You are on page 1of 14

Legal Reasoning (CLAT) Questions

- Samarth Udasin
Passage 1
According to Section 378 of the Indian Penal Code, 1860, theft is a crime against property.
Theft is defined as “dishonestly removing someone’s movable property from their possession
without that person’s consent.” Although it may result in unfair losses for the owner of the
stolen item, theft does not always result in unfair gains for the offender. A thief shares the
stolen goods with the public with the good faith aim of promoting public benefit, but they do
not transform the theft into a charitable act. Because it was an intentional act of dishonestly
removing someone’s moveable property from the property holder’s possession without that
person’s consent, it still qualifies as a theft.
Section 378 of the Indian Penal Code defines theft as “whoever, intending to dishonestly take
any moveable property out of the possession of any person, without that person’s consent,
moves that property in order to such taking, is said to commit theft”.
Consequently, Section 378’s explanations make it plain that everything is not movable
property and cannot be stolen as long as it is attached to the ground. But as soon as it is
severed or cut off from the earth, this thing is susceptible to theft. Theft may be defined as the
removal of property from the earth as a result of the same act. Additionally, it makes clear
that either express or implicit consent may be included in the definition. However, theft is not
committed when someone takes something from someone else without their permission and
honestly believes that they are entitled to it.

Q1. Ravi, a farmer, owns a piece of land on which he grows sugarcane. One day, he finds
out that his neighbour, Raju, has cut some of his sugarcane and taken it away without
his permission. Ravi confronts Raju and accuses him of theft. Raju denies the charge
and claims that he had a verbal agreement with Ravi’s father, who had passed away
recently, that he could take some sugarcane from Ravi’s land whenever he needed. Ravi
is not aware of any such agreement and does not believe Raju. He decides to file a
complaint against Raju for theft. Will Ravi succeed in his complaint?
A) Yes, because Raju dishonestly took the movable property out of Ravi’s possession without
his consent.
B) No, because Raju had the consent of Ravi’s father, who was the previous owner of the
land and the sugarcane.
C) No, because sugarcane is not movable property as long as it is attached to the earth and
cannot be stolen.
D) Yes, because sugarcane becomes movable property when it is severed or cut off from the
earth by the same act of taking.

Answer: D
Reference line: "But as soon as it is severed or cut off from the earth, this thing is susceptible
to theft. Theft may be defined as the removal of property from the earth as a result of the
same act." This supports the explanation for option D.

Explanation:
Option A: Yes, because Raju dishonestly took the movable property out of Ravi’s possession
without his consent.
This option correctly identifies the key elements of theft, which include dishonestly taking
movable property without the owner's consent. The passage defines theft as "dishonestly
removing someone’s movable property from their possession without that person’s consent."
Raju's actions of taking sugarcane without Ravi's permission align with this definition.
Option B: No, because Raju had the consent of Ravi’s father, who was the previous owner of
the land and the sugarcane.
This option highlights the concept of consent. The passage mentions that theft is not
committed when someone takes something without permission and honestly believes they are
entitled to it. However, in this case, the agreement was between Raju and Ravi's father, who
was the previous owner. Since Ravi is the current owner and is not aware of any such
agreement, Raju's claim of consent from Ravi's father may not be valid.
Option C: No, because sugarcane is not movable property as long as it is attached to the earth
and cannot be stolen.
This option references the passage's explanation that not everything attached to the earth is
considered movable property until it is severed or cut off from the earth by the same act. The
passage states, "Consequently, Section 378’s explanations make it plain that everything is not
movable property and cannot be stolen as long as it is attached to the ground." Since
sugarcane becomes movable property when severed from the earth, this option is incorrect.
Option D: Yes, because sugarcane becomes movable property when it is severed or cut off
from the earth by the same act of taking.
This option accurately reflects the principle outlined in the passage. The passage explains,
"The nature of the movable property may vary depending on whether it is attached to the
earth or not. If the property is attached to the earth, it cannot be stolen unless it is severed or
cut off from the earth by the same act of taking." Since Raju severed and took the sugarcane
from Ravi's land, it qualifies as movable property and can be considered theft.

