All India Bar Examination
AIBE 19
Cyber law
Special Question For AIBE-19
Question 1
Information Technology Act, 2000 was implemented for what purpose? Why was the
Information Technology Act, 2000 enacted?
(A). To control cyber crimes
(B). To provide legal recognition to e-commerce
(C). To provide legal validity to digital signatures
(D). All of the above
Answer: (D). All of the above
Question 2
What does Section 66A of IT Act, 2000 deal with?
(A). Data Theft
(B). Sending offensive messages online
(C). Cyber Terrorism
(D). Copyright Violation
Answer: 2. (B). Sending offensive messages online
Question 3
What is the meaning of Phishing? What is Phishing?
(A). Attempt to steal banking details
(B). Spread the virus
(C). Use of digital signatures
(D). Network security
Answer: A. Attempt to steal banking details
Question 4
Which authority issues digital signature certificate under IT Act, 2000?
(A). Cyber Appellate Tribunal
(B). Reserve Bank of India (RBI)
(C). Controller of Certifying Authorities (CCA)
(D). Ministry of Electronics and IT
Answer: C. Controller of Certifying Authorities (CCA)
Question 5
Is there an emergency measure to deal with cyber security incidents in India for cyber
crime?
(Α). NIA
(B). CERT-In
(C). RBI
(D). CBI
Answer: B. CERT-In
Question 6
What is the primary function of Cyber Appellate Tribunal (CAT)?
(A). Data storage
(B). Resolution of cyber disputes
(C). Validation of online business
(D). Dissemination of information
Answer: B. Resolution of cyber disputes
Question 7
What is email spoofing? What is Email Spoofing?
(A). Sending fake emails
(B). Email encryption
(C). Unauthorized access of emails
(D). None of the above
Answer: A. Sending fake emails
Question 8
Which section deals with Cyber Terrorism under IT Act, 2000?
(A). Section 69
(B). Section 66F
(C). Section 70
(D). Section 72.
Answer: (B). Section 66F
Question 9 What is the meaning of Spamming? What does Spamming mean?
(A). Sending unsolicited emails
(B). Steal data
(C). Crashing the network
(D). Creating fake websites
Answer: (A). Sending unsolicited emails
Question 10
What is the meaning of 'data breaching' in cyber law? What does 'Data Breach' mean
in Cyber Law?
(A). Unauthorized use of data
(B). Spread of viruses
(C). Tampering with digital signatures
(D). All of the above
Answer: (A). Unauthorized use of data
Question 11
Where can cyber crime report be filed in India?
(A). police station
(B). CERT-In
(C). Cyber Crime Cell
(D). the court
Answer: (C). Cyber Crime Cell
Question 12
What is the meaning of Botnet in cyber law?
(A). A group of computers spread over a network
(B). Network of computers used for illegal activities
(C). Email Hacking System
(D). None of the above
Answer: (B). A network of computers used for illegal activities
Question 13
What is Ransomware?
(A). A type of virus that encrypts files and demands a ransom.
(B). A data duplication tool
(C). A type of phishing
(D). Network Monitoring Tool A network monitoring tool
Answer: (A). A type of virus that encrypts files and demands a ransom.
Question 14
Which tribunal has been set up to deal with cyber crimes under the IT Act, 2000?
(A). National Cyber Tribunal
(B). Cyber Appellate Tribunal
(C). Internet Dispute Tribunal
(D). Digital Security Tribunal
Answer: (B). Cyber Appellate Tribunal
Question 15
What is IP Address used for? What is the purpose of an IP Address?
(A). To connect to the internet
(B). To identify a device on a network
(C). To spread the virus
(D). To send emails
Answer: (B). To identify a device on a network
Question 16
What is Cyber Stalking?
(A). Harassing someone repeatedly on social media
(B). Stealing someone's online data
(C). Hacking websites
(D). Crash the network
Answer: (A). Harassing someone repeatedly on social media
Question 17
What is the primary function of CERT-In?
(A). Detecting and mitigating cyber attacks
(B). hacking
(C). Data analysis Data analysis
(D). None of the above
Answer: (A). Detecting and mitigating cyber attacks
Question 18
Which cyber crime is identity theft through electronic means?
(A). Phishing
(B). Spoofing
(C). Hacking
(D). Cyber Stalking
Answer: (A). Phishing
Question 19
What is the objective of a Denial of Service (DoS) attack under Cyber Law?
(A). To slow down the system
(B). To make the server temporarily unavailable
(C). To steal data
(D). Cracking of software To crack software
Answer: (B). Temporarily making the server unavailable
Question 20
What does 'Logic Bomb' mean in Cyber Law?
(A). A code that is triggered on a certain event.
(B) A tool for stealing data
(C). How to increase network traffic
(D). Bypassing the system firewall
Answer: (A). A code that is triggered on a certain event.
Question 21
Which cyber crime is related to illegal modification of website content?
(A). Website Defacement
(B). Phishing
(C). Hacking
(D). Data interception
Answer: (A). Website Defacement
Question 22
Which of the following does not come in the category of cyber crime?
(A). Hacking Hacking
(B). fishing
(C). theft
(D). Spread the virus
Answer: (C). Theft
Question 23
Which court is authorized to hear crime cases?
(A). District Court
(B). Cyber Appellate Tribunal
(C). High Court
(D). Sessions Court
Answer: Cyber Appellate Tribunal
Question 24
When was the Information Technology Act enacted in India?
(A). 1998
(Β). 1999
(C). 2000
(D). 2002
Answer: 3. 2000
Question 25
Why is digital signature used? Why is a Digital Signature used?
(A). To encrypt documents
(B). To ensure authenticity and integrity of a document
(C). To transfer data over the internet
(D). To send email
Answer: (B). To ensure authenticity and integrity of a document
Question 26
What is the primary difference between cyber crimes and traditional crimes?
(A). Cyber crimes occur online, while traditional crimes occur physically.
(B). Cyber crimes go unpunished. There is no punishment for cyber crimes.
(C). There is no evidence in cyber crime. There is no evidence in cyber crimes.
(D). Cyber crimes only target children. Cyber crimes target only children.
Answer: (A).Cyber crimes occur online, while traditional crimes occur physically
Question 27
What technology is data in e-commerce transactions? Technology ensures privacy of
data
(A). firewall
(B). Digital signature
(C). encryption
(D). Certificate Authority
Answer: (C). encryption
Question 28
What is the meaning of 'Net Neutrality' in cyber law? What does 'Net Neutrality'
mean in Cyber Law?
(A). All internet users should get the same data speed. All internet users should get
equal data speed.
(B). Only government websites are given priority.
(C). Internet Service Providers (ISPs) have the right to block content.
(D). Data is only available to premium users.
Answer: (A). All internet users should get the same data speed.
Question 29
What is the purpose of 'malware' (Malware)?
(A). Updating the software
(B). Damage to the user's system
(C). To detect viruses
(D). Installing a firewall
Answer: (B). Damage to the user's system
Question 30
What is the main purpose of spoofing?
(A). Using someone else's identity
(B). Sharing files over the network
(C). Encrypt data
(D). Improving cyber security
Answer: (A). To use another person's identity
Question 31
What is 'firewall' used for? What is the purpose of a Firewall?
(A). To protect the network from unwanted access
(B). To spread the virus
(C). For data analysis
(D). To remove encryption
Answer: (A). To protect the network from unwanted access
Question 32
What is the importance of 'data privacy'?
(A) To ensure the protection of user's personal data
(B). To share data publicly
(C). To provide data to cyber criminals
(D). To destroy data on the network
Answer: (A). To ensure the protection of user's personal data
Question 33 What is the primary purpose of a Denial of Service (DoS) Attack?
(A). To disrupt the server and make it unavailable
(B) To steal data
(C). Website Defacement To deface websites
(D). To strengthen cybersecurity
Answer: (A). To disrupt the server and make it unavailable
Question 34
What types of encryption are used in public key and private key?
(A). Symmetric encryption
(B). Asymmetric Encryption
(C). Data Encryption Standard
(D). Transparent Encryption
Answer: (B). Asymmetric Encryption
Question 35
What is the main purpose of Phishing Attacks?
(A). To steal users' personal information
(B). To shut down websites
(C). To spread viruses
(D). To slow down the system
Answer: (A). To steal users' personal information
Question 36
Which cyber crime is related to spreading fake news?
(A). Cyber Bullying
(B). Online Defamation
(C). Hacking
(D). Social Engineering
Answer: (B). Online Defamation
Question 37
What is the main purpose of Ransomware attack?
(A). Locking user data and demanding ransom
(B). Permanent deletion of data
(C). To spy on the network
(D). To bypass firewalls
Answer: (A). Locking user data and demanding ransom
Question 38
What is Deepfake technology primarily used for?
