You are on page 1of 19
Dr.G.R.Damodaran College of Science (Autonomous, affiliated to the Bharathiar University, recognized by the UGC)Re- accredited at the 'A' Grade Level by the NAAC and ISO 9001:2008 Certified CRISL rated 'A' (TN) for MBA and MIB Programmes. III B.Com (PA) [2017 - 2020] Semester VI Elective Il: CYBER LAW - 618U1 Multiple Choice Questions 1, Many eyber crimes come under the Indian Penal Code, Which one of the following is an example? A. Sending threatening messages by email B, Forgery of electronic records C. Bogus websites D. All of these ANSWER: D 2. The Information technology act 2000 is an act of the Indian parliament notified on A. 27 October 2000 B. 15 December 2000 C. 17 November 2000 D. 17 October 2000 ANSWER: D 3. Digital signature A. Statutory B. Legislative C. Governmental D. All of the above ANSWER: A 4, The information technology act 2000 is the primary law in India dealing with A. Cyber crime B. Electronic commerce C. both a and b D. None of the above ANSWER: C has been replaced with electronic signature to make it a more technology neutral act A. Digital signature B. 3D printing C. Electronic signature D. Atomicity ANSWER: A 6. Which of the following are cryptographic method? ‘A. Technical standard B. Criteria C. Protocols, D. All the above ANSWER: D 7. Accessing computer without prior authorization is a eyber-crimes that come under A. Section 65 B. Section 66 C. Section 68 D. Section 70 ANSWER: B 8. means a person who has been granted a license to issue a electroni A. Certifying authority B. Certifying private key authority C. Certifying system controller D. Appropriate authority ANSWER: A ignature certificate 9. The copyright act 1957was the first post-independence copyright legislation in India and the law has been amended Since 1957 A.3 times B. 4 times C. 5 times D. 6 times ANSWER: D 10. The copyright act of 1911 passed by the parliament of the A. United kingdom B. United states Cc. WHO D. All the above ANSWER: A 11. The copyright act of 1911 modified in its application to india by the A. Indian copyright act 1914 B. Indian copyright act 1947 C. Indian copyright act 1915 D. Indian copyright act 1918 ANSWER: A 12. The criminal remedies are provided under chapter XIII of the statue and the remedies provided against copyright infringement include imprisonment along with a fine, ‘A. Upto 2 years, upto 200000 rupees B, Upto 3 years ,upto 200000 rupees C. Upto 4 years ,upto 300000 rupees D. Upto 5 years, upto 400000 rupees ANSWER: B B is data that has been organized or presented in a meaningful fashion A.A process B. Software C. Storage D. Information ANSWER: D 14, is the science that attempts to produce machines that display the same type of intelligence that humans do A. Nanoscience B. Nanotechnology C. Simulation D. Artificial intelligence (AD) ANSWER: D 15. hnology no longer protected by copyright, available to everyone, is considered to be: A. Proprietary B, Open C. Experimental D. In the public domain ANSWER: A 16, Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as A. Robotics B. Computer forensics C. Simulation D. Forec: ANSWER: A 17. Which of the following is NOT one of the four major data processing functions of a computer? ‘A. Gathering data B. Processing data into information C. Analyzing the data or information D. Storing the data or information ANSWER: C 18, The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called: A. Robotics B. Computer forensics C. Simulation D. Forecasting ANSWER: B 19, All of the following are examples of real security and privacy risks EXCEPT: A. Hackers B. Spam C. Viruses. D. Identity theft ANSWER: B 20. Types of evidence under Indian evidence act 1872 A. Oral evidence B. Documentary evidence C. Primary evidence D. All the above ANSWER: A. 21. Qanun-e-shahadat is also known as A. Evidence Act 1872 B, Evidence Order 1948 C. Evidence Act 1948 D. Evidence Order 1872 ANSWER: B 22. Under Evidence Act 1872 Court takes Evidence for the Facts. In this Facts includes ‘A Issue of Ethical Evidence or Relevant Fact B, Issue of Facts or Relevant Fact C. Issue of Facts or Irrelevant Fact D. Issue of Ethical Evidence or Irrelevant Fact ANSWER: B 23. Under Evidence Act 1872 Computer is used as tool to record the Evidence and printed copy is treated as final version but is not an A. Evidence Record