0% found this document useful (0 votes)
65 views20 pages

Cyber Law

Uploaded by

MANASH MANDAL
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views20 pages

Cyber Law

Uploaded by

MANASH MANDAL
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

All India Bar Examination

AIBE 19

Cyber law

Special Question For AIBE-19

Question 1

Information Technology Act, 2000 was implemented for what purpose? Why was the
Information Technology Act, 2000 enacted?

(A). To control cyber crimes

(B). To provide legal recognition to e-commerce

(C). To provide legal validity to digital signatures

(D). All of the above

Answer: (D). All of the above

Question 2

What does Section 66A of IT Act, 2000 deal with?

(A). Data Theft

(B). Sending offensive messages online

(C). Cyber Terrorism

(D). Copyright Violation

Answer: 2. (B). Sending offensive messages online

Question 3

What is the meaning of Phishing? What is Phishing?


(A). Attempt to steal banking details

(B). Spread the virus

(C). Use of digital signatures

(D). Network security

Answer: A. Attempt to steal banking details

Question 4

Which authority issues digital signature certificate under IT Act, 2000?

(A). Cyber Appellate Tribunal

(B). Reserve Bank of India (RBI)

(C). Controller of Certifying Authorities (CCA)

(D). Ministry of Electronics and IT

Answer: C. Controller of Certifying Authorities (CCA)

Question 5

Is there an emergency measure to deal with cyber security incidents in India for cyber
crime?

(Α). NIA

(B). CERT-In

(C). RBI

(D). CBI

Answer: B. CERT-In

Question 6
What is the primary function of Cyber Appellate Tribunal (CAT)?

(A). Data storage

(B). Resolution of cyber disputes

(C). Validation of online business

(D). Dissemination of information

Answer: B. Resolution of cyber disputes

Question 7

What is email spoofing? What is Email Spoofing?

(A). Sending fake emails

(B). Email encryption

(C). Unauthorized access of emails

(D). None of the above

Answer: A. Sending fake emails

Question 8

Which section deals with Cyber Terrorism under IT Act, 2000?

(A). Section 69

(B). Section 66F

(C). Section 70

(D). Section 72.

Answer: (B). Section 66F


Question 9 What is the meaning of Spamming? What does Spamming mean?

(A). Sending unsolicited emails

(B). Steal data

(C). Crashing the network

(D). Creating fake websites

Answer: (A). Sending unsolicited emails

Question 10

What is the meaning of 'data breaching' in cyber law? What does 'Data Breach' mean
in Cyber Law?

(A). Unauthorized use of data

(B). Spread of viruses

(C). Tampering with digital signatures

(D). All of the above

Answer: (A). Unauthorized use of data

Question 11

Where can cyber crime report be filed in India?

(A). police station

(B). CERT-In

(C). Cyber Crime Cell

(D). the court


Answer: (C). Cyber Crime Cell

Question 12

What is the meaning of Botnet in cyber law?

(A). A group of computers spread over a network

(B). Network of computers used for illegal activities

(C). Email Hacking System

(D). None of the above

Answer: (B). A network of computers used for illegal activities

Question 13

What is Ransomware?

(A). A type of virus that encrypts files and demands a ransom.

(B). A data duplication tool

(C). A type of phishing

(D). Network Monitoring Tool A network monitoring tool

Answer: (A). A type of virus that encrypts files and demands a ransom.

Question 14

Which tribunal has been set up to deal with cyber crimes under the IT Act, 2000?

(A). National Cyber Tribunal

(B). Cyber Appellate Tribunal

(C). Internet Dispute Tribunal


(D). Digital Security Tribunal

Answer: (B). Cyber Appellate Tribunal

Question 15

What is IP Address used for? What is the purpose of an IP Address?

(A). To connect to the internet

(B). To identify a device on a network

(C). To spread the virus

(D). To send emails

Answer: (B). To identify a device on a network

Question 16

What is Cyber Stalking?

(A). Harassing someone repeatedly on social media

(B). Stealing someone's online data

(C). Hacking websites

(D). Crash the network

Answer: (A). Harassing someone repeatedly on social media

Question 17

What is the primary function of CERT-In?

(A). Detecting and mitigating cyber attacks

(B). hacking
(C). Data analysis Data analysis

(D). None of the above

Answer: (A). Detecting and mitigating cyber attacks

Question 18

Which cyber crime is identity theft through electronic means?

(A). Phishing

(B). Spoofing

(C). Hacking

(D). Cyber Stalking

Answer: (A). Phishing

Question 19

What is the objective of a Denial of Service (DoS) attack under Cyber Law?