Q2. Suresh, a shopkeeper, sells mobile phones in his shop. He has a display case where
he keeps some of the models for customers to see and try. One day, he notices that one of
his display phones is missing. He checks the CCTV footage and finds out that a
customer, Amit, had taken the phone out of the display case and put it in his pocket
while Suresh was busy attending another customer. Suresh decides to file a complaint
against Amit for theft. Will Suresh succeed in his complaint?
A) Yes, because Amit dishonestly took the movable property out of Suresh’s possession
without his consent.
B) No, because Suresh still had possession of the phone as it was in his shop premises.
C) Yes, because Amit moved the phone in order to take it out of Suresh’s possession without
his consent.
D) No, because Amit did not intend to dishonestly take the phone but only wanted to try it.

Answer: A
Reference line: "The intention of the offender to dishonestly take the movable property is an
essential element of theft." This supports the explanation for option A.
Explanation:
Option A: Yes, because Amit dishonestly took the movable property out of Suresh’s
possession without his consent.
This option correctly identifies the key elements of theft, which include dishonestly taking
movable property without the owner's consent. In the scenario, Amit took the display phone
without Suresh's permission and put it in his pocket while Suresh was occupied with another
customer. This aligns with the definition of theft mentioned in the passage: "whoever,
intending to dishonestly take any moveable property out of the possession of any person,
without that person’s consent, moves that property in order to such taking, is said to commit
theft."
Option B: No, because Suresh still had possession of the phone as it was in his shop
premises.
This option considers the concept of possession. While the phone was on Suresh's shop
premises, the passage defines theft as the removal of movable property from a person's
possession without their consent. The fact that the phone was taken out of the display case
and put into Amit's pocket indicates that Suresh's possession of the phone was compromised,
thus making this option incorrect.
Option C: Yes, because Amit moved the phone in order to take it out of Suresh’s possession
without his consent.
This option highlights the act of moving the property as a precursor to taking it out of the
owner's possession. The passage explains that the act of moving property with the intention to
dishonestly take it out of someone's possession constitutes theft. However, this option doesn't
directly address Amit's intent to dishonestly take the phone, making it less accurate than
option A.
Option D: No, because Amit did not intend to dishonestly take the phone but only wanted to
try it.
This option focuses on Amit's intent. The passage emphasizes that theft requires the
offender's intention to dishonestly take the movable property. While Amit may have initially
wanted to try the phone, the act of putting it in his pocket without permission indicates an
intention to take possession of the phone. The passage states: "The intention of the offender
to dishonestly take the movable property is an essential element of theft." Thus, this option is
not accurate.
Q3. Priya, a college student, borrows a laptop from her friend, Neha, for a week. She
returns it after a week as promised. However, she does not tell Neha that she had copied
some of Neha’s personal files from the laptop to her pen drive without Neha’s
knowledge or permission. Priya later uses those files for her own benefit. Has Priya
committed theft?
A) Yes, because Priya dishonestly took Neha’s movable property out of her possession
without her consent.
B) No, because Priya had Neha’s consent to borrow the laptop and did not take it out of her
possession.
C) Yes, because Priya moved Neha’s files from the laptop to her pen drive in order to take
them without her consent.
D) No, because Priya did not take any physical object from Neha but only copied some data.

Answer: C
Reference line: "whoever, intending to dishonestly take any moveable property out of the
possession of any person, without that person’s consent, moves that property in order to such
taking, is said to commit theft." This supports the explanation for option C.
Explanation:
Option A: Yes, because Priya dishonestly took Neha’s movable property out of her possession
without her consent.
This option correctly identifies the act of dishonestly taking movable property without
consent, which is a key element of theft. However, in this scenario, Priya did not physically
take the laptop itself out of Neha's possession. Instead, she copied files from the laptop onto
her pen drive. Therefore, this option is not applicable.
Option B: No, because Priya had Neha’s consent to borrow the laptop and did not take it out
of her possession.
This option highlights the concept of consent. Priya indeed had Neha's consent to borrow the
laptop, but the question is about whether copying files without permission constitutes theft.
While Priya borrowed the laptop with consent, her actions of copying files without Neha's
knowledge or permission could still potentially be considered theft.
Option C: Yes, because Priya moved Neha’s files from the laptop to her pen drive in order to
take them without her consent.
This option correctly identifies the act of moving property in order to take it without consent.
Priya's actions of copying Neha's files from the laptop to her pen drive can be seen as moving
those files with the intention of taking them without Neha's permission. This aligns with the
definition of theft, as the passage states, "whoever, intending to dishonestly take any
moveable property out of the possession of any person, without that person’s consent, moves
that property in order to such taking, is said to commit theft."
Option D: No, because Priya did not take any physical object from Neha but only copied
some data.
This option emphasizes the lack of physical taking of an object. However, the passage doesn't
strictly limit theft to physical objects. It mentions "dishonestly removing someone's movable
property," which can include both physical items and data. The passage doesn't exclude the
possibility of theft involving digital or intangible property.

