hicklin

Downloaded by Jaydeep Gaikwad (jaydeepgaikwad10@gmail.com)


lOMoARcPSD|22391984

(6) The authentication to be affected by use of asymmetric crypto system and


hash function is knownas :

(a) Public key

(b) Private key

(c) Digital signature

(d) E-governance

(7) Which section of IT Act deals with the legal recognition of electronic records ?

(a) Section 4

(b) Section 2

(c) Section 5

(d) Section 6

(8) Which Section deals with cyber terrorism ?

(a) 66 C

(b) 66 B

(c) 66 D

(d) 66 F

(9) What is the maximum penalty for damage to computer, computer system ?

(a) Rs. 50 lakh

(b) Rs. 1 crore

(c) Rs. 5 crore

(d) 5 lakh

(10) What is the penalty for destroying computer source code ?

(a) Three yrs imprisonment or 5 lakh Rs. or both

(b) Three yrs imprisonment or 1 lakh Rs. or both

(c) Two yrs imprisonment or 2 lakh Rs. or both

(d) Three yrs imprisonment or 2 lakh penalty or both

Downloaded by Jaydeep Gaikwad (jaydeepgaikwad10@gmail.com)


lOMoARcPSD|22391984

(11) Amendment to IT Act 2000 came into effect on _______.

(a) 2008 Oct. 2

(b) 2009 July 3

(c) 2008 June 1

(d) 2009 Oct. 27

(12) Which are the Sections of IT Act that deal with credit card fraud ? (66c)

(a) 66, 66 C, 66 D

(b) 42, 67, 67 A, 67 B

(c) 43, 66, 66 C, 66 B

(d) None

(13) Which section of IT Act deals with the punishment for cheating by
imprisonment by using computer resource ?

(a) Section 66 D

(b) Section 66 C

(c) Section 66 F

(d) Section 66 B

(14) Those who fail to furnish documents, return, report to the Controller of
Certifying Authorities will be penalized upto :

(a) Rs. 5,000 per day

(b) Rs. 50,000

(c) Rs. 25,000 per day

(d) Rs. 1.5 lakh

(15) Licence to a Certifying Authority to issue electronic signature certificate will


be valid for

a period of :

(a) 5 yrs

(b) 10 yrs

Downloaded by Jaydeep Gaikwad (jaydeepgaikwad10@gmail.com)


lOMoARcPSD|22391984

(c) 2 yrs

(d) 7 yrs

(16) Cyber squatting is associated with :

(a) Domain Name Dispute

(b) IP addressing dispute

(c) e-mail dispute

(d) Password dispute

(17) The term ISP stands for :

(a) International Services Provider

(b) Internet Service Provider

(c) Internet Service Program

(d) Internet Social Policy

(18) Copying of a web-page or website and storing that copy for the purpose of
speeding up

subsequent access is called :

(a) Browsing

(b) File Swapping

(c) Caching

(d) Downloading

(19) The term EFT stands for :

(a) Emergency Fund Transfer

(b) Electric Fund Transfer

(c) Electronic Fund Transfer

(d) Electronic Fund Transmission

(20) Punishment for child pornography is provided under Section _______ of the I.T.
Act.

Downloaded by Jaydeep Gaikwad (jaydeepgaikwad10@gmail.com)


lOMoARcPSD|22391984

(a) 66

(b) 67-A

(c) 67-B

(d) 67-C

(21) ICANN stands for :

(a) Internet Corporation for Assigned Names and Numbers

(b) International Commission for Assigned Names and Numbers

(c) International Corporation for Assisted Names and Numbers

(d) Internet Computer Assigned Names and Numbers

(22) The term computer is defined under Section ________ of the I.T. Act.

(a) 2(1) (a)

(b) 2(1) (t)

(c) 2(1) (i)

(d) 2(1) (h

(23) According to Section 78 of the IT Act, a ________ shall investigate any offence
under the Act.

(a) Police Commissioner

(b) Police Constable

(c) Police Officer not below the rank of Inspector

(d) Deputy Superintendent of Police

(24) Sending of unsolicited bulk and commercial messages over the internet is
________.

