Professional Documents
Culture Documents
Screenshot 2022-11-16 at 9.32.23 PM
Screenshot 2022-11-16 at 9.32.23 PM
Marks : 100
55. Which one of following is NOT a compoundable fuEufyf[kr esa ls dkSu lk lwpuk
offence under the Information Technology Act izkS|ksfxdh vf/kfu;e 2000 ds
2000? v/khu ‘keuh; vijk/k ugha gSa\
(i) Offences with imprisonment for a term (i) ,sls vijk/k ftlesa rhu o”kZ
exceeding three years ls vf/kd dh dSn gks
(ii) Enhanced punishment due to previous
(ii) fiNyh nks”k flf) ds dkj.k
conviction
(iii) Offences affecting the socio-economic c<k;k x;k naM
conditions of the country (iii) ,sls vijk/k] tks ns’k dh
lkekftd&vkfFkZd ifjfLFkfr;ksa
Which one of the following is correct? dks izHkkfor djrs gksa
fuEukafdr esa ls dkSu lk lgh gS\
a) (iii) alone is correct a) dsoy (iii) lgh gS
b) (i) and (iii) are correct b) (i) rFkk (iii) lgh gS
c) (ii) and (iii) are correct c) (ii) rFkk (iii) lgh gS
d) (i), (ii) and (iii) are correct d) (i), (ii) rFkk (iii) lgh gS
56. Under which sections of Information Technology lwpuk izkS|ksfxdh vf/kfu;e] 2000
Act 2000, the case can be registered for Credit dh dkSu lh /kkjkvksa ds varxZRk
Cards Fraud and Internet fraud in India? Hkkjr esa dzsfMV dkMZ QzkM o baVjusV
a) Sections 66A & 66B QzkM ds ekeysa ntZ djk, tk ldrs
b) Sections 66C & 66D gSa\
c) Sections 66E & 66F
a) /kkjk 66A rFkk 66B
d) None of the above
b) /kkjk 66C rFkk 66D
c) /kkjk 66E rFkk 66F
57. Which of the following Acts is not amended by the fuEufyf[kr esa ls dkSu lk
Information Technology (Amendment) Act, vf/kfu;e lwpuk izkS|ksfxdh
2008? ¼la’kks/ku½ vf/kfu;e] 2008 ds }kjk
a) Indian Penal Code, 1860 la’kksf/kr ugha gSa\
b) Indian Evidence Act, 1872 a) Hkkjrh; naM lafgrk 1860
c) Income Tax Act, 1961
b) Hkkjr lk{; vf/kfu;e]
d) Reserve Bank of India Act, 1934
1872
c) vk;dj vf/kfu;e] 1961
d) Hkkjrh; fjtoZ cSad vf/kfu;e]
1934
58. As per section 13 of the Information Technology lwpuk izkS|ksfxdh ¼la’kks/ku½
(Amendment) Act, 2008, the time of dispatch or vf/kfu;e] 2008 dh /kkjk 13 ds
receipt of an electronic record shall be determined vuqlkj bysDVªkfud vfHkys[k dh
as follows, namely- izkfIr o izs”k.k dk le; fuEukuqlkj
(i) The dispatch of an electronic record occurs fu/kkZfjr fd;k tk,xk ;Fkk&
when it enters a computer resource outside
(i) bysDVªkfud vfHkys[k dk izs{k.k
the control of originator
(ii) The receipt of an electronic record occurs rc gksrk gS tc ;g izs”k.k ds
when it is sent by originator to the targeted fu;a=.k ds ckgj fdlh
computer dEI;wVj lalk/ku esa izos’k
(iii) The receipt occurs at the time when the djrk gS
electronic record enters the computer (ii) bysDVªkfud vfHkys[k dh izkfIr
resource designated by the addressee rc gksrh gS tc izs”kd }kjk
(iv) The receipt occurs at the time when the fdlh yf{kr dEI;wVj dks ;g
electronic record is retrieved by the Hkstk tkrk gS
addressee if the computer resource is not (iii) ml le; izkIr gksuk ekuk
designated
tkrk gS tc ;g bysDVªkfud
In view of above, which one of the
following statements is correct:
vfHkys[k izsf”kfr }kjk fufnZ”V
a) (i), (ii) and (iii) are correct, dEI;wVj lalk/ku esa vkrk gS
b) (i), (ii) and (iv) are correct, (iv) ;fn dEI;wVj lalk/ku fdlh
c) (i), (iii) and (iv) are correct, dks ukfer ugha gS rks ;g
d) (ii), (iii) and (iv) are correct ml le; izkIr gksuk ekuk
tkrk gS tc iszf”kfr }kjk
bysDVªkfud vfHkys[k fjfVªo
fd;k x;k gks
mijksDrkuqlkj fuEu esa dkSu lk
dFku lgh gS%&
a) (i), (ii) rFkk (iii) lgh gS]
b) (i), (ii) rFkk (iv) lgh gS]
c) (i), (iii) rFkk (iv) lgh gS]
d) (ii), (iii) rFkk (iv) lgh gS
59. As per section 12 of the Information Technology lwpuk izkS|ksfxdh ¼la’kks/ku½
(Amendment) Act, 2008, which one of the vf/kfu;e] 2008 dh /kkjk 12 ds