Q4. Rohan, a carpenter, works for a furniture company. He makes a wooden table for a
customer and delivers it to his house. The customer pays him for his work and thanks
him. Rohan leaves but forgets to take his toolbox with him. He realizes his mistake after
reaching his workshop and calls the customer to ask him to keep his toolbox safe until
he comes back to collect it. The customer agrees but secretly decides to keep the toolbox
for himself as he likes it. He does not answer Rohan’s calls or messages when Rohan
tries to contact him again. Has the customer committed theft?
A) Yes, because the customer dishonestly took Rohan’s movable property out of his
possession without his consent.
B) No, because Rohan voluntarily left his toolbox at the customer’s house and did not have
possession of it.
C) Yes, because Rohan still had possession of his toolbox as he did not intend to part with it
and asked the customer to return it.
D) No, because Rohan did not move his toolbox in order to take it out of the customer’s
possession.

Answer: C
Reference line: "Whoever, intending to dishonestly take any moveable property out of the
possession of any person, without that person’s consent, moves that property in order to such
taking, is said to commit theft." This passage reference supports the explanations for options
A, C, and D.
Explanation:
Option A: Yes, because the customer dishonestly took Rohan’s movable property out of his
possession without his consent.
This option correctly identifies the key elements of theft, which include dishonestly taking
movable property out of the owner's possession without their consent. In this case, Rohan
forgot his toolbox but later contacted the customer to keep it safe until he could retrieve it. If
the customer decides to keep the toolbox for himself despite Rohan's request, it could be
considered theft.
Option B: No, because Rohan voluntarily left his toolbox at the customer’s house and did not
have possession of it.
This option focuses on the concept of voluntary possession. If Rohan left his toolbox at the
customer's house intentionally and voluntarily, it might be argued that he no longer had direct
possession of it. However, the passage's definition of theft requires the movable property to
be taken out of the possession of the owner. In this scenario, since Rohan called the customer
to ask for the toolbox back, he still maintains an interest in it.
Option C: Yes, because Rohan still had possession of his toolbox as he did not intend to part
with it and asked the customer to return it.
This option correctly points out that Rohan's intention to retrieve his toolbox maintains his
ownership and possession over it. The passage emphasizes that movable property must be
taken out of the possession of the owner. In this case, despite Rohan accidentally leaving the
toolbox, his intention to reclaim it keeps his possession intact.
Option D: No, because Rohan did not move his toolbox in order to take it out of the
customer’s possession.
This option highlights the movement of the property as a crucial element. However, the
passage's definition of theft doesn't explicitly require the owner to move the property. It
emphasizes the act of dishonestly taking movable property out of the owner's possession.
Whether or not the property was physically moved by Rohan isn't the primary consideration
here.
Q5. Rani, a social worker, visits an orphanage and distributes some toys and books to
the children. She notices that one of the children, Ravi, does not have any toy or book.
She feels sorry for him and decides to give him one of the toys that she had bought for
her own son. She takes the toy from her car and gives it to Ravi. Ravi is very happy and
thanks her. Rani’s son, Raj, who was waiting in the car, sees this and gets angry. He
accuses Rani of theft and demands his toy back. Has Rani committed theft?
A) Yes, because Rani took Raj’s movable property out of his possession without his consent.
B) No, because Rani had the consent of her son to use his toy as she had bought it for him.
C) Yes, because Rani moved Raj’s toy in order to give it to Ravi without Raj’s consent.
D) No, because Rani honestly believed that she had a lawful right to give the toy to Ravi as
she was his mother.
Answer: D
Reference line: "However, theft is not committed when someone takes something from
someone else without their permission and honestly believes that they are entitled to it." This
supports the explanation for option D.
Explanation: Option A: Yes, because Rani took Raj’s movable property out of his possession
without his consent.