(A). Creating fake video or audio
(B). Data encryption
(C). To enhance cybersecurity
(D). For monitoring network traffic
Answer: (A). Creating fake video or audio
Question 39
Which type of cyber crime increased rapidly during the COVID-19 pandemic?
(A). Phishing
(B). Online Stalking
(C). Cyber Terrorism
(D). Hacking
Answer: (A). Phishing
Question 40
Cyber crimes related to cryptocurrency fall under which category?
(A). Cyber Fraud
(B). Phishing
(C). Cyber Stalking
(D). Data Breach
Answer: (A). Cyber Fraud
Question 41
Which type of cyber crime is associated with creating fake profiles on social media
platforms?
(A). Impersonation
(B). Cyber Bullying
(C). Online Hacking
(D). Data Theft
Answer: (A). Impersonation
Question 42
What does "Doxing" mean?
(A). Publishing someone's personal information online
(B). Blocking the network
(C). Decrypting encrypted data
(D). Illegal use of software act
Answer: (A). Making a person's personal information public online
Question 43
How does cyber crime happen on online gaming platforms?
(A). Fraud through fake rewards
(B). Encryption failure
(C). Game upgrade process
(D). Providing legal game services
Answer: (A). Fraud through fake rewards
Question 44 What is the purpose of 'Botnet Attack'?
(A). To infect computer networks and perform coordinated attacks
(B). To affect only personal computers
(C). To update system software
(D). To enhance data security
Answer: (A). To infect computer networks and perform coordinated attacks
Important Supreme Court Cases
Question 1
Shreya Singhal vs Union of India (2015) case related to?
(A). Constitutionality of Section 66A, IT Act
(B). Data Protection Law
(C). Cyber bullying
(D). Validity of Digital Signatures
Answer:(A). Constitutionality of Section 66A, IT Act
Question 2
In the case of Putraswamy v. Union of India (2017), which right was declared as a
fundamental right by the Supreme Court?
(A). Freedom of expression
(B). Right to Privacy
(C). Right to Cyber Security
(D). Right to Information
Answer: (B). Right to Privacy
Question 3
Gautam Gambhir vs. Union of India case, what issue did the court decide?
(A). Fake social media accounts
(B). Cyber Terrorism
(C). Online Defamation Online Defamation
(D). Spafinta and Impersonation
Answer: D). Spoofing and Impersonation
Question 4
Rajeev Saran v State of Bihar case is related to which issue?
(A). Online Fraud
(B). Violation of E-commerce Rules
(C). Cyber stalking
(D). Cryptocurrency and Money Laundering Cryptocurrency and Money Laundering
Answer: (C). Cyber Stalking
Question 5
Vidya P. What was the case of Vellore vs Union of India (2018) related to?
(A). Right to be Forgotten
(B). Data Breach and Privacy
(C). Online Payment Fraud Online Payment Fraud
(D). Dark Web Activities Dark Web Activities
Answer: (A). Right to be Forgotten
Question 6
K. S. Puttaswamy v. Union of India (Aadhaar case) was concerned with which main
issue?
(A). Security and privacy of Aadhaar data
(B). Making Aadhaar mandatory
(C). Cyber fraud
(D). Use of Aadhaar in e-commerce
Answer: (A). Security and privacy of Aadhaar data
Question 7
The case Anita Khatri vs. State of Maharashtra is related to which type of cyber crime?
(A). Cyber bullying
(B). Online hacking
(C). Cyber stalking and harassment
(D). Data Leak Data Leak
Answer: (C). Cyber Stalking and Harassment
8. In which case did the Supreme Court emphasize the need to balance 'public
interest and privacy'?
(A). K.S. Puttaswamy v. Union of India
(B). Shreya Singhal Vs Union of India
(C). Supreme Court v. UIDAI in Aadhaar case
(D). Google India Pvt Ltd Vs Vishwa Jyoti
Answer: (A). K.S. Puttaswamy v. Union of India
Question 9
'Justice Srikrishna Committee' appointed by the Supreme Court on cyber crimes was
related to which topic?
(A). Data Protection Law
(B). Digital Currency Regulation
(C). Cyber Security Framework
(D). E-commerce Policy
Answer: (A). Data Protection Law
Question 10
What was the main issue in the 'Google India Pvt Ltd vs Vishwa Jyoti' case?
(A). Cyber Defamation
(B). data theft
(C). Illegal online advertising
(D). Social media content moderation
Answer: (A). Cyber defamation