following statements regarding method of vuqlkj fuEufyf[kr dFkuksa esa ls
acknowledgement of receipt of electronic record is dkSu lk dFku bysDVªkWfud fjdkMZ dh
not correct: ikorh dh iz.kkyh ds laca/k esa lgh
a) If the originator has not agreed that
acknowledgement of receipt of electronic
ugha gS%
record be given in a particular form of a) ;fn ewy izs”kd lger ugha
method, an acknowledgement may be gS fd bySDVªkWfud fjdkMZ dh
given by any communication by the izkfIr dh vfHkLohd`fr fdlh
addressee, automated or otherwise, fof’k”V iz.kkyh ds :Ik eas nh
b) If the originator has not agreed as above tk, rks ikus okys ds }kjk]
(a), an acknowledgement may be given by vkVksesfVM ;k fdlh vU;
any communication by any conduct of the
Paper Code- 08, Set – A Page 20 of 33
addressee, sufficient to indicate to the rjhds ls] fdlh Hkh lapkj
originator that the electronic record has ek/;e ls ikorh dh tk
been received, ldrh gS
c) If the originator has stipulated that the b) ;fn ewy izs”kd mi;qZDr (a) ls
electronic record shall be binding only lger ugha gS rks ikus okys
receipt of acknowledgement, then unless
acknowledgement has been so received,
dks fdlh Hkh lapkj ek/;e
the electronic record shall be deemed to ls fdlh Hkh lapkyu }kjk
have never sent by the originator, ikorh nh tk ldrh gS izs"kd
d) Out of above statements, only (a) and (b) dks ;g lwfpr djuk i;kZIr
are true gksxk fd bysDVªkfud fjdkMZ
izkIr dj fy;s x;s gSa
c) ;fn izs”kd us ;g vuqca/k
fd;k gS fd bysDVªkfud
vfHkys[k dsoy ikorh dh
izkfIr ds fy;s ck/; gksxk rc
tc rd ikorh ugha gksrh gS
rks ekuk tk,xk fd ewy
izs”kd }kjk izsf”kr bySDVªkfud
fjdkMZ izsf”kr gh ugha fd;k
tk,xk
d) mi;qZDRk dFkuksa esa ls] dsoy
(a) rFkk (b) lR; gS
60. As per section 65 of the Information Technology lwpuk izkS|ksfxdh ¼la’kks/ku½
(Amendment) Act, 2008, the act of cyber terrorism vf/kfu;e] 2008 ds vuqlkj
includes: lkbZcj vkradokn ds d`R; esa ‘kkfey
a) The conducts with intention to threaten the gS%&
unity, integrity, security or sovereignty of a) Hkkjr dh laizHkqrk ;k lqj{kk]
India or to strike terror in the people or
any section of people,
v[kaMrk] ,drk dks Hkax djus
b) Causing or likely to cause death or injuries ds iz;kstu ls fd;k x;k
to persons or damage to or destruction of d`R; ;k yksxksa vFkok fdlh
property or disruption of supplies or oxZ ds yksxksa dks vkrafdr
services essential to the life of the djuk
community b) yksxksa dh e`R;q ;k laHkkfor
c) Knowingly or intentionally penetrating or e`R;q dk dkjd gksuk vFkok
accessing, without authorization, the mUgsa ?kk;y djuk ;k laifr
computer resource or computer database dks uqdlku igqpkuka ;k
that is restricted for reasons of the security leqnk; ds thou ds fy,
of the State or foreign relations,
vko’;d oLrqvksa dh iwfrZ dks
d) All of the above
ckf/kr djuk
c) fdlh dEI;wVj lalk/ku ;k
dEI;wVj MkVkcsl] tks jkT;
dh lqj{kk ;k fons’k laca/kksa ds
dkj.k izfrcaf/kr gS] esa
tkucw>dj ;k bl vk’k; ls]
fcuk izkf/kdkj ds izos’ku ;k
igqap LFkkfir djuk
d) mi;qZDr lHkh
61. As per section 69A of the Information Technology lwpuk izkS|ksfxdh ¼la’kks/ku½
(Amendment) Act, 2008, the government can issue vf/kfu;e] 2008 dh /kkjk 69A ds
directions for blocking public access to any vuqlkj] fuEufyf[kr fLFkfr;ksa esa
information through any computer resource under ljdkj fdlh dEI;wVj lalk/ku }kjk
the following conditions: fdlh lwpuk rd yksxksa dh igqap dks
a) In the interest of sovereignty and integrity
of India
vojks/k djus dk funs’Z k ns ldrh
b) In the interest of foreign relations with gS%&
Clarification:
In Q. No. 24 “No change is being made in option of this question. If any of the option (c)/(d)
declared to be correct, then marks will be given to those candidates who have marked (c) or (d) as
answer.”