(a) Stalking

(b) Phishing

(c) Spamming

(d) Spoofing

Downloaded by Jaydeep Gaikwad (jaydeepgaikwad10@gmail.com)


lOMoARcPSD|22391984

(25) Permitted use of disruptive activities or the threat thereof in cyber space is
called _______.

(a) Commerce

(b) Credit Card fraud

(c) Net Banking

(d) Cyber Terrorism

(26) Information Technology Act was passed in the year _________.

(a) 1999

(b) 2000

(c) 2008

(d) 2012

(27) Computer virus is a ________.

(a) Programme

(b) File

(c) Disk

(d) Audio

(28) Repeated act of harassment after threatening behaviour is called as :

(a) Cyber stalking

(b) Data diddling

(c) Cyber theft

(d) Cryptography

(29) Salami attacks are used for the commission of ________.

(a) Financial crimes

(b) Personal crimes

(c) Property related crimes

(d) Physical crimes

Downloaded by Jaydeep Gaikwad (jaydeepgaikwad10@gmail.com)


lOMoARcPSD|22391984

(30) ACL stands for :

(a) Account Control List

(b) Air Conditioned List

(c) Access Control List

(d) Access Collection List

(31) IT Act 2000, amended in :

(a) 2005

(b) 2008

(c) 2011

(d) 2015

(32) Private key U/s 2(1) (ZC) is key of a secure key pair used to create a digital
signature :

(a) Listed in the DSC issued to the subscriber by a Certifying Authority

(b) Not listed in the DSC issued to the subscriber by a Certifying Authority

(c) Sometime listed in DSC issued to the subscriber by Certifying Authority

(d) All of above

(33) As per IT Act, a subscriber may be :

(a) An individual

(b) Hindu undivided family applicant

(c) Company or firm

(d) All of above

(34) The DSC creates a “binding linkage” between :

(a) Controller and subscriber

(b) Subscriber and issuer

(c) Controller and Certifying Authority

(d) Police and Adjudicating Authority

Downloaded by Jaydeep Gaikwad (jaydeepgaikwad10@gmail.com)


lOMoARcPSD|22391984

(35) In the scheme of the Act, S. 43 to S. 45 are the ones that fall in the category of
:

(a) Cyber crime

(b) Punishment provisions

(c) Cyber contraventions

(d) Only crimes

(36) Network service provider includes

(a) Originator

(b) Addressee

(c) Mobile Satellite Services

(d) None of above

(37) Cyberspace has :

(a) No national boundaries

(b) International jurisdiction

(c) Limited boundaries

(d) (a) and (b)

(38)Harassing someone through electronic message is offence of :

(a) Hacking

(b) Squatting

(c) Stalking

(d) Phishing

(39) Whoever commits or conspires to commit cyber terrorism shall be punishable


with imprisonment which may extend to :

(a) imprisonment for two years

(b) imprisonment upto three years

(c) imprisonment for six months

Downloaded by Jaydeep Gaikwad (jaydeepgaikwad10@gmail.com)


lOMoARcPSD|22391984

(d) imprisonment for life

(40) Against offence of cybers quatting victim is entitled to involve the provision :

(a) 411 of IPC

(b) 415 of IPC

(c) 268 of IPC

(d) 499 of IPC

(41) “Nigerian Scam 419” involve scam as :

(a) Phishing

(b) Cyber stalking

(c) Net extortion

(d) Pornography

(42) Information Technology Act, 2000 describes the offence of child pornography
and prescribed punishment for it :

(a) Under Section 67

(b) Under Section 67 A

(c) Under Section 67 B

(d) Under Section 68

(43) ______ is a criminal offence of unlawfully obtaining money, property or


services from a person, entity or institution, through coercion.

(a) Phishing

(b) Pornography

(c) Net or Cyber Extortion

(d) Credit Card Fraud

(44) ______ servers have chat rooms in which people from anywhere of the world
can came

together and chat with each other.