B. Final Process C. Electronic Record D. Fictitious Record ANSWER: C 24. On which of the following is not true regarding Of Burden of Proof under Evidence Act 1872? A. Burden of proof B. On whom burden of proof lies C. Both a and b D. None of these ANSWER: D 25. The Indian Evidence Act 1872 is enacted by the A. Governor B. Governor Secretary C. Governor General in Council D. Government Auditor ANSWE 26. is done upon the request of the party secking to relay on the fact at issue A. Judicial Information B. Judicial Notice C. Judicial Agreement D. Judicial Review (or) Evaluation ANSWER: B 27. Which of the following is true expansion for UNCITRAL? A. United Nations Commissions on Inter Transport Law B. United Nations Commissions on Inter Transfer Law C. United Nations Commissions on International Trade Law D. United Nations Commissions on International Transport Law ANSWER: C 28. is the most superior class of Evidence A, Primary Evidence B, Direct Evidence C. Oral Evidence D. Judicial Evidence ANSWER: A 29. A Hacking group is called ‘A. Master of Decoding (MOD) B. Master of Digital (MOD) C. Master of Deception (MOD) D. Master of Dissimulation (MOD) ANSWER: C 30. The Currency Notes Forgery Act, 1899 was amended the following times under the Indian Penal Code, 1860 AZ B.9 c.10 D. 16 ANSWER: A 31. Cyber crimes crossing International borders and involving the actions of atleast one nation state is sometimes referred to as A. Cyber warfare B. Warfare C. Cyber battles D. Espionage ANSWER: A. 32. The computer as a communication tool presents the computer as the object used to commit the A. Loss. B. Crime. C. Threat D. Encryption ANSWER: B 33. Computer crimes often fit within categories ‘A. Modern criminal law B. Modern cyber law C. Traditional criminal law D. Traditional cyber law ANSWER: C 34. A part of overall legal system that deals with cyberspace and their respective Legal issues A. Cyber law B, Industrial law C. Business law D. Commereial law ANSWER: A 35. Who created cyberspace A. Elon musk B. William Gibson C, Robert,H.Goddard D. Wernher Von Braun ANSWER: B 36. World Computer Security Day A. October 30 B. November 30 C. December 30 D. January 30 ANSWER: B 37. Many cyber crimes come under the Indian Penal Code. Which one of the following is an example? A. Sending threatening messages by email B. Forgery of electronic records C. Bogus websites D. All of these ANSWER: D 38. — - will use software flaws to attack computer system frequently and anonymously A. Corporate criminal B. Cyber criminal C. Computer crime D. Server crime ANSWER: B 39. In financial trans A. Safe B. Software C. Secure D. System ANSWER: C n website should have an s after the letter http. In this s stands for 40. A Hacking group is called A. Master of Decoding (MOD) B, Master of Digital (MOD) C. Master of Deception (MOD) D. Master of Dissimulation (MOD) ANSWER: C 41. Which type of markets are used to buy and sell recreational drugs online A. Darknet markets B. Cybernet markets C. Traffickers markets D. Diabolus markets ANSWER: A 42. Under whose chairmanship was the Indian Penal Code,1860 drafted A. Thomas Babington Macaulay B, Milton Fredman C. David Richardo D. Carl Marks ANSWER: A 43. 100 percent FDI under automatic route is permitted in marketplace model of E-commerce through A. Scheme support B. Procedure support C. Both a & b D. Policy support ANSWER: D 44, Most websites link to their privacy poliey statement in the A. Header B, Footer C. Botha &b D. None of the above ANSWER: B 43. An privacy poliey is your everyday practice of collecting . managing and using data from site visitors A. Information technology B. E-commerce C. E-banking D. None of the above ANSWER: B 46. Cyber space is the online world of computer networks and especially the A. Intranet B. Intemet C. Botha &b D. E-commerce ANSWER: B 47. is a conceptual electronic space unbounded by distance or other physical limitations A. E-commerce B, Cyberspace C. Information technology D. None of the above ANSWER: B 48. Online privaey is essential for visitors and customers anking B, E-commerce C. E-mail D. All of the above ANSWER: B 49. Cyber law is an attempt to apply designed for the physical world to human activity on the interned A. Rules and regulations B. Cyber law C. Technology D. Laws ANSWER: D 50. The above of computers has also given birth