This option correctly identifies the key elements of theft, including taking movable property
without consent. However, the passage provides a context where the belief of the offender
about their right to take the property can affect their liability for theft. Since Rani's case
involves certain circumstances, we need to consider the aspect of lawful right.
Option B: No, because Rani had the consent of her son to use his toy as she had bought it for
him.
While this option considers the consent aspect, it doesn't account for the situation where Rani
gives the toy to another child. The passage explains that theft is not committed when
someone honestly believes they have a lawful right to take the property. The situation goes
beyond the consent given for use; it involves the transfer of ownership.
Option C: Yes, because Rani moved Raj’s toy in order to give it to Ravi without Raj’s
consent.
This option focuses on the movement of the toy, but it doesn't address the belief of the
offender about their right to take the property, which is crucial in determining theft as per the
passage's explanation.
Option D: No, because Rani honestly believed that she had a lawful right to give the toy to
Ravi as she was his mother.
This option accurately reflects the principle outlined in the passage. The passage states, "The
belief of the offender about their right to take the movable property may affect their liability
for theft. If the offender honestly believes that they have a lawful right to take the property,
there is no theft." Since Rani believed that she had a right to give the toy to Ravi for a
compassionate reason, it is likely that she did not commit theft.

Passage 2
Cyber extortion, also known as cyber blackmail, is an illegal practice conducted by a person
who holds crucial personal, professional, or commercial data in his possession. The person
who does this illegal digital crime is known as a “cyber extortionist.” In every case, such a
person holds crucial data hostage with the motive to demand a ransom, either in cash or in
another form. This practice takes a criminal turn when the hacker threatens the victim to leak
the data among the public if the ransom is not paid within a strict time deadline. The data kept
as hostage can be of any type; it can be either personal photos, videos, commercial trade
secrets, or an organisation’s upcoming projects, blueprints, or information.
For example, there’s a man named A who hacks into the systems of Coca-Cola companies.
Now he has access to its secret recipe for the Coca-Cola soft drink. Now, A threatens the
company with having to pay a heavy ransom for the recipe’s restoration, or else it would be
leaked into the public domain or even sent to other competitors.
Cybercriminals typically carry out cyber extortion by either blocking access to the victim’s
computer or overloading its network by running or introducing a large amount of traffic. In
cases of heavy traffic on the network, the victim is not able to run his or her business at all
since the network usually fails to load because of the ongoing traffic. The victim suffers from
the inability to operate his business; additionally, he incurs significant expenditure on its
restoration, which is also a lengthy process that drains the finances of the business.
In the case of cyber extortion, as mentioned above, the victim is forced to pay a ransom,
usually in monetary terms, or else his crucial data, whether personal or commercial, is leaked
to the public, which can be adverse for the victim. Moreover, in such cases, the victim cannot
contact the authorities for the required help because there is a great risk of losing his/her
vitally private information on social networking sites to the public. As a result, it can be
understood that cyber extortion or blackmail is one of the most deterrent forms of cruelty in
the form of crime, which hinders and violates the very principle of privacy and poses the
victim with great mental and physical torture.
Cyber blackmailing operates in Indian jurisdictions as well. It is termed “digital crime,”
where a person hacks into the system and seizes or holds over sensitive files or information
and, in return for its safe release, demands a ransom. Hackers commit cyber extortion by first
targeting systems and then attacking the weaknesses and flaws in an organisation’s security
system.
For example, in the normal operation of a business, the CEO of the company sends his
employee a trade secret relating to the new line of men’s deodorants. He sends this sensitive
information over email. Here, the hacker would hack into the company’s official email
account, which is used by the CEO, and catch hold of the information, thereby demanding
ransom. Furthermore, hackers target a company’s official surveys and systems in order to
steal more sensitive information for a higher ransom.

