You are on page 1of 10

16/05/2020 Mid Sem Test-II, CS8004: Cyber Law & Ethics

WTSA stands for?

World Telecommunication Standardisation Assemblies

World Telecommunication Standardisation Association

World Trade Standardisation Assemblies

World Trade Standardisation Association

Seema & Mohan are in a relationship, they have shared their credentials for
Gmail, Facebook etc. After breakup, Mohan uses Seema's credentials to
access his personal account like Gmail, Facebook, etc without her
permission. Seema can file a case against Mohan Under IT Act 2000
section_______________ .

Section 43

Section 69

Section 66

Section 76

Which of the following is true for " Budapest convention on Cybercrime"


(Multiple options are possible ):

It is the first international treaty seeking to address internet and cyber crime

It is also known as convention on Cyber crime

It was drawn up by council of Europe in Strasbourg

All

https://docs.google.com/forms/d/e/1FAIpQLSdMbYHT7ve0zqh1xg-c8qfgpXWqE62c3d_CzIfNOtmA1sTzDw/viewscore?viewscore… 2/11
16/05/2020 Mid Sem Test-II, CS8004: Cyber Law & Ethics

Which one of the following is outside the scope of IT Act 2000

Power of Attorney with digital signature

Electronic Evidence

Electronic gift

Electronic message

What type of cyber-crime, its laws and punishments does section 66 of the
Indian IT Act holds?

Cracking or illegally hack into any system

Putting antivirus into the victim

Stealing data

Stealing hardware components

APEC has_________ members referred to as ‘member economies.’

22

23

21

20

https://docs.google.com/forms/d/e/1FAIpQLSdMbYHT7ve0zqh1xg-c8qfgpXWqE62c3d_CzIfNOtmA1sTzDw/viewscore?viewscore… 3/11
16/05/2020 Mid Sem Test-II, CS8004: Cyber Law & Ethics

Organization for Economic Cooperation and Development (OECD) was


established with the main objective of seeking sustains ____________?

economic and army cooperation

all

cooperation in defense of its member countries

economic growth among its member countries

Under which section of IT Act, stealing any digital asset or information is


written a cyber-crime.

43

65

67

70

The world bank is recognized member of

United Nations Development Group

United Nations General Assembly

United Nations Development Council

United Nations Security Council

https://docs.google.com/forms/d/e/1FAIpQLSdMbYHT7ve0zqh1xg-c8qfgpXWqE62c3d_CzIfNOtmA1sTzDw/viewscore?viewscore… 4/11
16/05/2020 Mid Sem Test-II, CS8004: Cyber Law & Ethics

The parsed HTML code of in-memory tree structure is defined by a


standard, called

Document Obtained Model

Dynamic Object Model

Document Object Model

Dynamic Obtained Model

The section deals with legal recognition of electronic records

Section 6

Section 3

Section 4

Section 5

Software can be protected against piracy in a THREE number of ways, which


one is not included:

Serial Number

User Id

License Agreement

Holograms

https://docs.google.com/forms/d/e/1FAIpQLSdMbYHT7ve0zqh1xg-c8qfgpXWqE62c3d_CzIfNOtmA1sTzDw/viewscore?viewscore… 5/11
16/05/2020 Mid Sem Test-II, CS8004: Cyber Law & Ethics

Which one of the following is outside the scope of IT Act 2000

Electronic gift

Power of Attorney with digital signature

Electronic message

Electronic Evidence

Let's say you have a credit card that has no balance due on it. You've
decided not to use it anymore. No monthly statements show up for it and
you don't carry it with you. There is no way an 'identity thief' can get this
card's number. True or False?

True

False

Which of the following is NOT True about Cyber Torts

It's criminal wrong.

It is generally against a person, not the society.

It is subjected to some compensation instead of Punishment as per IPC.