(a) Channels

Downloaded by Jaydeep Gaikwad (jaydeepgaikwad10@gmail.com)


lOMoARcPSD|22391984

(b) Operators

(c) Internet Relay Chat

(d) Internet Protocol

(45) ICERT stands for :

(a) Indian Commercial and Economical

(b) Indian Commercial Emergency Response Team

(c) Indian Computer Emergency Response Team

(d) Indian Cyber Emergency Response Team

(46) ––––– Monitors all internet and other network activity, looking for suspicious
data and preventing unauthorized access

(a) Firewall

(b) Intrusion detection system

(c) Data encryption

(d) None of the above

(47) Out of following which is the main authority is at the top and its main
function is to issue licence to the certifying authority and to supervise his
functions.

(a) Intermediator

(b) Controller of certifying authority

(c) subscriber

(d) None of the above.

(48) –––––– means a system of a secure key pair consisting of a private key for
creating digital signature and public key for verifying digital signature.

(a) Cryptography

(b) Asymmetric cryptosystem

(b) Symmetric cryptosystem

(d) None of the above

Downloaded by Jaydeep Gaikwad (jaydeepgaikwad10@gmail.com)


lOMoARcPSD|22391984

(49) –––––– means a person who sends, generates, store or transmit any electronic
massage.

(a) Intermediary

(b) Addressee

(c) Originator

(d) Controller.

(50) The receiving of unsolicited bulk emails is known as –––––

(a) Virus

(b) Spoofing

(c) Spam

(d) Worms

(51) Out of the following which includes as an intermediary

(a) Online payment sites

(b) Internet service provide

(c) cyber café

(d) All the above

(52) Dot com job scam are cyber crimes included under –––––.

(a) Social cyber crimes

(b) Economic cyber crimes

(c) cyber terrorism

(d) None of the above.

(53) Yahoo.inc Vs Akash Arora is a famaus case relating to ––––––.

(a) Cyber stalking

(b) Cyber squatting

(c) Cyber defamation

(d) None of the above

Downloaded by Jaydeep Gaikwad (jaydeepgaikwad10@gmail.com)


lOMoARcPSD|22391984

(54) The dispute resolution policy for domain name system comes from

(a) ICANN

(b) IANA

(c) ISOC

(d) IRTF

(55) WWW.amazon.com indicates that amazon is an ––––––.

(a) Education institute

(b) Government department

(c) Network provider

(d) Commercial organization.

(56) The value added network is used in –––– form of communication.

(a) Electronic data interchange

(b) Electronic communication

(c) Cryptographic communication

(d) None of the above.

(57) –––––– is not type of virus.

(a) Sparse infectors

(b) Stealth viruses

(c) Armoured viruses

(d) Metamorphic viruses

(58) Hash function are used for (encryption)

(a) Encryption

(b) Decryption

(c) Data integrity

(d) None of the above

Downloaded by Jaydeep Gaikwad (jaydeepgaikwad10@gmail.com)


lOMoARcPSD|22391984

(60) ––––– is the protected system used for identifying the person.

(a) Fire wall

(b) Biometrics

(c) Bothe (a) and (b)

(d) None of the above

(61) ISOC stands for –––––

(a) Internet socket

(b) Internal socket

(c) Internal society

(d) Internet society

(62) Information Technology Act was passed in the year _____.

(a) 1999

(b) 2000

(c) 2008

(d) 2012

(63) The science of sending secret cypher and decoding it, is called _____.

(a) Photography

(b) Cyprography

(c) Data diddling

(d) Cryptography

(64) Buying and selling of goods and services on the internet is called_____.

(a) E–Trade

(b) E–Commerce

(c) E–Challan

(d) E–Training

Downloaded by Jaydeep Gaikwad (jaydeepgaikwad10@gmail.com)


lOMoARcPSD|22391984

(65) Which Section of IT Act deals with the appointment of Controller of


Certifying Authorities ?

(a) Section 17

(b) Section 15

(c) Section 10

(d) Section 5

(66) Which of the following Acts provides legal framework for e-governance in
India ?

