← All Subjects
Low Priority

Cyber Law

29 questions from 14 papers

Practice Cyber Law →
AIBE XIII Q.22 Walkthrough

Section 66A of Information Technology Act, 2000 was invalidated by the Supreme Court of India in:

a. Anvar P .V . v. P .K. Basheer, (2014) 10 SC 473
b. Shreya Singhal v. Union of India, AIR 2015, SC 1523
c. Dr. Prafulla Desai v. State of Maharashtra, AIR 2003 SC 2053
d. State (NCT of Delhi) v. Navjot Sandhu, (2005), 11 SC 600
View Walkthrough →
AIBE XIII Q.91 Walkthrough

Which Section of the Information Technology (Amendment) Act, 2008 deals with the validity of contracts formed through electronic means:

a. Section 12
b. Section IDA
c. Section 11
d. Section 13
View Walkthrough →
AIBE XIV Q.16 Walkthrough

The authentication to be affected by the use of asymmetric crypto system and hash function is known as:

a. Public key
b. Private key
c. Digital Signature
d. Electronic Governance
View Walkthrough →
AIBE XIV Q.17 Walkthrough

Punishment for Cyber Terrorism under Section 66F shall be punishable:

a. With imprisonment which may extend to three years or with fine not exceeding two lakh rupees or with both.
b. With imprisonment for a term which may extend to seven years and shall also be liable to fine.
c. With imprisonment which may extend to imprisonment for life.
d. With imprisonment of either description for a term which may extend to ten years and shall also be liable to fine.
View Walkthrough →
AIBE XV Q.6 Walkthrough

An attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication is known as:

a. Pharming
b. Smishing
c. Phishing
d. Diding
View Walkthrough →
AIBE XV Q.65 Walkthrough

Section 66A of the Information Technology Act was’ struck down under Art. 19(1)(a) read with Article 19(2) in the case of:

a. read with Article 19(2) in the case of: (a) Justice K.S. Puttaswamy v. Union of India
b. Kharak Singh v. State of U.P .
c. Govinda v. State of M.P .
d. Shreya Singhal v. Union of India
View Walkthrough →
AIBE XV Q.98 Walkthrough

Section 66A of Information Technology Act was held unconstitutional in the case of:

a. Justice K.S. Putta Swamyv. Union of India
b. M.P . Sharma v. Satish Chandra
c. Shreya Singhal v. Union of India
d. Gagan Harsh Sharma v. The State of Maharashtra
View Walkthrough →
AIBE XVI Q.16 Walkthrough

Cyber crime is in nature

a. Tangible
b. Intangible
c. Of mental Violence
d. None of the above
View Walkthrough →
AIBE XVI Q.50 Walkthrough

Cyber law deals with-

a. All activities concerning the internet
b. IPR
c. E-commerce
d. All of the above
View Walkthrough →
AIBE XVII Q.74 Walkthrough

Mr. A who was aggrieved by an order made by Controller or an adjudicating officer, made an appeal to Cyber Appellate Tribunal. Later Mr. A aggrieved by an order of Cyber Appellate Tribunal, may prefer an appeal _____

a. In any District Court
b. In Higher Tribunal
c. Only in High Court
d. Only in Supreme Court
View Walkthrough →
AIBE XVII Q.75 Walkthrough

Mr. X, a person who is intended by Mr. Y an originator to receive the electronic record is, under the IT Act, known as __ .

a. Intermediary
b. Originators Agent
c. Addressee
d. Key Holder
View Walkthrough →
AIBE XVIII Q.98 Walkthrough

In which case was Section 66A of the Information Technology Act, 2000 struck down by the Supreme Court?

a. Shreya Singhal v. Union of India
b. Kartar Singh v. State of Punjab
c. K.A. Abbas v. Union of India
d. Maneka Gandhi v. Union of India
View Walkthrough →
AIBE XVIII Q.99 Walkthrough

In which situation shall an electronic record not be attributed to the originator as per the Information Technology Act, 2000?

a. Electronic record sent by the originator himself
b. Electronic record sent by an authorised person
c. Electronic record sent by an automated system programmed by him
d. Electronic record sent by an unauthorized person
View Walkthrough →
AIBE XIX Q.74 Walkthrough

Which of the following is/are included under Section 2(1)(w) of the Information Technology Act, 2000 describing the Intermediary? (1) Cyber Cafes (2) Telecom Regulators (3) Social Media Platforms (4) Internet Service Providers

a. (1), (2) and (3)
b. (1), (3) and (4)
c. (1), (2) and (4)
d. (1), (2), (3) and (4)
View Walkthrough →
AIBE XIX Q.75 Walkthrough