(A). To slow down the system

(B). To make the server temporarily unavailable

(C). To steal data

(D). Cracking of software To crack software

Answer: (B). Temporarily making the server unavailable

Question 20

What does 'Logic Bomb' mean in Cyber Law?

(A). A code that is triggered on a certain event.


(B) A tool for stealing data

(C). How to increase network traffic

(D). Bypassing the system firewall

Answer: (A). A code that is triggered on a certain event.

Question 21

Which cyber crime is related to illegal modification of website content?

(A). Website Defacement

(B). Phishing

(C). Hacking

(D). Data interception

Answer: (A). Website Defacement

Question 22

Which of the following does not come in the category of cyber crime?

(A). Hacking Hacking

(B). fishing

(C). theft

(D). Spread the virus

Answer: (C). Theft

Question 23

Which court is authorized to hear crime cases?


(A). District Court

(B). Cyber Appellate Tribunal

(C). High Court

(D). Sessions Court

Answer: Cyber Appellate Tribunal

Question 24

When was the Information Technology Act enacted in India?

(A). 1998

(Β). 1999

(C). 2000

(D). 2002

Answer: 3. 2000

Question 25

Why is digital signature used? Why is a Digital Signature used?

(A). To encrypt documents

(B). To ensure authenticity and integrity of a document

(C). To transfer data over the internet

(D). To send email

Answer: (B). To ensure authenticity and integrity of a document

Question 26
What is the primary difference between cyber crimes and traditional crimes?

(A). Cyber crimes occur online, while traditional crimes occur physically.

(B). Cyber crimes go unpunished. There is no punishment for cyber crimes.

(C). There is no evidence in cyber crime. There is no evidence in cyber crimes.

(D). Cyber crimes only target children. Cyber crimes target only children.

Answer: (A).Cyber crimes occur online, while traditional crimes occur physically

Question 27

What technology is data in e-commerce transactions? Technology ensures privacy of


data

(A). firewall

(B). Digital signature

(C). encryption

(D). Certificate Authority

Answer: (C). encryption

Question 28

What is the meaning of 'Net Neutrality' in cyber law? What does 'Net Neutrality'
mean in Cyber Law?

(A). All internet users should get the same data speed. All internet users should get
equal data speed.

(B). Only government websites are given priority.

(C). Internet Service Providers (ISPs) have the right to block content.
(D). Data is only available to premium users.

Answer: (A). All internet users should get the same data speed.

Question 29

What is the purpose of 'malware' (Malware)?

(A). Updating the software

(B). Damage to the user's system

(C). To detect viruses

(D). Installing a firewall

Answer: (B). Damage to the user's system

Question 30

What is the main purpose of spoofing?

(A). Using someone else's identity

(B). Sharing files over the network

(C). Encrypt data

(D). Improving cyber security

Answer: (A). To use another person's identity

Question 31

What is 'firewall' used for? What is the purpose of a Firewall?

(A). To protect the network from unwanted access

(B). To spread the virus


(C). For data analysis

(D). To remove encryption

Answer: (A). To protect the network from unwanted access

Question 32

What is the importance of 'data privacy'?

(A) To ensure the protection of user's personal data

(B). To share data publicly

(C). To provide data to cyber criminals

(D). To destroy data on the network

Answer: (A). To ensure the protection of user's personal data

Question 33 What is the primary purpose of a Denial of Service (DoS) Attack?

(A). To disrupt the server and make it unavailable

(B) To steal data

(C). Website Defacement To deface websites

(D). To strengthen cybersecurity

Answer: (A). To disrupt the server and make it unavailable

Question 34

What types of encryption are used in public key and private key?

(A). Symmetric encryption

(B). Asymmetric Encryption


(C). Data Encryption Standard
(D). Transparent Encryption

Answer: (B). Asymmetric Encryption

Question 35

What is the main purpose of Phishing Attacks?

(A). To steal users' personal information

(B). To shut down websites

(C). To spread viruses

(D). To slow down the system

Answer: (A). To steal users' personal information

Question 36

Which cyber crime is related to spreading fake news?

(A). Cyber Bullying

(B). Online Defamation

(C). Hacking

(D). Social Engineering

Answer: (B). Online Defamation

Question 37

What is the main purpose of Ransomware attack?

(A). Locking user data and demanding ransom

(B). Permanent deletion of data


(C). To spy on the network

(D). To bypass firewalls

Answer: (A). Locking user data and demanding ransom

Question 38

What is Deepfake technology primarily used for?