(a) IT (Amendment) Act, 2008

(b) Indian Penal Code

(c) IT Act, 2000

(d) None of the above

(67) Computer Virus is a :

(a) Programme

(b) Audio

(c) File

(d) Disk

(68) ACL stands for :

(a) Air Conditioned List

(b) Access Control List

(c) Access Collection List

(d) Account Control List

(69) Widely used security measure for blocking traffic in the network :

(a) fire window

(b) fire door

(c) fire wall

Downloaded by Jaydeep Gaikwad (jaydeepgaikwad10@gmail.com)


lOMoARcPSD|22391984

(d) fire exit

(70) Under Information Technology Act the purpose of digital signature is to :

(a) Forge the document

(b) Photocopy the document

(c) Digital Printing

(d) Authenticate the document

(71) Repeated act of harassment or threatening behaviour is called :

(a) Credit card fraud

(b) Cyber theft

(c) Cyber stalking

(d) Internet time theft

(72) Internet, protocol, addresses consist of four numbers from 0 to ______.

(a) 31

(b) 127

(c) 63

(d) 25

(73) Information Technology Act in based on model set of laws provided by :

(a) UNTCAD

(b) UNO

(c) UNCITRAL

(d) UNICEF

(74) Domain names are simply the ________ of the internet.

(a) Addresses

(b) Location

(c) Information

Downloaded by Jaydeep Gaikwad (jaydeepgaikwad10@gmail.com)


lOMoARcPSD|22391984

(d) Website

(75) What is an ISP ?

(a) Internet Service Provider

(b) Internet Sample Provider

(c) International Service Provider

(d) Internet Service Passenger

(76) A patent is an exclusive right granted by a ______ to the owner of an invention


to make, use, manufacture.

(a) Country

(b) Government

(c) District

(d) World

(77) The Information Technology Act, 2000 was amended in the year _________.

(a) 2013

(b) 2012

(c) 2008

(d) 2011

(78) Computer means any device which performs :

(a) Logical functions

(b) Arithmetic functions

(c) Memory functions

(d) All of the above

(79) UNCITRAL relates to :

(a) Profession

(b) Business

(c) Trade

Downloaded by Jaydeep Gaikwad (jaydeepgaikwad10@gmail.com)


lOMoARcPSD|22391984

(d) Art

(80) The enactment of IT Act affected the provisions in :

(a) Transfer of Property Act

(b) Dowry Prohibition Act

(c) Indian Evidence Act

(d) Company law

(81) In Digital signature the key pair used is called :

(a) Public-personal

(b) Private-personal

(c) Personal-private

(d) Public-private

(82) ISO stands for :

(a) International Organization for Standardization

(b) International Service Organization

(c) International Security Organization

(d) International Secondary Organization

(83) The names with which companies exist in cyber world are called :

(a) Dangle names

(b) Device names

(c) Doodle names

(d) Domain names

(84) Hacking is prohibited under ________ of the IT Act, 2000.

(a) Sec. 64

(b) Sec. 65

(c) Sec. 66

Downloaded by Jaydeep Gaikwad (jaydeepgaikwad10@gmail.com)


lOMoARcPSD|22391984

(d) Sec. 63

(85) The IT Act, 2000 provides for the establishment of :

(a) Cyber Advisory Tribunal

(b) Computer Advisory Trust

(c) Cyber Appellate Tribunal

(d) Cyber Advisory Trust

(86) Cyber Crime is a crime in which computer is used as :

(a) Tool

(b) Target

(c) Both (a) and (b)

(d) None of the above

(87) Cyber Terrorism is an act injuring the :

(a) Sovereignty of India

(b) People of India

(c) Foreign relations

(d) All of the above

(88) Cyber Crime involves the theft of :

(a) Property

(b) Identity

(c) Money

(d) All of the above

(89) IP stands for :

(a) Internet procedure

(b) Internet position

(c) Internet protocol

Downloaded by Jaydeep Gaikwad (jaydeepgaikwad10@gmail.com)


lOMoARcPSD|22391984

(d) Internet program

(90) The cyber offence in which frauds are committed by inviting people to invest
money and sharing financial information is :

