You are on page 1of 17

QUESTION BANK 100que

CYBER LAW Regular sem 6

1.In march 1999, which virus caused an estimated damage to US $80 million paralyzing email
system
A. CD universe
B. Melissa
C. Slammer
D. Nesses
Ans B

2Which of the following is not a type of cyber-crime?


A. Data theft
B. Forgery
C. Damage to data and systems
D. installing antivirus for protection
Ans D

3 Cognizable offences as described as


A. It is the offence in which a police officer can arrest the convict without the warrant.
B. It is a bailable offence.
C. The police officer is bound to register the FIR even with the permission of Magistrate.
D. FIR not submit
Ans A

4 Punishment for Breach of Confidentiality and Privacy of IT Act offence is


A. Imprisonment up to 2 years
B. Imprisonment up to 3 years
C. Imprisonment up to 5 years
D. Imprisonment up to 10 years
AnsA
5 Which are the grounds which section 80 covers
A. to commit
B. of not having committed
C. of committing
D. not to commit
Ans C

6 What is not the definition of Hacking


A. The gaining of unauthorized access to data in a system or computer.
B. Breaking into computer system
C. Deliberate deception to secure unfair or unlawful gain
D. valid concept
Ans C
7 Section 470 of IPC describes
A. Forgery for purpose of cheating
B. Forged document
C. Forgery for the purpose of harming reputation
D. Making forged document
Ans B

8 Who are not the authority for justice dispensation system for cybercrimes?
A. Controller of Certifying Authorities
B. Certifying Authority
C. High Court
D. Adjudicating Officer
Ans B

9 Which device or tool is used by cops to tackle cyber crime


A. Trace and Trap
B. GPS
C. Encryption
D. Bluetooth
Ans A

10 Injury done to the reputation of person is called as ___


A. Harassment
B. Defamation
C. Abuse
D. Damage
Ans B

11To be considered a computer crime, what needs to be involved in the crime.


A. Computers
B. Technology
C. Data
D. Networks
Ans A
12 Under which section of IT Act, stealing any digital asset or information is written a cyber-
crime.
A. Section 69
B. Section 65
C. Section 67
D. Section 70
Ans B

13 In which year India’s IT Act came into existence?


A. 2003
B. 2001
C. 2002
D. 2000
Ans D

14 IT Act 2008 makes cyber-crime details more precise where it mentioned if anyone publishes
sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a
legitimate amount of fine.
A. section 67-A
B. section 69-A
C. section 66-A
D. section 72-A
Ans A

15 Which one of the following elements is necessary for a contract ?


A. Autonomous Computer
B. Certainty of terms
C. Anonymous Computer
D. Incompetent Parties
Ans B

16 Which one of the following elements is necessary for a contract as a Competent Party ?
A. Autonomous Computer
B. Incompetent Parties
C. Anonymous Computer
D. Natural And Legal Operator
Ans D

17 An enforceable agreement created and signed in electronic form—that is to say, no paper or


other hard copies are used is called as
A. E Commerce
B. E contract
C. E Business
D. E Market
Ans B

18. An agreement becomes a contract if :


A. It is by free consent of the parties.
B. Parties are competent.
C. It is enforceable by law.
D. Acceptance
Ans C
19.Which one of the following elements is not necessary for a contract of E-Commerce ?
A. Entire Agreement
B. Warranties
C. Guarantee
D. Arbitration Clauses
Ans C

20 Which one of the following elements is not necessary to make agreement void?
A. Forbidden By law
B. Expiry of Specific Period
C. Infringe Right of Parties
D. Government Law Clause
Ans D

21.EDI stands for


A. Electronic Data Interchange
B. Electronic Data Intersect
C. Electronic Domain Interchange
D. Electronic Data Internet
Ans A

