Which two of the following are primary objectives of the Information Technology Act, 2000?
a) To provide legal recognition for handwriting on paper.
b) To facilitate electronic filing of documents with government agencies.
c) To grant legal recognition to transactions carried out by electronic means.
d) To regulate the price of computer hardware.
Answers: b) To facilitate electronic filing of documents with government agencies, c) To grant legal recognition to transactions carried out by electronic mean
Identify two key roles established under the IT Act for its implementation.
a) The Adjudicating Officer.
b) The Director of Public Prosecutions.
c) The Controller of Certifying Authorities (CCA).
d) The Chief Justice of India.
Answers: a) The Adjudicating Officer, c) The Controller of Certifying Authorities (CCA)
Select two correct statements about Digital Signature Certificates (DSC).
a) They are issued by the Cyber Appellate Tribunal.
b) They are used to verify the identity of the person signing an electronic document.
c) They ensure the integrity of the document has not been altered after signing.
d) They are a type of computer virus.
Answers: b) They are used to verify the identity of the person signing an electronic document, c) They ensure the integrity of the document has not been altered after signing
Which two offenses were specifically introduced or amended by the IT (Amendment) Act, 2008?
a) The offense of cyber terrorism under Section 66F.
b) Punishment for sending offensive messages (since repealed).
c) The definition of theft under the Indian Penal Code.
d) Laws related to physical burglary.
Answers: a) The offense of cyber terrorism under Section 66F, b) Punishment for sending offensive messages (since repealed)
A person can be held liable for cyber defamation if they publish two of the following:
a) A true and factual news report.
b) A false statement that harms someone's reputation on a social media platform.
c) A defamatory comment on a public blog.
d) A private email praising a colleague.
Answers: b) A false statement that harms someone's reputation on a social media platform, c) A defamatory comment on a public blog
Which two actions are considered good practices for protecting against identity theft?
a) Sharing your passwords with close friends.
b) Using strong, unique passwords for different online accounts.
c) Being cautious about the personal information you share on social media.
d) Clicking on links in unsolicited emails to verify their authenticity.
Answers: b) Using strong, unique passwords for different online accounts, c) Being cautious about the personal information you share on social media
The IT Act provides legal validity to which two of the following?
a) Electronic records.
b) Digital signatures.
c) Handwritten signatures scanned into a computer.
d) Verbal agreements recorded on tape.
Answers: a) Electronic records, b) Digital signatures
Which two bodies are involved in the adjudication and appeal process for cyber disputes under the IT Act?
a) The Certifying Authority.
b) The Adjudicating Officer.
c) The Cyber Appellate Tribunal.
d) The Local Police Station.
Answers: b) The Adjudicating Officer, c) The Cyber Appellate Tribunal
Identify two characteristics of software piracy.
a) It is the authorized distribution of copyrighted software.
b) It violates the intellectual property rights of the software creator.
c) It helps in making software affordable for everyone.
d) It includes making illegal copies of software for sale or distribution.
Answers: b) It violates the intellectual property rights of the software creator, d) It includes making illegal copies of software for sale or distribution
Which two of the following are essential elements of the offense of hacking under the IT Act?
a) Accessing a computer system with the owner's explicit permission.
b) Destroying, deleting, or altering information residing on a computer.
c) The intention or knowledge to cause damage.
d) Improving the security of the system accessed.
Answers: b) Destroying, deleting, or altering information residing on a computer, c) The intention or knowledge to cause damage
Select two responsibilities of a Certifying Authority (CA).
a) To investigate cyber crimes.
b) To issue Digital Signature Certificates.
c) To ensure the security and integrity of its operations.
d) To adjudicate disputes between two companies.
Answers: b) To issue Digital Signature Certificates, c) To ensure the security and integrity of its operations
Which two of the following are considered critical IT infrastructure or "protected systems"?
a) A personal laptop used for gaming.
b) Computer systems related to power plants and national security.
c) A public internet café.
d) Banking and financial systems.
Answers: b) Computer systems related to power plants and national security, d) Banking and financial systems
The concept of a "secure system" under the IT Act involves which two features?
a) It must be accessible to everyone without any password.
b) It should have protections against unauthorized access or misuse.
c) It must be physically located in a government building.
d) It should use procedures that ensure security.