Malti, a small business owner, runs an online store. Her site was hacked and customer data stolen. Which provision applies?

a. Punishable under Section 66 of the IT Act, 2000
b. Punishable only under criminal laws
c. Punishable under Section 66 of the IT Act, 2000 + compensation claimable
d. Customers have no legal remedy under IT Act
View Walkthrough →
AIBE VII Q.62 Walkthrough

Which among the following are the digital signature certifying authorities in India?

a. M/s. Safescript
b. M/s. NCERT
c. M/s. MTL
d. All the above
View Walkthrough →
AIBE VII Q.63 Walkthrough

Section 43 of the “Information Technology Act, 2000 deals with-

a. Criminal liability
b. Civil liability
c. Both the above
d. None of the above
View Walkthrough →
AIBE VIII Q.88 Walkthrough

With reference to Cyber Crimes worm attack _______

a. needs the virus to attack
b. do not need the virus to attack
c. needs the host to attack
d. do not need the host to attack
View Walkthrough →
AIBE VIII Q.90 Walkthrough

The Act to provide legal recognition for the transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as “Electronic Commerce” is dealt under

a. Information Technology Act
b. Information and Communication Technology Act
c. Information Communication Act
d. Information and Cyber Space Act
View Walkthrough →
AIBE VIII Q.91 Walkthrough

“Asymmetric Crypto System” under Information Technology Act means a system of a secure key pair consisting of a private key for creating a digital signature and

a. an individual key to verify the digital signature
b. a lock to verify the digital signature
c. a public key to verify the digital signature
d. a Government key to verify the digital signature
View Walkthrough →
AIBE IX Q.62 Walkthrough

Under section 37 of the IT Act, 2000, the certifying authority can suspend the digital signature certificate, if: (1) The subscriber is found guilty of malpractice (2) The subscriber is involved in cyber terrorism (3) The subscriber requests for the same (4) In public interest

a. (1) and (2)
b. (2) and (3)
c. (3) and (4)
d. (4) and (1)
View Walkthrough →
AIBE IX Q.63 Walkthrough

In the cases before Cyber Appellate Tribunal, the appellant:

a. Cannot appear in person without a legal practitioner
b. Cannot authorise a legal practitioner to appear on his behalf
c. Cannot authorise his officer to appear on his behalf
d. Cannot authorize his relative who is neither his officer nor a legal practitioner to appear on his behalf
View Walkthrough →
AIBE IX Q.89 Walkthrough

Which among the following is authorized under the Information Technology Act, 2000 to prescribe the security procedures and practices for the purpose of sections 14 and 15 of the Act?

a. Central Government
b. State Government
c. Certifying authority
d. Issuing authority
View Walkthrough →
AIBE X Q.51 Walkthrough

The Chairperson of Cyber Appellate Tribunal is appointed by the:

a. Central Government in consultation with the Chief Justice of India
b. State Government in consultation with the Chief Justice of the High Court
c. Central Government
d. Central Government in consultation with Controller of Certifying Authority
View Walkthrough →
AIBE XI Q.17 Walkthrough

Information Technology Act was enacted in the year:

a. 1988
b. 1996
c. 2000
d. 2004
View Walkthrough →
AIBE XI Q.18 Walkthrough

Government of India passed Information Technology Act in 2000 with the objective:

a. To provide legal sanction to all transaction for e-commerce
b. To facilitate electronic filing of all documents to the Government
c. To amend Indian Penal Code, Indian Evidence Act, to punish the cyber crimes
d. All of the above
View Walkthrough →
AIBE XII Q.12 Walkthrough

Which Act is covering the Cyber Crimes

a. Indian Telecommunication Act
b. Indian Penal Code
c. Indian Evidence Act
d. Information Technology Act
View Walkthrough →
AIBE XII Q.62 Walkthrough

Which chapter of Cyber Law provides the legal recognition to Digital Signature:

a. Chapter III
b. Chapter IV
c. Chapter IX
d. Chapter IX and X
View Walkthrough →
AIBE XX Q.45 Walkthrough

Read the following Statements related to the Information Technology Act, 2000 and choose the correct option. Statement 1:Under the Information Technology Act, 2000, a Digital Signature Certificate may be suspended by the Certifying Authority on the request of the subscriber, an authorized representative, or if it is considered necessary in the public interest.Statement 2:Under the same Act, a Digital Signature Certificate can remain suspended indefinitely without providing the subscriber an opportunity of being heard.

a. Both Statements 1 and 2 are false
b. Only Statement 1 is true
c. Only Statement 2 is true
d. Both the Statements are true
View Walkthrough →