None

https://docs.google.com/forms/d/e/1FAIpQLSdMbYHT7ve0zqh1xg-c8qfgpXWqE62c3d_CzIfNOtmA1sTzDw/viewscore?viewscore… 6/11
16/05/2020 Mid Sem Test-II, CS8004: Cyber Law & Ethics

What are the Important Characteristics of the cyber-terrorist organization

Highly Funded

Technologically articulate

capable of inflicting devastating damage to a wide range of targets

All

Cyber-crime can be categorized into ________ types

_____________ is a code injecting method used for attacking the database of


a system / website.

XML Injection

Malicious code injection

HTML injection

SQL Injection

https://docs.google.com/forms/d/e/1FAIpQLSdMbYHT7ve0zqh1xg-c8qfgpXWqE62c3d_CzIfNOtmA1sTzDw/viewscore?viewscore… 7/11
16/05/2020 Mid Sem Test-II, CS8004: Cyber Law & Ethics

How many schedules are there in IT Act 2000?

Section 67,67A,67B applies in reference of clidren who have not completed


_________years of age ?

12

14

16

18

Who deploys Malwares to a system or network?

Criminal organisations, gray hat hackers, Malware developers, Penetration testers

Criminal organisations, Black hat hackers, malware developers, cyber-terrorists

Criminal organizations, Black hat hackers, software developers, cyber-terrorists

Criminal organisations, White hat hackers, malware developers, cyber-terrorists

https://docs.google.com/forms/d/e/1FAIpQLSdMbYHT7ve0zqh1xg-c8qfgpXWqE62c3d_CzIfNOtmA1sTzDw/viewscore?viewscore… 8/11
16/05/2020 Mid Sem Test-II, CS8004: Cyber Law & Ethics

When there is an excessive amount of data flow, which the system cannot
handle, _____ attack takes place.

Database crash attack

DoS (Denial of Service) attack

Buffer Overflow attack

Data overflow Attack

The first computer virus is______

Sasser

Blaster

I LOVE YOU

Creeper

_______________ is a combined term which encompasses 3 sub-pillars;


information privacy, individual privacy, and communication privacy.

Digital privacy

Digital protection

Digital secrecy

Digital Integrity

https://docs.google.com/forms/d/e/1FAIpQLSdMbYHT7ve0zqh1xg-c8qfgpXWqE62c3d_CzIfNOtmA1sTzDw/viewscore?viewscore… 9/11
16/05/2020 Mid Sem Test-II, CS8004: Cyber Law & Ethics

___________ is a violent act done using the Internet, which either threatens
any technology user or leads to loss of life or otherwise harms anyone in
order to accomplish political gain.

Cyber-terrorism

Cyber-attack

Cyber campaign

Cyber-warfare

Classification of Cybercrime can be categories as

Cyber crime against Individual

Cyber crime against Individual and cyber crime against Property

Cyber crime against Individual, cyber crime against Property and Cyber crime
against organisation

Cyber crime against Individual, cyber crime against Property, Cyber crime against
organisation and cyber crime against society

Ram has a office in Kolkata , from where he accessed server of google


situated in New York and hacked passwordfile . Is IT Act applicable on him

Yes

No

https://docs.google.com/forms/d/e/1FAIpQLSdMbYHT7ve0zqh1xg-c8qfgpXWqE62c3d_CzIfNOtmA1sTzDw/viewscore?viewscor… 10/11
16/05/2020 Mid Sem Test-II, CS8004: Cyber Law & Ethics

Ram has a office in New York , from where he accessed server of google
situated in Kolkata and hacked password file . Is IT Act applicable on him

Yes

No

Ram has a office in New York , from where he accessed server of google
situated in canada and hacked password file . Is IT Act applicable on him

Yes

No

This form was created outside of your domain. - Terms of Service - Privacy Policy

 Forms

https://docs.google.com/forms/d/e/1FAIpQLSdMbYHT7ve0zqh1xg-c8qfgpXWqE62c3d_CzIfNOtmA1sTzDw/viewscore?viewscor… 11/11

You might also like