The Information Technology Act, 2000 received the assent of the President of India in which year?
a) 1999
b) 2000
c) 2001
d) 2002
Answer: b) 2000
Which of the following is NOT a type of cyber crime?
a) Phishing
b) Software Piracy
c) Reading a physical book
d) Hacking
Answer: c) Reading a physical book
Which section of the IT Act deals with the punishment for sending offensive messages through communication service?
a) Section 65
b) Section 66
c) Section 66A
d) Section 67
Answer: c) Section 66A
What is the primary purpose of a Digital Signature Certificate?
a) To increase internet speed
b) To verify the identity of the sender and ensure document integrity
c) To block spam emails
d) To create a website
Answer: b) To verify the identity of the sender and ensure document integrity
Who appoints the Adjudicating Officers under the IT Act?
a) The President of India
b) The Central Government
c) The Supreme Court
d) The Certifying Authority
Answer: b) The Central Government
Which of these is a common characteristic of a strong password?
a) It is your name
b) It is short and simple
c) It uses a combination of letters, numbers, and symbols
d) It is written down and stuck to the monitor
Answer: c) It uses a combination of letters, numbers, and symbols
What does the term "Digital Divide" refer to?
a) The difference between analog and digital signals
b) The gap between people with effective access to digital technology and those without
c) A mathematical formula used in computing
d) A law that divides digital resources
Answer: b) The gap between people with effective access to digital technology and those without
Which amendment to the IT Act introduced the definition of cyber terrorism?
a) The IT (Amendment) Act, 2005
b) The IT (Amendment) Act, 2008
c) The IT (Amendment) Act, 2010
d) The IT (Amendment) Act, 2012
Answer: b) The IT (Amendment) Act, 2008
What is the main legal framework for electronic commerce in India?
a) The Indian Penal Code (IPC)
b) The Companies Act
c) The Information Technology Act, 2000
d) The Copyright Act
Answer: c) The Information Technology Act, 2000
Which body is responsible for issuing Digital Signature Certificates?
a) Cyber Appellate Tribunal
b) Adjudicating Officer
c) Certifying Authority (CA)
d) Central Bureau of Investigation (CBI)
Answer: c) Certifying Authority (CA)
What is the punishment prescribed under the IT Act for hacking a computer system?
a) Fine only
b) Imprisonment up to 3 years, or a fine, or both
c) A warning letter
d) Community service
Answer: b) Imprisonment up to 3 years, or a fine, or both
What does "URL" stand for in the context of the internet?
a) Uniform Resource Locator
b) Universal Reference Link
c) Unified Registration Log
d) User Recognition Language
Answer: a) Uniform Resource Locator
Which of these is an example of an electronic record as per the IT Act?
a) A handwritten letter
b) An email
c) A printed photograph
d) A typewritten document
Answer: b) An email
The act of pretending to be someone else online to commit fraud is known as:
a) Phishing
b) Impersonation
c) Spamming
d) Blogging
Answer: b) Impersonation
Which section of the IT Act deals with the punishment for publishing obscene material in electronic form?
a) Section 65
b) Section 66
c) Section 67
d) Section 69
Answer: c) Section 67
What is the primary goal of cyber law?
a) To slow down the internet
b) To make technology more expensive
c) To provide a legal framework for electronic transactions and prevent cyber crimes
d) To promote software piracy
Answer: c) To provide a legal framework for electronic transactions and prevent cyber crimes
Which of the following is a preventive measure against viruses?
a) Opening email attachments from unknown senders
b) Using antivirus software and keeping it updated
c) Downloading software from untrusted websites
d) Disabling firewalls
Answer: b) Using antivirus software and keeping it updated
The term "e-governance" refers to:
a) Governing e-commerce companies
b) The application of IT for delivering government services
c) A type of computer virus
d) Laws related to electronics manufacturing
Answer: b) The application of IT for delivering government services
What is a Trojan horse in the context of cyber security?
a) A mythical story
b) A useful software that also has a hidden malicious function
c) A type of digital signature
d) A law against hacking
Answer: b) A useful software that also has a hidden malicious function
The power to issue directions for interception of any information through any computer resource is granted under which section?
a) Section 66
b) Section 67
c) Section 69
d) Section 70
Answer: c) Section 69
Which of these is a key feature of a safe online transaction?
a) Using public Wi-Fi without a password
b) Looking for 'https://' and a padlock symbol in the browser's address bar
c) Sharing your password with the website admin if they ask
d) Making payments on unsecured websites
Answer: b) Looking for 'https://' and a padlock symbol in the browser's address bar
What does "Intellectual Property" protect?
a) Physical property like land and buildings
b) Creations of the mind, such as inventions, literary works, and symbols
c) Computer hardware
d) Personal data only
Answer: b) Creations of the mind, such as inventions, literary works, and symbols
Which of the following is a duty of a responsible digital citizen?
a) Spreading rumors online
b) Respecting others' privacy and intellectual property
c) Hacking for fun
d) Creating fake profiles to bully others
Answer: b) Respecting others' privacy and intellectual property
The first cyber police station in India was established in:
a) Delhi
b) Mumbai
c) Bangalore
d) Chennai
Answer: c) Bangalore
An injunction is a legal remedy that can be used to:
a) Compensate for damages
b) Stop a person from publishing defamatory content online
c) Send someone to jail immediately
d) Issue a digital signature
Answer: b) Stop a person from publishing defamatory content online