Q1. Arun, a software engineer, works for a reputed IT company. He is assigned to work
on a project for a client who is developing a new mobile application. Arun is given
access to the client’s server where he can upload his code and test the application. One
day, he receives an email from an unknown sender who claims to have hacked into the
client’s server and downloaded the entire source code of the application. The sender
threatens to leak the code to the client’s competitors or post it online unless Arun pays
him a ransom of 10 lakh rupees within 24 hours. Arun is shocked and scared. He does
not know what to do. Has Arun been a victim of cyber extortion?
A) Yes, because the sender has held Arun’s professional data hostage and demanded a ransom
for its release.
B) No, because the sender has not blocked access to Arun’s computer or overloaded his
network.
C) Yes, because the sender has exploited the weakness in the client’s security system and
hacked into the server.
D) No, because the sender has not taken any physical object from Arun but only copied some
code.
Answer: A
Reference Line: "In every case, such a person holds crucial data hostage with the motive to
demand a ransom, either in cash or in another form."
Explanation:
A) Yes, because the sender has held Arun’s professional data hostage and demanded a ransom
for its release.
This option is correct. It aligns with the definition of cyber extortion provided in the passage,
which states that cyber extortion involves holding crucial data hostage and demanding a
ransom for its release. In this case, Arun's professional data (the source code of the
application) has been held hostage, and a ransom has been demanded.
B) No, because the sender has not blocked access to Arun’s computer or overloaded his
network.
This option is not correct. While blocking access to a computer or overloading a network are
common tactics in cyber extortion, they are not the only methods. The passage states that
cybercriminals typically carry out cyber extortion by blocking access or overloading
networks, but it also mentions that cyber extortion involves holding crucial data hostage. In
Arun's case, the crucial data (the source code) has been held hostage, even though access to
his computer or network has not been blocked.
C) Yes, because the sender has exploited the weakness in the client’s security system and
hacked into the server.
This option is partially correct. It correctly identifies the exploitation of a security system
weakness and hacking into the server, which are common tactics in cyber extortion. However,
it doesn't directly address the fact that Arun's professional data has been held hostage, which
is a key aspect of cyber extortion.
D) No, because the sender has not taken any physical object from Arun but only copied some
code.
This option is not correct. Cyber extortion does not require the physical removal of objects; it
revolves around the illegal act of holding crucial data hostage and demanding a ransom for its
release. In this case, the sender has threatened to leak the source code, which constitutes
holding Arun's professional data hostage.

Q2. Neha, a fashion blogger, has a popular Instagram account where she posts pictures and
videos of her outfits and makeup. She has a large number of followers who admire her style
and beauty. One day, she receives a message from a user who claims to have hacked into her
Instagram account and accessed her private photos and videos. The user threatens to post
them online or send them to her family and friends unless Neha pays him a ransom of 5 lakh
rupees within 12 hours. Neha is terrified and embarrassed. She does not want anyone to see
her private photos and videos. She does not know what to do. Has Neha been a victim of
cyber extortion?
A) Yes, because the user has held Neha’s personal data hostage and demanded a ransom for
its release.
B) No, because the user has not blocked access to Neha’s computer or overloaded her
network.
C) Yes, because the user has violated Neha’s privacy and caused her mental and physical
torture.
D) No, because the user has not taken any physical object from Neha but only copied some
photos and videos.
Answer: C
Reference Line: "As a result, it can be understood that cyber extortion or blackmail is one of
the most deterrent forms of cruelty in the form of crime, which hinders and violates the very
principle of privacy and poses the victim with great mental and physical torture."
Explanation:
A) Yes, because the user has held Neha’s personal data hostage and demanded a ransom for
its release.
This option correctly identifies the key elements of cyber extortion, which involve holding
personal data hostage and demanding a ransom for its release. In this case, the user has
threatened to release Neha's private photos and videos unless she pays a ransom.
B) No, because the user has not blocked access to Neha’s computer or overloaded her
network.
This option is not correct. While blocking access to a computer or overloading a network are
common tactics in cyber extortion, they are not the only methods. The passage suggests that
cyber extortion encompasses various forms of holding crucial data hostage and demanding a
ransom. In this case, Neha's private photos and videos are being held hostage, even though
her computer or network access has not been blocked.
C) Yes, because the user has violated Neha’s privacy and caused her mental and physical
torture.
This option is correct. It addresses the broader consequences of cyber extortion, including the
violation of privacy and the mental and physical torture experienced by the victim. In this
case, Neha is terrified and embarrassed due to the threat of her private photos and videos
being made public.