22 e-commerce transactions define


A. information access
B. non virtual enterprises
C. personal communication
D. intrapersonal communication
Ans A

23 the law of contract is stated in


A. indian contract act 1872
B. sale of good act 1930
C. indian contract act 1972
D. consumer act
Ans A

24 icon clicking is also known as


A. type and click
B. click wrap
C. take-it-or-leave-it
D. shrink wrap
Ans C

25 the person making proposal as per indian contract act is known as


A. promise
B. proposal
C. promisor
D. agreement
Ans C

26 section 4 and 5 of indian contract act stated


A. communication of offer
B. rejection
C. non revocation
D. admissibility
Ans A

27 What is the person called when they try to hurt a group of people with the use of a
computer?
A. Cyber Terrorist
B. Whitehat intruder
C. Cracker
D. Social Engineer
Ans A
28 What is the name of the IT law that India is having in the Indian legislature?
A. India’s Information Technology (IT) Act, 2000
B. India’s Technology (IT) Act, 2000
C. India’s Digital Information Technology (DIT) Act, 2000
D. The Technology Act, 2008
Ans A

29 Non cognizable offence is an offence in which a police-officer cannot arrest any person
without Notice
A. Warrant
B. Authority
C. Letter
D. permission
Ans B

30 The example of computer crime are:


A. Software creation
B. data check
C. Cracking
D. software licence
Ans C

31 a person who intended by originator to receive electronic record is


A. promisor
B. addressor
C. addressee
D. party
Ans C

32 confidentiality clause define


A. agreement
B. contract
C. document
D. seek to protect intellectual property
Ans D

33 arbitration agreement includes


A. document
B. no claim
C. communication
D. detailed work
Ans B

34 copyright act enacted in


A. 1958
B. 1957
C. 1956
D. 1960
Ans B

35 software licence is
A. exclusive right
B. non-exclusive
C. static
D. movable
Ans B

36 e-records based on which areas


A. time and place
B. receipt of information
C. Contract
D. time,
E. place and receipt
Ans D

37 section 12 and 13 of IT Act 2000 signifies


A. proposal
B. licence
C. contract formation
D. refusal of work
AnsC

38 software licence agreement based on


A. shrink wrap
B. click wrap
C. tender
D. agreement
Ans A

39 The risk of websites facing litigation in foregin lands thereby causing them____________.

A. Extreme Loss
B. Easy Hardship
C. Extreme Hardship
D. Extreme Competition
AnsC

40 Inconsistent and ___________ decisions of the courts on the applicability of the law of
jurisdiction to the cyber world.
A. Easy
B. Harsh
C. Regular
D. Pending
AnsB

41 The ___________ provide the power for a higher court to review a lower courts decision.
A. Pecuniary
B. Subject Matter
C. Territorial
D. Appellate
Ans D

42 The concept of ________________ has been explained by the courts time and again.
A. Cause of action
B. Law
C. Judgement
D. Remedy
AnsA

43_____________ means the whole bundle of material facts which are necessary for the
plaintiff to prove in order to entitle him to succeed in the suit.
A. Judgement
B. Cause of action
C. Subject Matter
D. Appellate
AnsB

44 Based on the principle of _____________ , the courts in India also have jurisdiction over
foreigners.
A. Cause of action
B. Subject Matter
C. Territorial
D. Appellate
AnsA

45 The ____________ also clarifies that the stipulated place of despatch and receipt of
electronic records is notwithstanding the fact that place where the computer resource is located.
A. IT Act 2000
B. IPC
C. Contract Act
D. The Repealing and Amending Act
AnsA

46 Our ________________ provides that a foreign judgement is conclusive on matters directly


adjudicated upon between the parties.
A. IT Act 2000
B. Criminal Procedure Code
C. Civil Procedure Code
D. Contract Act
AnsC

47Contractual and ___________ disputes are likely to dominate amongst the litigations, directly
or indirectly, arising out of , or in connection with, the internet and e-commerce.
A. IPR
B. Cyber Crime
C. Family
D. Business
AnsA