to a gamut of new age crimes that are addressed by the information technology A. Act 2000 B. Act 2001 C. Act 2002 D. Act 2003 ANSWER: A 51, is the brainstorming phase A. Set clear ownership B, E-commerce privacy policies C. Audit your privacy practi D. Post and communicate ANSWER: B form of a signature that can be used to authenticate the 52.4 signature is an electron identity ‘A. Manual B. Digital C. Either manual or digital D. Both manual or digital ANSWER: B 53. How many people use e-commerce in India? A. 40% of the population B. 50% of the population C.25 % of the population D. 35 % of population ANSWER: A 54. is a global and dynamic domain characterised by the combined use of electrons and electromagnetic spectrum, whose purpose is to create.store,modify and exchange,share and extract,use,eliminate information and disrupt physical resources ‘A. Cyberspace B, Cyber law C. Both a and b D. None of the above ANSWER: A 55. Which of the following come under cyber crime? A. Intellectual property crime B. Pomography C. Online gambling D. All the above ANSWER: D 3 . The rental of sofiware to consumers without the permission of copy right holder is known as ‘A. Unbundling B. Renting C. Counter felting D. Soft loading ANSWER: B Many cybererimes come under the Indian penal code. Which one of the following is an example! A. Sending threatening message by email B. Forgery of electronic records C. Bogus websites D. All the above ANSWER: D 58 is your everyday practise of collecting, managing, and using data from site visitors A. Privacy policy B, E-commerce privacy policy C. Both a & D. None of the above ANSWER: B 59. refers to email that appears to have been originated from one source when it was actually sent from another source A Email spoofing B, Email spamming C. Email bombing D. None of the above ANSWER: A 60. The world of internet is known as cyber space A. Information technology B, Computer generated C. E-commerce D. None of the above ANSWER: B. 61. Which of the following is NOT one of the four major data processing functions of a computer? A. Gathering data B, Processing data into information C. Analyzing the data or information D. Storing the data or information ANSWER: C 62. The name for the way that computers manipulate data into information is called A. Programming B, Processing C. Storing D. Organizing ANSWER: B 63. Which of the following is a cyber crime against individual? A. Email spoofing B. Cyber defamation C. Cyber stalking D. All of these ANSWER: D 64, Digital signature ¢ A. Statutory B. Legislative C. Governmental D. All of the above ANSWER: A requirement in various applications 65. The contains 13 chapters and 90 sections. A, Companies act B. Indian penal code C. Indian Evidence Act D. IT act ANSWER: D 66, Subject to the provisions of the section, any subscriber may authenticate an by affixing his digital signatures A. Financial record B, Electronic record C, Fundamental record D. None of the above ANSWER: B 67. The private key and the public key are unique to the subscriber and constitute A. Common key pair B, Fundamental key pair C. Electronic key pair D. Functioning key pair ANSWER: D 68. is the application of information and communication technology (ICT) for delivering government services A. Governance B, Electronic governance C. Governance and ethies D. Risk and governance ANSWER: B. 69. Any person by the use of a public key of the subscriber ean verify the A. Financial record B. Documentary record C. Electronic record D. Electronic report ANSWER: C 70. can only be used to encrypt a document, itis popularly used in the tender portal, to help companies encrypt the documents and upload A. Encrypt DSC B. Copy and enerypt DSC C. Both a and b D. None of the above ANSWER: A 71. The information technology act, is enacted by A. Reserve bank of India B. Parliament of India C. IT companies D. All of the above ANSWER: B 72. The act to provide legal recognition for transactions carried our by means of electronic data interchange and other means of electronic communication, is known as A. Electronic commerce B. Evidence Act C. Model law D. Section 664 ANSWER: A. 73. Which of the following is true expansion for UNCITRAL? A. United Nations Commissions on Inter Transport Law B. United Nations Commissions on Inter Transfer Law C. United Nations Commissions on International Trade Law D. United Nations Commissions on International Transport Law ANSWER: C 14. s done upon the request of the party seeking (o relay on the fact at issue A. Judicial Information B. Judicial Notice C. Judicial Agreement D. Judicial Review (or) Evaluation ANSWER: B 75. The Indian Evidence Act 1872 is enacted by the A, Governor B, Governor Secretary C. Governor General in C D. Government Auditor ANSWER: C neil 76. United Nation Commission on International Trade Law stands for A. UNCITL. B, UNCITRAL ©. UNCITRL, D. None of the above ANSWER: A 77. The Indian Evidence act into force on A. 06 october 1860 B. 01 march 1974 C. 5 mareh 1872 D. OL september 1872 ANSWER: D 78. The law of evidence consists of A. Ordinary rules of resoning B. Legal rules of evidence C. Rules of logic D. Alll the above ANSWER: B 79. Under the Evidence Act , fact means A. Factum probandum B. Factum proban C. Both a and b D. None of the above ANSWER: C 80. Law of evidence is A. Substantive law B. An adjective law C. Both a and b D. None of the above ANSWER: B 81. The first computer virus is A, Sasser B. Creeper C. Blaster D. None of the above ANSWER: B 82. What is the punishment in India for stealing computer documents, assets or any software’ @s source code from any organization, individual, or from any other means? A. 6 months of imprisonment and a fine of Rs. 50,000 B. 1 year of imprisonment and a fine of Rs. 100,000 C. 2 years of imprisonment and a fine of Rs. 250,000 D. 3 years of imprisonment and a fine of Rs. 500,000 ANSWER: D 83. Viruses are ‘A. Man made B. Naturally occur C. Machine made D. All of the above ANSWER: A 84. Unsolicited commercial email is known ai A. Spam B. Malware C. Virus D. Spyware ANSWER: A 85. When a person is harrassed repeatedly by being followed called or be written to he / she is a target of A. Bullying B. Stalking C. Identity theft D. Phishing ANSWER: B 86. Which of the following is a class of computer threat A. Phishing, B. Soliciting C. DoS attacks D. Stalking ANSWER: C 87. Which of the following is not an external threat to a computer or a computer network. A. Ignorance B. Trojan horses C. Adware D. Crackers ANSWER: A. 88, —---- are often delivered to a PC through an email attachment and are often designed to do harm A. Virus B. Portals C. Email D. Spam ANSWER: A 89. The altering of data so that it is not usable unless the changes are undone is A. Biometrics B. Encryption C. Ergonomics D. Compression ANSWER: B 90. VIRUS stands for A. Very Intelligent Result Until Source B, Vital Information Resource Under Slege C. Viral Important Record User Searched D. Very Interchanged Resource Under Search ANSWER: B 91. What is the name of the IT law that India is having in the Indian legislature? A. Indiad@s Technology (IT) Act, 2000 B, Indiaa@s Digital Information Technology (DIT) Act, 2000 C. Indiai@@s Information Technology (IT) Act, 2000 D. The Technology Act, 2008 ANSWER: C 92. A virus that migrates freely within a large population of unauthorized e ‘A. Macro: B, Flame war C. Plagiarism D. Worm ANSWER: A 93, identity A. Phishing scams B, Phishing trips C. Spyware seams D. Computer viruses ANSWER: A. ~ are attempts by individuals to obtain confidential information from you to falsifying their 94. Authentication is, A. Hard to assure identity of user on a remote system B. Insertion C. Modification D. None of the above ANSWER: A 95.A A, PenDrive B. Computer Virus C. Mouse D. Antivurs ANSWER: B a computer program that can replicate itself and spread from one computer to another 96. To protect yourself from computer hacker, you should tum on a A. Firewall B. Script C. Antivirus D. VLC ANSWER: A 97. Firewalls are used to protect against ~ A. Virus attacks B. Fire attacks C. Unauthorised access D. Data driven attacks ANSWER: C 98. Which of the following describes programs that can run and disrupt computer communication? A. Viruses B. Worm C. Trojans D. Droppers ANSWER: B \dependently travel from system to system 99, are used in denial of service attacks typically ag A. Trojan horse B. Zombie C. Worm D. Virus ANSWER: B t targeted web sites 100. What is the name of the Act that governs internet usage in India”? A. The Internet consumption Act, 1998 B, The Information Technology Act, 2004 C. The IT Gazette of India Act, 2004 D. None of these ANSWER: B 101. A worm is A.A slimy pink thing that lives in dirt B. Pieces of malicious code that make copies of themselves and spread through computers without human interaction C. An unsolicited email message D. None ANSWER: B 102. Social engineering is: A. A website created for people who share common interests B. Scams distributed through email such as phishing, pharming and impersonation C. A targeted attack on a personal computer D. None ANSWER: B 103, What is the name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications? A. Worm B. Cracker C. Keylogger D. Trojan horses ANSWER: D 104, What kind of attempts is made by individuals to obtain confidential information from a person by falsifying their identity? A. Phishing scams. B. Computer virus C. Spyware scams D. None of the above ANSWER: A 105. Trademark can be used as domain name A. Yes B.No C. Yes in some cases D. None of the above ANSWER: A. 106. A digital signature needs a A. Private-key system B, Shared-key system C. Public-key system D. All of them ANSWER: C 107. One way to preserve inte, A. Bye-Rays B, Finger Print C. Biometric D. X-Rays ANSWER: B ty of a document is through use of a 108. A session symmetric key between two parties is used ‘A. Only once B. Twice C. Multiple times D. Conditions dependant ANSWER: A 109. Eneryption and decryption provide secrecy, or confidentiality, but not A. Authentication B. Integrity C. Privacy D. All of the above ANSWER: B 110. A digital signature is A. A scanned signature B. Signature in binary form C. Encrypting information D. Handwritten signature ANSWER: B 111. What is preferred way of encryption ? A. Pre shared secret key B, Using key distribution center (KDC) C. Public key-eneryption D. Symmetric key ANSWER: C 112. What is not a role of encryption ? A. It is used to protect data from unauthorized access during transmission B, It is used to ensure user authentication C. Itis used to ensure data integrity D. It is used to ensure data corruption doesn't happens ANSWER: D 113. What is a Hash Function ? A. It creates a small flexible block of data B. It creates a small, fixed block of data C. Itereates a encrypted block of data D. None of the mentioned ANSWER: B 114. What is role of Key Distribution Center ? A. Its used to distribute keys to everyone in world B. It intended to reduce the risks inherent in exchanging keys C. All of the mentioned D. None of the mentioned ANSWER: B 115. Which is the Act which provides legal framework for e-Governance in India? A. Indian Penal Code B. IT (amendment) Act 2008 C.IT Act - 2000 D. None of the above ANSWER: C 116. Which section of IT Act deals with the legal recognition of electronic records? A. Section 4 B. Section 2 C. Section 5 D. Section 6 ANSWER: A 117. What is the maximum penalty for damage to Computer, Computer systems, unauthorized access, download of data, infecting with virus, denial of access etc as per Section 43? A. Rs. 5 crore B.Rs. | crore C. Rs.75 lakh D. Rs. 50 lakh ANSWER: B. 118. Which Act in India focuses on data privacy and information technology? A. Banking Regulation Act 1949 B.IT Act 2000 C. Indian Penal Code D. IT (amendment) Act 2008 ANSWER: D 119. What is the time limit for filing appeal against the order of Cyber appellate tribunal? A. 30 days B, 90 days C. 60 days D. 45 days ANSWER: C 120, What is the punishment for hacking of computers ‘A. Three year imprisonment or 10 lakh rupees penalty or both B. Life Imprisonment C. Three year imprisonment or § lakh rupees penalty or both D. Three year imprisonment or 2 lakh rupees penalty or both ANSWER: C 121, What is the proposed punishment for Cyber Terrorism in IT Act? ‘A. | crore rupees penalty B. Life Imprisonment C. 10 year imprisonment D. 6 year imprisonment ANSWER: B 122. What is/are component of IT Act 2000 ‘A. Regulation of Certification Authorities B, Digital Certificates C. Legal Recognition to Digital Signatures D. All of the above ANSWER: D 123. Which of the following is an example of Intellectual property ? A. Trade Marks B. Copyright C. Patent D. All of the above ANSWER: D 124, Section 75 of the Indian Evidence Act, 1872 deals with A. Public documents B, Private documents C. Certified copies of Public documents D. Proof of other official documents ANSWER: B 12S. OECD stands for A. Organisation for Economic Cooperation Development B. Organisation for