D) No, because the user has not taken any physical object from Neha but only copied some
photos and videos.
This option is not correct. Cyber extortion does not require the physical removal of objects; it
primarily revolves around the illegal act of holding crucial data hostage and demanding a
ransom for its release. In this case, the user has threatened to reveal private photos and
videos, which constitutes a form of holding personal data hostage.
Q3. Ramesh, a businessman, owns a jewellery store. He has a website where he displays
his products and offers online delivery. He also has a CCTV system that records the
activities in his store. One day, he receives an email from an unknown sender who
claims to have hacked into his website and CCTV system. The sender threatens to delete
all his product images and videos from his website and erase all his CCTV footage
unless Ramesh pays him a ransom of 20 lakh rupees within 48 hours. Ramesh is
worried and angry. He does not want to lose his online business or his security records.
He does not know what to do. Has Ramesh been a victim of cyber extortion?
A) Yes, because the sender has held Ramesh’s commercial data hostage and demanded a
ransom for its release.
B) No, because the sender has not blocked access to Ramesh’s computer or overloaded his
network.
C) Yes, because the sender has moved Ramesh’s data from his website and CCTV system in
order to take it without his consent.
D) No, because the sender has not taken any physical object from Ramesh but only deleted
some data.
Answer: C
Reference Line: "The movable property must be moved by the offender in order to take it."
Explanation:
A) Yes, because the sender has held Ramesh’s commercial data hostage and demanded a
ransom for its release.
This option is partially correct. It correctly identifies the act of holding Ramesh's commercial
data hostage and demanding a ransom. However, it does not directly address whether the data
has been moved or taken by the sender, which is an important aspect mentioned in the
passage.
B) No, because the sender has not blocked access to Ramesh’s computer or overloaded his
network.
This option is not correct. While blocking access to a computer or overloading a network are
common tactics in cyber extortion, they are not the only methods. The passage mentions that
cyber extortion involves holding crucial data hostage, and in this case, the sender has
threatened to delete Ramesh's product images and CCTV footage, which constitutes holding
his data hostage.
C) Yes, because the sender has moved Ramesh’s data from his website and CCTV system in
order to take it without his consent.
This option is correct. It accurately identifies that the sender has taken action to move
Ramesh's data from his website and CCTV system without consent, which aligns with the
concept of cyber extortion as mentioned in the passage.
D) No, because the sender has not taken any physical object from Ramesh but only deleted
some data.
This option is not correct. Cyber extortion does not require the physical removal of objects; it
revolves around the illegal act of holding crucial data hostage and demanding a ransom for its
release. In this case, the sender has threatened to delete Ramesh's data, which constitutes
holding it hostage.
Overall, option C is the most accurate because it directly addresses the key element of cyber
extortion mentioned in the passage: the movement or taking of data without consent while
demanding a ransom for its release.