48.Which one of the following statements is not correct in relation to passing off?
A. The date goodwill should be assessed in a passing off action is the date the defendant's
acts, of which complaint is made, commenced
B. To be guilty of passing off a trader must have made a misrepresentation with the
intention of capturing some of the business of another trader
C. A trader has a property right in respect of the goodwill associated with his business
D. A trader guilty of passing off commits a tort
AnsB
49Napster and Its Cousins Case Related to
A. ideas
B. Music and broadcasts
C. Typological arrangements of published editions
D. Dramatic productions
AnsB
50 Napster and Its Cousins has developed system is called as
A. Peer to peer
B. Link to link
C. Share To Share
D. Host to Host
AnsA

51 Conclusion of an alternative for Napster


A. SongsPk
B. Digital Library
C. Digital Songs
D. Free Songs for All
AnsB

52.which section states income tax agreement with foreign countries


A. 90
B. 91
C. 92
D. 93
AnsA

53. taxation entities based upon


A. resident
B. ordinarily resident
C. not resident
D. perfect resident
AnsA

54 indian company act year


A. 1955
B. 1956
C. 1957
D. 1959
AnsB

55 which section provide a mechanism for collecting income tax


A. 160
B. 161
C. 160 and 161
D. 163
AnsC

56 section 3 of it act 2000 describes


A. authentication of electronic records
B. cryptosystem
C. security
D. decryption
Ans A

57 asymmetric cryptosystem is known as


A. public key cryptography
B. protected key cryptography
C. encryption
D. internal key encryption
Ans A

58 digital certificates are issued by


A. state government
B. certifying authority
C. judicial committee
D. magistrate
AnsB

59 revocation of digital signature certificate defined in


A. section 38
B. section 39
C. section 40
D. section 41
AnsA

60 Controller of Certifying Authoritiesnot


A. supervision
B. not certifying public keys
C. specifying qualifications
D. provide concept
AnsC

61 how much amount have to pay for licence of certificate


A. 24000
B. 25000
C. 20000
D. 23000
AnsB

62 securing digital signature mention in


A. section 10 of it act 2000
B. section 15 of it act 2000
C. section 11 of it act 2000
D. section 12 of it act 2000
AnsB

63 presumption as to electronic messages defines in section


A. 88 A
B. 88 B
C. 88 C
D. 88 D
Ans A

64 bankers books evidence act enacted in


A. 1891
B. 1892
C. 1893
D. 1894
AnsA

65 CPA stands for


A. consumer protection act
B. consumer profit act
C. consumer profitability act
D. customer concept
Ans A

66 consumer rights in CPA includes


A. right to deal
B. right to heard
C. right to part
D. right to destroy
AnsC

67 according to section 2(7) of sales of goods act,goods means


A. product
B. commodity
C. movable property
D. immovable property
AnsC
68complaint term
A. any fair trade
B. allegation
C. perfection
D. Acceptance
AnsB

69 who can file complaint according to act


A. dealer
B. supplier
C. customer
D. magistrate
AnsC

70 defect can be defined as


A. function
B. deficiency
C. perfection
D. Compliance
AnsB

71 unfair trade practice includes


A. false representation
B. compliance to prescribed standard
C. acceptance of goods
D. Service
AnsA

72 refusal of goods determine


A. output restraint on delivery
B. collusive tendering
C. false claim
D. true claim
AnsA

73 consumer protection act slogan is


A. grahak yojana
B. jago grahak jago
C. consumer awareness
D. customer
AnsB

74consumer forums consist


A. district forum
B. public forum
C. international forum
D. private forum
AnsA

75 section 9(16-19) defines


A. state commission
B. jurisdiction
C. national commission
D. judge
AnsA

76 When IT ACT 2000 came into effect?


A. 17 October, 2000
B. 11 November, 2000
C. 17 October, 2001
D. 11 November, 2001
AnsB

77 Which one of the following is outside the scope of IT Act 2000A.


A. Electronic gift
B. Power of Attorney with digital signature
C. Electronic message
D. Electronic Evidence
AnsB

78 The term Cyber Law means law governing _________


A. Electronic Transactions
B. Cyber Space
C. Electronic Commerce
D. cyber crime
AnsB

79.Which one is within the scope of IT ACT?