(a) Hacking

(b) Squatting

(c) Piracy

(d) Fishing

91. Information Technology Act, 2000 is ACT NO. __ OF 2000?


(A)35
(B)21
(C)13
(D)1

92. Which among the following with regard to Information Technology Act, 2000
is NOT correct?
(A)It shall extend to the whole of India
(B)it does not apply to any offence or contravention thereunder committed
outside India by any person
(C)it is an act to provide legal recognition for transactions carried out by means of
electronic data
(D)It is the primary law in India dealing with cybercrime and electronic commerce

93. Information Technology Act, 2000 came into force on?


(A)1 January 2001
(B)11 June 2000
(C)17 October 2000
(D)24 December 2002

94. Who was the President of India who signed the Information Technology Act,
2000?
(A)A P J Abdul Kalam
(B)K R Narayanan
(C)Atal Bihari Vajpayee
(D)Pratibha Patil

95. “Digital signature” is defined under which section of IT Act,2000?


(A)Section 1
(B)Section 2
(C)Section 8
(D)Section 6

96. Information Technology Act, 2000 directed the formation of a Controller of


Certifying Authorities to regulate the issuance of?

Downloaded by Jaydeep Gaikwad (jaydeepgaikwad10@gmail.com)


lOMoARcPSD|22391984

(A)Data license
(B)IP address in India
(C)digital signatures
(D)internet service provider license

97. Information Technology Act, 2000 amended which among the following to
make them compliant with new technologies? i. Indian Penal Code, 1860 ii. Indian
Evidence Act, 1872 iii. Banker’s Book Evidence Act, 1891 iv. Reserve Bank of India
Act, 1934
(A)i only
(B)i and iii only
(C)ii, iii and iv only
(D)All the above

98. A major amendment to Information Technology Act, 2000 was made in the
year?
(A)2001
(B)2016
(C)2012
(D)2008

99. Which among the following was established under IT Act, 2000 to resolve
disputes arising from the law?
(A)Cyber Appellate Tribunal
(B)Technology Disputes Bureau
(C)Cyber Administrative Tribunal
(D)IT Disputes Tribunal

100. Section 66A which penalized sending “offensive messages” was introduced in
IT Act, 2000 through?
(A)Information Technology (Amendment) Act, 2008
(B)Information Technology (Amendment) Act, 2003
(C)Information Technology (Amendment) Act, 2015
(D)Information Technology (Amendment) Act, 2005

101. Which among the following is/are the major insertions in IT Act,2000 through
Information Technology (Amendment) Act, 2008?
(A)Section 66A which penalized sending “offensive messages”
(B)Section 69, which gave authorities the power of “interception or monitoring or
decryption of any information through any computer resource
(C)it introduced provisions addressing – pornography, child porn, cyber terrorism and
voyeurism
(D)All the above

102. Which among the following offence under IT Act,2000 has the maximum
penalty of imprisonment up to life?
(A)Using password of another person
(B)Securing access or attempting to secure access to a protected system

Downloaded by Jaydeep Gaikwad (jaydeepgaikwad10@gmail.com)


lOMoARcPSD|22391984

(C)Publication for fraudulent purpose


(D)Acts of cyberterrorism

103. Section 66A of IT Act,2000 has been struck down by Supreme Court’s Order
dated 24th March, 2015 in which case?
(A)Shreya Singhal vs. Union of India
(B)Puttuswamy v. Union of India
(C)Shayara Bano vs Union Of India
(D)Indra Sawhney and Union of India

104. In the year 2020, Indian Government banned 59 Chinese mobile apps,
including TikTok invoking which Section of IT Act, 2000?
(A)Section 66A
(B)Section 66F
(C)Section 72A
(D)Section 69A

105. The data privacy rules was introduced in IT Act, 2000 in the year?
(A)2008
(B)2011
(C)2015
(D)2020

(106) Child pornography is prohibited by ______ of IT Act, 2000.

(a) Sec. 64

(b) Sec. 65

(c) Sec. 66

(d) Sec. 67-B

Downloaded by Jaydeep Gaikwad (jaydeepgaikwad10@gmail.com)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy