Which three of the following are explicitly defined as cyber crimes under the IT Act, 2000?
a) Hacking with malicious intent.
b) Publishing obscene material in electronic form.
c) Damaging computer source code.
d) Speeding on a highway.
Answers: a) Hacking with malicious intent, b) Publishing obscene material in electronic form, c) Damaging computer source code
The legal framework of the IT Act provides recognition to which three electronic aspects?
a) Electronic records.
b) Digital signatures.
c) Electronic contracts.
d) The weight of a computer monitor.
Answers: a) Electronic records, b) Digital signatures, c) Electronic contracts
Identify three functions of the Controller of Certifying Authorities (CCA).
a) To license and regulate the work of Certifying Authorities.
b) To supervise the activities of Certifying Authorities.
c) To investigate cases of cyber stalking.
d) To lay down standards for the functioning of Certifying Authorities.
Answers: a) To license and regulate the work of Certifying Authorities, b) To supervise the activities of Certifying Authorities, d) To lay down standards for the functioning of Certifying Authorities
A strong cybersecurity posture for an individual includes which three practices?
a) Using weak passwords like "123456".
b) Regularly updating software and operating systems.
c) Installing and updating reputable antivirus software.
d) Being cautious about opening email attachments from unknown sources.
Answers: b) Regularly updating software and operating systems, c) Installing and updating reputable antivirus software, d) Being cautious about opening email attachments from unknown sources
Which three are potential impacts of cyber terrorism as defined under Section 66F?
a) Threatening the unity and integrity of India.
b) Making a legitimate online purchase.
c) Threatening the security of the state.
d) Causing panic among the public.
Answers: a) Threatening the unity and integrity of India, c) Threatening the security of the state, d) Causing panic among the public
The Adjudicating Officer, upon determining a contravention of the IT Act, has the power to award which three?
a) A medal of honor.
b) Compensation to the victim for the loss.
c) A penalty payable to the central government.
d) Confiscation of the computer system used in the contravention.
Answers: b) Compensation to the victim for the loss, c) A penalty payable to the central government, d) Confiscation of the computer system used in the contravention
Select three correct statements about the amendment process of the IT Act.
a) The IT Act was amended in 2008.
b) The amendment was introduced to address new cyber threats.
c) The amendment added the definition of cyber terrorism.
d) The amendment removed all penalties for hacking.
Answers: a) The IT Act was amended in 2008, b) The amendment was introduced to address new cyber threats, c) The amendment added the definition of cyber terrorism
Which three are essential elements for proving the offense of cyber defamation?
a) The statement must be true and flattering.
b) The statement must be published in electronic form.
c) The statement must be false.
d) The statement must harm the reputation of the person.
Answers: b) The statement must be published in electronic form, c) The statement must be false, d) The statement must harm the reputation of the person
The principles of e-governance promoted by the IT Act aim to achieve which three goals?
a) To increase paperwork in government offices.
b) To enhance transparency and accountability.
c) To make government services accessible to people electronically.
d) To improve the efficiency of government operations.
Answers: b) To enhance transparency and accountability, c) To make government services accessible to people electronically, d) To improve the efficiency of government operations
Which three of the following are types of intellectual property rights relevant to the digital world?
a) Copyright (for software, content).
b) Trademark (for logos, brand names).
c) Patent (for inventions).
d) The right to own a physical server.
Answers: a) Copyright (for software, content), b) Trademark (for logos, brand names), c) Patent (for inventions)
The challenges in combating cyber crime include which three factors?
a) The anonymity that the internet can provide to criminals.
b) The rapid evolution of technology and attack methods.
c) The need for international cooperation due to the cross-border nature of crimes.
d) The absence of any laws against cyber crime.
Answers: a) The anonymity that the internet can provide to criminals, b) The rapid evolution of technology and attack methods, c) The need for international cooperation due to the cross-border nature of crimes
Identify three rights of a consumer engaging in e-commerce.
a) The right to be provided with accurate information about goods and services.
b) The right to have their sensitive personal data protected.
c) The right to a fair and timely grievance redressal mechanism.
d) The right to receive pirated software at a lower cost.
Answers: a) The right to be provided with accurate information about goods and services, b) The right to have their sensitive personal data protected, c) The right to a fair and timely grievance redressal mechanism
Which three actions are considered unethical in cyberspace?
a) Plagiarizing content from a website without giving credit.
b) Using licensed software after purchasing it.
c) Creating fake profiles to deceive or harass others.
d) Sharing confidential information about your employer online without authorization.
Answers: a) Plagiarizing content from a website without giving credit, c) Creating fake profiles to deceive or harass others, d) Sharing confidential information about your employer online without authorization
The investigation of a cyber crime scene requires which three specialized approaches?
a) Ignoring digital evidence as it is unreliable.
b) Preserving the integrity of digital evidence.
c) Using forensic tools to analyze computers and storage devices.
d) Maintaining a proper chain of custody for the evidence.
Answers: b) Preserving the integrity of digital evidence, c) Using forensic tools to analyze computers and storage devices, d) Maintaining a proper chain of custody for the evidence
Select three correct outcomes of bridging the digital divide.
a) Increased social and economic inequality.
b) Improved access to information and knowledge for all sections of society.
c) Enhanced opportunities for education and skill development.
d) Greater participation in the digital economy.
Answers: b) Improved access to information and knowledge for all sections of society, c) Enhanced opportunities for education and skill development, d) Greater participation in the digital economy
Which three are key features of a robust data protection policy for a company?
a) Collecting only the personal data that is necessary.
b) Sharing user data with any third party without consent.
c) