Professional Documents
Culture Documents
Seema & Mohan are in a relationship, they have shared their credentials for
Gmail, Facebook etc. After breakup, Mohan uses Seema's credentials to
access his personal account like Gmail, Facebook, etc without her
permission. Seema can file a case against Mohan Under IT Act 2000
section_______________ .
Section 43
Section 69
Section 66
Section 76
It is the first international treaty seeking to address internet and cyber crime
All
https://docs.google.com/forms/d/e/1FAIpQLSdMbYHT7ve0zqh1xg-c8qfgpXWqE62c3d_CzIfNOtmA1sTzDw/viewscore?viewscore… 2/11
16/05/2020 Mid Sem Test-II, CS8004: Cyber Law & Ethics
Electronic Evidence
Electronic gift
Electronic message
What type of cyber-crime, its laws and punishments does section 66 of the
Indian IT Act holds?
Stealing data
22
23
21
20
https://docs.google.com/forms/d/e/1FAIpQLSdMbYHT7ve0zqh1xg-c8qfgpXWqE62c3d_CzIfNOtmA1sTzDw/viewscore?viewscore… 3/11
16/05/2020 Mid Sem Test-II, CS8004: Cyber Law & Ethics
all
43
65
67
70
https://docs.google.com/forms/d/e/1FAIpQLSdMbYHT7ve0zqh1xg-c8qfgpXWqE62c3d_CzIfNOtmA1sTzDw/viewscore?viewscore… 4/11
16/05/2020 Mid Sem Test-II, CS8004: Cyber Law & Ethics
Section 6
Section 3
Section 4
Section 5
Serial Number
User Id
License Agreement
Holograms
https://docs.google.com/forms/d/e/1FAIpQLSdMbYHT7ve0zqh1xg-c8qfgpXWqE62c3d_CzIfNOtmA1sTzDw/viewscore?viewscore… 5/11
16/05/2020 Mid Sem Test-II, CS8004: Cyber Law & Ethics
Electronic gift
Electronic message
Electronic Evidence
Let's say you have a credit card that has no balance due on it. You've
decided not to use it anymore. No monthly statements show up for it and
you don't carry it with you. There is no way an 'identity thief' can get this
card's number. True or False?
True
False
None
https://docs.google.com/forms/d/e/1FAIpQLSdMbYHT7ve0zqh1xg-c8qfgpXWqE62c3d_CzIfNOtmA1sTzDw/viewscore?viewscore… 6/11
16/05/2020 Mid Sem Test-II, CS8004: Cyber Law & Ethics
Highly Funded
Technologically articulate
All
XML Injection
HTML injection
SQL Injection
https://docs.google.com/forms/d/e/1FAIpQLSdMbYHT7ve0zqh1xg-c8qfgpXWqE62c3d_CzIfNOtmA1sTzDw/viewscore?viewscore… 7/11
16/05/2020 Mid Sem Test-II, CS8004: Cyber Law & Ethics
12
14
16
18
https://docs.google.com/forms/d/e/1FAIpQLSdMbYHT7ve0zqh1xg-c8qfgpXWqE62c3d_CzIfNOtmA1sTzDw/viewscore?viewscore… 8/11
16/05/2020 Mid Sem Test-II, CS8004: Cyber Law & Ethics
When there is an excessive amount of data flow, which the system cannot
handle, _____ attack takes place.
Sasser
Blaster
I LOVE YOU
Creeper
Digital privacy
Digital protection
Digital secrecy
Digital Integrity
https://docs.google.com/forms/d/e/1FAIpQLSdMbYHT7ve0zqh1xg-c8qfgpXWqE62c3d_CzIfNOtmA1sTzDw/viewscore?viewscore… 9/11
16/05/2020 Mid Sem Test-II, CS8004: Cyber Law & Ethics
___________ is a violent act done using the Internet, which either threatens
any technology user or leads to loss of life or otherwise harms anyone in
order to accomplish political gain.
Cyber-terrorism
Cyber-attack
Cyber campaign
Cyber-warfare
Cyber crime against Individual, cyber crime against Property and Cyber crime
against organisation
Cyber crime against Individual, cyber crime against Property, Cyber crime against
organisation and cyber crime against society
Yes
No
https://docs.google.com/forms/d/e/1FAIpQLSdMbYHT7ve0zqh1xg-c8qfgpXWqE62c3d_CzIfNOtmA1sTzDw/viewscore?viewscor… 10/11
16/05/2020 Mid Sem Test-II, CS8004: Cyber Law & Ethics
Ram has a office in New York , from where he accessed server of google
situated in Kolkata and hacked password file . Is IT Act applicable on him
Yes
No
Ram has a office in New York , from where he accessed server of google
situated in canada and hacked password file . Is IT Act applicable on him
Yes
No
This form was created outside of your domain. - Terms of Service - Privacy Policy
Forms
https://docs.google.com/forms/d/e/1FAIpQLSdMbYHT7ve0zqh1xg-c8qfgpXWqE62c3d_CzIfNOtmA1sTzDw/viewscore?viewscor… 11/11