A. Trust
B. Electronic Agreement of sale of immovable property with digital signature
C. Will
D. Truncated Cheque
AnsD

80.Which act states the statement "80 Power of police officers and other officers to enter,
search etc."
A. Information Technology act 1990
B. Code of criminal procedure, 1973
C. Section 80 Information Technology act 2000
D. code of criminal procedure, 1974
AnsC

81.Non cognizable offence refers to what?


A. Police can take action
B. Police can file FIR
C. Police have no authority to apprehend a person for crime.
D. Police can arrest without warrant
AnsC

82.When the accused is found at a public place, all the IT Act offences would become
_____________.
non cognizable
criminal
Heinous
Cognizable

AnsD

83.What is full form of FIR ?


A. False information record
B. First Information Record
C. First information report
D. Future information report
AnsC

84.Arrest and investigation of offences under IT Act and other Cyber Crimes should be
conducted by whom?
A. A Police officer not below the rank of DGP
B. A Police officer not below the rank of DSP
C. A Police officer not below the rank of Sub Inspector
D. None of the Above
AnsB

85 What are the grounds of arrest as per section 80 of IT Act 2000?


A. of having committed
B. of commiting
C. of being about to commit
D. All of the above
AnsD
86 Which of the following statements are correct about cyber crime and cyber criminal?

A. Geographic distances and borders are relevant to cyber crime.


B. A cyber criminal sitting in one corner of the globe may hack into the victim's bank's
computer located in another corner.
C. A cyber criminal is here, there, everywhere and yet nowhere
D. None of the above

AnsB,C
87 A has committed the offence of hacking from his house, under IT Act section 66. Which of
the following statements is correct?
After committing offence,
A. A goes to a hotel. He can be arrested without warrant.
B. After committing the offence, he remains at home. He cannot be arrested without
warrant as per section 80.
C. Cannot be arrested at all.
D. Can be arrested only at public place

AnsA,B

88"If A from a cyber café in Mumbai, is alleged to have hacked the defence systems installed in
the computer network in the Defence Ministry at Delhi." Which of the following statements is
correct in this context.
A. He cannot be arrested without warrant , if he remains in cyber café or found in some
public place
B. He can be arrested without warrant , if he remains in cyber café or found in some public
place
C. He can be arrested without warrant , if he goes home
D. None of the above
AnsA

89 Cyber crime is criminal activity which can be conducted using what of the following?
A. Computer,
B. network or network device
C. Revolver
D. Using Internet
AnsA

90 How much time was taken by the famous "I Love You" virus to spread all over the globe?

A. 2 Hours
B. 2 Weeks
C. 1 Hour
D. 30 Minutes
AnsA

91 Who are Phreakers?


A. Who have knowledge of computer operations
B. Who have deep knowledge of internet and telecommunication systems.
C. Who have knowledge of high level languages.
D. Who have knowledge of cryptography
AnsB

92Who are the code hackers?


A. who have knowledge of telecommunication systems.
B. Those who have the knowledge of coding language.
C. Those who have knowledge of intricacies of computer systems and their operations.
D. Who have Knowledge of internet
AnsC

93 Hacking refers to __________


A. breaking into a house
B. breaking into computer system
C. breaking into a mobile phone
D. stealing information
AnsB

94 Which section 0f IT Act 2000 defines punishment for hacking?


A. 77(3)
B. 80(1)
C. 66(1)
D. 90(2)
AnsC

95 The offence of cheating in India is called ______.


A. 220
B. 320
C. 120
D. 420
AnsD

96 Cheating is defined in the Indian penal code under which section?


A. 678
B. 233
C. 415
D. 420
AnsC
97 Section 405, 406 are for which offence?
A. murder cheating
B. Criminal
C. breach of trust
D. cyber crime
AnsC

98.Types of ecommerce transactions include what of the following?


A. Information Access
B. Interpersonal communication
C. shopping services
D. All the above
AnsD

99 A _________ agreement is mostly found as part of the installation process of software


packages.
A. click-wrap
B. click-wrap contracts
C. Type and click
D. icon clicking
AnsA

100 The person making the proposal is called the ____


A. promiser
B. proposal maker
C. proposal acceptor
D. all of the above
AnsA

You might also like