Answers: b) It should have protections against unauthorized access or misuse, d) It should use procedures that ensure security
Which two actions can be taken against a person found guilty of cyber crimes under the IT Act?
a) Imprisonment.
b) Award of compensation to the victim.
c) A promotion at their job.
d) A fine.
Answers: a) Imprisonment, d) A fine
Identify two ways in which the digital divide can negatively impact society.
a) It can lead to increased equality in access to information.
b) It can limit educational and economic opportunities for those without access.
c) It can create a gap in digital literacy between different segments of society.
d) It ensures that technology is distributed fairly.
Answers: b) It can limit educational and economic opportunities for those without access, c) It can create a gap in digital literacy between different segments of society
Which two are legal consequences of violating copyright law through software piracy?
a) The user may be awarded a prize.
b) The user may face civil penalties, including paying damages.
c) The user may face criminal prosecution.
d) The software becomes free for everyone to use.
Answers: b) The user may face civil penalties, including paying damages, c) The user may face criminal prosecution
Select two correct statements about the Cyber Appellate Tribunal.
a) It is the first court to hear all cyber crime cases.
b) It hears appeals against the orders of the Adjudicating Officers.
c) It is headed by a Presiding Officer qualified to be a High Court Judge.
d) Its headquarters are in every district of India.
Answers: b) It hears appeals against the orders of the Adjudicating Officers, c) It is headed by a Presiding Officer qualified to be a High Court Judge
Which two of the following are key components of electronic governance (e-governance)?
a) Increasing paper-based file systems.
b) Providing government services to the public electronically.
c) Ensuring transparency and efficiency in governance.
d) Reducing public access to information.
Answers: b) Providing government services to the public electronically, c) Ensuring transparency and efficiency in governance
A website is considered secure for online transactions if it uses which two protocols?
a) HTTP (Hypertext Transfer Protocol).
b) HTTPS (Hypertext Transfer Protocol Secure).
c) SSL/TLS (Secure Sockets Layer/Transport Layer Security) encryption.
d) FTP (File Transfer Protocol).
Answers: b) HTTPS (Hypertext Transfer Protocol Secure), c) SSL/TLS (Secure Sockets Layer/Transport Layer Security) encryption
Which two of the following are duties of a digital citizen?
a) To spread unverified information quickly.
b) To respect the privacy and data of others.
c) To use technology in a responsible and ethical manner.
d) To hack into systems to find security flaws without permission.
Answers: b) To respect the privacy and data of others, c) To use technology in a responsible and ethical manner
The investigation of cyber crimes can involve which two of the following?
a) Only the local traffic police.
b) Specialized cyber crime cells within the police force.
c) The Certifying Authority.
d) Forensic analysis of computer systems and digital evidence.
Answers: b) Specialized cyber crime cells within the police force, d) Forensic analysis of computer systems and digital evidence
Identify two challenges in enforcing cyber laws.
a) The physical nature of evidence makes it easy to handle.
b) The borderless nature of the internet (jurisdictional issues).
c) The rapid pace of technological change.
d) The lack of any laws to address cyber crimes.
Answers: b) The borderless nature of the internet (jurisdictional issues), c) The rapid pace of technological change
Which two actions constitute a violation of privacy in cyberspace?
a) Publishing someone's private photographs without their consent.
b) Sending a birthday greeting email to a friend.
c) Monitoring someone's computer usage without their knowledge.
d) Using a strong password for your own account.
Answers: a) Publishing someone's private photographs without their consent, c) Monitoring someone's computer usage without their knowledge
Select two preventive measures against phishing attacks.
a) Verifying the URL of a website before entering login credentials.
b) Clicking on links in emails from unknown senders.
c) Being suspicious of emails that create a sense of urgency or ask for personal details.
d) Using the same password for all online accounts.
Answers: a) Verifying the URL of a website before entering login credentials, c) Being suspicious of emails that create a sense of urgency or ask for personal details
The IT Act aims to protect which two types of data?
a) Data stored in physical filing cabinets.
b) Sensitive personal data or information.
c) Data related to body language.
d) Information stored in computer resources.
Answers: b) Sensitive personal data or information, d) Information stored in computer resources