You are on page 1of 5

Information Security & Cyber

Laws
Semester 7(Marketing)
Time : 2 hrs
Total Marks : 30
Section - A
1. Write short notes on any three of
the following :(3*2=6)
(a) Biometrics.
(b) Cyber Terrorism.
(c) Firewalls.
(d) Patents.
Section - B
2. Attempt any two parts of the
following :(2*7=14)

(a) Discuss various types of


firewalls. How can we use firewalls to
secure our applications?
(b) Explain cyber law. What is cyber
law required?
(c) Explain briefly the IT Act, 2000.

Multiple Choice Questions :(10*1=10)


1. Which of the following is a form of
protection which is provided to the
authors of original works of
authorship?
a) Copyright b) Patent c) IPR d)
Semiconductor layout and design
2. Which of the following refers to the
rights given to a person or an
organisation for its intellectual activity,
i.e., creations of mind?

a) Copyright act b) Cyber law c)


Intellectual property rights d) IPA
3) Firewalls are used to :
a) Provide data backup facilities b)
Provide network integration facilities c)
Prevent hackers from accessing your
computer through internet
d) All of the above
4) Firewalls are based on :
a) Open source techniques to prevent
access b) Proxy servers to control and
monitor outbound traffic c) Integrated
network technique
d) All of the above
5) Viruses are normally used to :
a) Strengthen the security of a system
b) Cause harms to some files and
storage media of a computer system
c) Enhance the security of individuals
and organisations on the internet d)
None of the above

6) Biometrics is :
a) to increase efficiency of internal
market place b) increasingly
specialised products c) important
method for physical access control
d) None of the above
7) Information Technology Act in India
was amended in:
a) 2000 b) 2004 c) 2008 d) 2010
8) Cyber law encompasses laws
relating to :
a) Cyber crimes b) Intellectual
property c) Digital Signatures d) All of
the above
9) Cyber space is an ________
dimension :
a) Tangible b) Intangible c) None d)
Both a & b
10) Cyber crime in a broader sense is:
a) Computer crime b) Computer
related crime c) Both a & b d) None

You might also like