Q4. Anjali, a journalist, works for a leading newspaper. She is working on an


investigative report on a corruption scandal involving a politician. She has collected
some evidence and documents that prove the politician’s involvement in the scam. She
stores them in her laptop and also uploads them to her cloud storage account as a
backup. One day, she receives an email from an unknown sender who claims to have
hacked into her laptop and cloud storage account. The sender threatens to destroy all
her evidence and documents unless Anjali pays him a ransom of 15 lakh rupees within
36 hours. Anjali is shocked and furious. She does not want to lose her hard work or
compromise her report. She does not know what to do. Has Anjali been a victim of
cyber extortion?
A) Yes, because the sender has held Anjali’s professional data hostage and demanded a
ransom for its release.
B) No, because the sender has not blocked access to Anjali’s computer or overloaded her
network.
C) Yes, because the sender has hacked into Anjali’s system and exploited the weakness in her
security system.
D) No, because the sender has not taken any physical object from Anjali but only destroyed
some data.
Answer: A
Reference Line: "In every case, such a person holds crucial data hostage with the motive to
demand a ransom, either in cash or in another form."
Explanation:
A) Yes, because the sender has held Anjali’s professional data hostage and demanded a
ransom for its release.
This option is correct. It aligns with the definition of cyber extortion provided in the passage,
which states that cyber extortion involves holding crucial data hostage and demanding a
ransom for its release. In this case, Anjali's professional data (evidence and documents related
to her investigative report) has been held hostage, and a ransom has been demanded.
B) No, because the sender has not blocked access to Anjali’s computer or overloaded her
network.
This option is not correct. Cyber extortion does not solely rely on blocking access or
overloading networks. It involves holding crucial data hostage and demanding a ransom. In
Anjali's case, her important investigative data has been held hostage, which fits the definition
of cyber extortion.
C) Yes, because the sender has hacked into Anjali’s system and exploited the weakness in her
security system.
This option is partially correct. It correctly identifies the hacking and exploitation of security
system weaknesses, which are common tactics in cyber extortion. However, it doesn't directly
address the fact that Anjali's professional data has been held hostage, which is a key aspect of
cyber extortion.
D) No, because the sender has not taken any physical object from Anjali but only destroyed
some data.
This option is not correct. Cyber extortion does not require the physical removal of objects; it
revolves around the illegal act of holding crucial data hostage and demanding a ransom for its
release. In this case, the sender has threatened to destroy Anjali's important data, which
constitutes holding her professional data hostage.
Overall, option A is the most accurate because it directly addresses the key elements of cyber
extortion mentioned in the passage: holding data hostage and demanding a ransom for its
release.

Q5. Rajesh, a photographer, works for a magazine. He is assigned to cover a fashion


show where he takes some pictures of the models and celebrities. He also takes some
candid shots of them backstage without their knowledge or permission. He plans to sell
them to a gossip website for a high price. However, before he can do that, he receives an
email from an unknown sender who claims to have hacked into his camera and laptop
and accessed his pictures. The sender threatens to expose Rajesh’s unethical behaviour
to the magazine and the models and celebrities unless Rajesh pays him a ransom of 25
lakh rupees within 72 hours. Rajesh is scared and ashamed. He does not want to lose his
job or reputation. He does not know what to do. Has Rajesh been a victim of cyber
extortion?
A) Yes, because the sender has held Rajesh’s professional data hostage and demanded a
ransom for its release.
B) No, because Rajesh did not have any lawful right to take the pictures of the models and
celebrities without their consent.
C) Yes, because the sender has violated Rajesh’s privacy and caused him mental and physical
torture.
D) No, because the sender has not blocked access to Rajesh’s computer or overloaded his
network.
Answer: B
Reference Line: The passage doesn't provide a direct reference for this option, but it aligns
with the concept that cyber extortion typically involves holding legitimate data hostage,
which doesn't apply when the initial actions were unethical or illegal.
Explanation:
A) Yes, because the sender has held Rajesh’s professional data hostage and demanded a
ransom for its release.
This option is not correct. While it mentions holding professional data hostage and
demanding a ransom, it overlooks the crucial point that Rajesh's actions were unethical and
possibly illegal in the first place (taking candid shots without consent). Cyber extortion
typically involves the illegal act of holding legitimate data hostage, which doesn't seem to
apply here.
B) No, because Rajesh did not have any lawful right to take the pictures of the models and
celebrities without their consent.
This option is correct. It acknowledges that Rajesh's initial actions were unethical and
possibly unlawful since he took pictures without the consent of the models and celebrities. In
this context, the sender's threat to expose Rajesh's unethical behavior doesn't constitute cyber
extortion since Rajesh didn't have a lawful right to the pictures in the first place.
C) Yes, because the sender has violated Rajesh’s privacy and caused him mental and physical
torture.
This option is not entirely correct. While it mentions privacy violations and mental and
physical torture, it doesn't directly address the elements of cyber extortion as described in the
passage, which involve holding data hostage and demanding a ransom.
D) No, because the sender has not blocked access to Rajesh’s computer or overloaded his
network.
This option is not relevant to the situation described. It focuses on technical aspects of cyber
extortion (blocking access or overloading networks), which do not apply in Rajesh's case.
In this scenario, option B is the most accurate because it correctly identifies that Rajesh's
initial actions were unethical and possibly illegal, which makes the situation different from
traditional cyber extortion cases where legitimate data is held hostage.

You might also like