29 questions from 14 papers
Section 66A of Information Technology Act, 2000 was invalidated by the Supreme Court of India in:
Which Section of the Information Technology (Amendment) Act, 2008 deals with the validity of contracts formed through electronic means:
The authentication to be affected by the use of asymmetric crypto system and hash function is known as:
Punishment for Cyber Terrorism under Section 66F shall be punishable:
An attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication is known as:
Section 66A of the Information Technology Act was’ struck down under Art. 19(1)(a) read with Article 19(2) in the case of:
Section 66A of Information Technology Act was held unconstitutional in the case of:
Cyber crime is in nature
Cyber law deals with-
Mr. A who was aggrieved by an order made by Controller or an adjudicating officer, made an appeal to Cyber Appellate Tribunal. Later Mr. A aggrieved by an order of Cyber Appellate Tribunal, may prefer an appeal _____
Mr. X, a person who is intended by Mr. Y an originator to receive the electronic record is, under the IT Act, known as __ .
In which case was Section 66A of the Information Technology Act, 2000 struck down by the Supreme Court?
In which situation shall an electronic record not be attributed to the originator as per the Information Technology Act, 2000?
Which of the following is/are included under Section 2(1)(w) of the Information Technology Act, 2000 describing the Intermediary? (1) Cyber Cafes (2) Telecom Regulators (3) Social Media Platforms (4) Internet Service Providers
Malti, a small business owner, runs an online store. Her site was hacked and customer data stolen. Which provision applies?
Which among the following are the digital signature certifying authorities in India?
Section 43 of the “Information Technology Act, 2000 deals with-
With reference to Cyber Crimes worm attack _______
The Act to provide legal recognition for the transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as “Electronic Commerce” is dealt under
“Asymmetric Crypto System” under Information Technology Act means a system of a secure key pair consisting of a private key for creating a digital signature and
Under section 37 of the IT Act, 2000, the certifying authority can suspend the digital signature certificate, if: (1) The subscriber is found guilty of malpractice (2) The subscriber is involved in cyber terrorism (3) The subscriber requests for the same (4) In public interest
In the cases before Cyber Appellate Tribunal, the appellant:
Which among the following is authorized under the Information Technology Act, 2000 to prescribe the security procedures and practices for the purpose of sections 14 and 15 of the Act?
The Chairperson of Cyber Appellate Tribunal is appointed by the:
Information Technology Act was enacted in the year:
Government of India passed Information Technology Act in 2000 with the objective:
Which Act is covering the Cyber Crimes
Which chapter of Cyber Law provides the legal recognition to Digital Signature:
Read the following Statements related to the Information Technology Act, 2000 and choose the correct option. Statement 1:Under the Information Technology Act, 2000, a Digital Signature Certificate may be suspended by the Certifying Authority on the request of the subscriber, an authorized representative, or if it is considered necessary in the public interest.Statement 2:Under the same Act, a Digital Signature Certificate can remain suspended indefinitely without providing the subscriber an opportunity of being heard.