(A). Creating fake video or audio

(B). Data encryption

(C). To enhance cybersecurity

(D). For monitoring network traffic

Answer: (A). Creating fake video or audio

Question 39

Which type of cyber crime increased rapidly during the COVID-19 pandemic?

(A). Phishing

(B). Online Stalking

(C). Cyber Terrorism

(D). Hacking

Answer: (A). Phishing

Question 40

Cyber crimes related to cryptocurrency fall under which category?

(A). Cyber Fraud


(B). Phishing

(C). Cyber ​ ​ Stalking

(D). Data Breach

Answer: (A). Cyber ​ ​ Fraud

Question 41

Which type of cyber crime is associated with creating fake profiles on social media
platforms?

(A). Impersonation

(B). Cyber Bullying

(C). Online Hacking

(D). Data Theft

Answer: (A). Impersonation

Question 42

What does "Doxing" mean?

(A). Publishing someone's personal information online

(B). Blocking the network

(C). Decrypting encrypted data

(D). Illegal use of software act

Answer: (A). Making a person's personal information public online

Question 43

How does cyber crime happen on online gaming platforms?


(A). Fraud through fake rewards

(B). Encryption failure

(C). Game upgrade process

(D). Providing legal game services

Answer: (A). Fraud through fake rewards

Question 44 What is the purpose of 'Botnet Attack'?

(A). To infect computer networks and perform coordinated attacks

(B). To affect only personal computers

(C). To update system software

(D). To enhance data security

Answer: (A). To infect computer networks and perform coordinated attacks

Important Supreme Court Cases

Question 1

Shreya Singhal vs Union of India (2015) case related to?

(A). Constitutionality of Section 66A, IT Act

(B). Data Protection Law

(C). Cyber bullying

(D). Validity of Digital Signatures

Answer:(A). Constitutionality of Section 66A, IT Act


Question 2

In the case of Putraswamy v. Union of India (2017), which right was declared as a
fundamental right by the Supreme Court?

(A). Freedom of expression

(B). Right to Privacy

(C). Right to Cyber Security

(D). Right to Information

Answer: (B). Right to Privacy

Question 3

Gautam Gambhir vs. Union of India case, what issue did the court decide?

(A). Fake social media accounts

(B). Cyber Terrorism

(C). Online Defamation Online Defamation

(D). Spafinta and Impersonation

Answer: D). Spoofing and Impersonation

Question 4

Rajeev Saran v State of Bihar case is related to which issue?

(A). Online Fraud

(B). Violation of E-commerce Rules

(C). Cyber stalking

(D). Cryptocurrency and Money Laundering Cryptocurrency and Money Laundering


Answer: (C). Cyber Stalking

Question 5

Vidya P. What was the case of Vellore vs Union of India (2018) related to?

(A). Right to be Forgotten

(B). Data Breach and Privacy

(C). Online Payment Fraud Online Payment Fraud

(D). Dark Web Activities Dark Web Activities

Answer: (A). Right to be Forgotten

Question 6

K. S. Puttaswamy v. Union of India (Aadhaar case) was concerned with which main
issue?

(A). Security and privacy of Aadhaar data

(B). Making Aadhaar mandatory

(C). Cyber fraud

(D). Use of Aadhaar in e-commerce

Answer: (A). Security and privacy of Aadhaar data

Question 7

The case Anita Khatri vs. State of Maharashtra is related to which type of cyber crime?

(A). Cyber bullying

(B). Online hacking


(C). Cyber stalking and harassment

(D). Data Leak Data Leak

Answer: (C). Cyber Stalking and Harassment

8. In which case did the Supreme Court emphasize the need to balance 'public
interest and privacy'?

(A). K.S. Puttaswamy v. Union of India

(B). Shreya Singhal Vs Union of India

(C). Supreme Court v. UIDAI in Aadhaar case

(D). Google India Pvt Ltd Vs Vishwa Jyoti

Answer: (A). K.S. Puttaswamy v. Union of India

Question 9

'Justice Srikrishna Committee' appointed by the Supreme Court on cyber crimes was
related to which topic?

(A). Data Protection Law

(B). Digital Currency Regulation

(C). Cyber Security Framework

(D). E-commerce Policy

Answer: (A). Data Protection Law

Question 10

What was the main issue in the 'Google India Pvt Ltd vs Vishwa Jyoti' case?

(A). Cyber Defamation


(B). data theft
(C). Illegal online advertising
(D). Social media content moderation

Answer: (A). Cyber defamation

You might also like