Economic Development C. Both a and b D. None of these ANSWER: A 126, What is internet? A. A single network B. A vast collection of different networks C. Interconnection of local area networks D. None of the mentioned ANSWER: B 127. Which one of the following protocol is not used in internet? A. HTTP B. DHCP C. DNS D. None of the mentioned ANSWER: D 128, Intellectual Property Rights (IPR) protect the use of information and ideas that are of A. Ethical value B. Moral value C. Social value D. Commercial value ANSWER: D 129. The following can not be exploited by as A, Patents B, Designs C. Trademark D. All of the above ANSWER: C igning or by licensing the rights to others 130. The following can be patented A. Machine B, Process C. Composition of matter D. All of the above ANSWER: D 131. Which of the following is not one of the three essential elements for a patent to be granted for an invention? A. Be a product B. Be new to the public C. Involve an inventive step D. Be capable of industrial application ANSWER: A 132. Which of following would not gain copyright protection? A.ADVD B. An unrecorded speech C, Written lyrics of a song D. A hand knitted jumper ANSWER: B 133. The law governing registered trade marks can be found in which Act? A. The Intellectual Property Act 1994 B. Copyright, Designs and Patents Act 1988 C. The Registered Trade Marks Act 1994 D. The Trade Marks Act 1994 ANSWER: D 134. Which one of the following is not one of the major types of e-commerce? A.C2B B. B2C C. B2B D.C2C ANSWER: A 135. Which of the following is not considered to be one of the three phases of e-commerce? A. Innovation B. Consolidation C. Preservation D. Reinvention ANSWER: C 136. A worm is designed to spread A, From computer to computer B, From file to file on a computer C. From Web site to Web site D. From Web site to computer ANSWER: A 137. Which of the following is not a dimension of e-commerce security provided by encryption? A. Availability B. Message integrity C. Non repudiation D. Confidentiality ANSWER: A. 138. The most widely used encryption standard is A. Advanced Encryption Standard (AES) B. Data Encryption Standard (DES) C. Universal Encryption Standard (UES) D. Optimal Eneryption Standard (OES) ANSWER: A. 139, Firewalls perform all of the following functions except A. Forbids communications from untrustworthy sources B. Allows communications from trustworthy sources C. Eliminates viruses and other malicious attacks D. Filters traflic based on packet attributes ANSWER: C 140. E-business can be defined as A. The uninhibited flow of information and goods on the Web B, The use of the Internet and the Web to transact business C. Digitally enabled transactions and processes within an organization D. Commercial transactions involving electronic goods ANSWER: C 141. All of the following are among the most common categories of spam except A. Fraud B, Commercial products C. Finance D. Health (drugs) ANSWER: A 142. The communication standard for sharing business documents and settlement information that emerged in the 1970s is called, D. BCB ANSWER: B 143. A firewall is a network security system based that controls incoming and outgoing network traffic based on a set of rules: A, Hardware B. Software C. Both hardware or software D. None of These ANSWER: C 144, Which among the following is correct A.A firewall is a system designed to prevent unauthorized access to or from a private network B, Firewalls can be implemented in both hardware and sofiware or a combination of both C. Both of Above D. None of These ANSWER: C 145. Which of the following concepts does NOT form part of the technical di A. Business networks B, Computer experts C. Anti-virus industry D. Computer networks ANSWER: A ‘ourse on cyber-security? 146, Technology no longer protected by copyright, available to everyone, is considered to be ‘A. Proprietary B. Open C. Experimental D. In the public domain ANSWER: A. 147, Indian evidence act includes A. Oral evidence B. Document evidence C. Electronic record D. Alll the above ANSWER: D 148, Presumption are given section of Evidence act ZO ORD EON 149. Law of evidence is A. Substantive law B. An adjective law C. Both a and b D. Neither a nor b ANSWER: B 150, A map or plan is A.A fact B. A document C, An evidence D. Done ANSWER: B Staff Name M.ASHMITHA.

You might also like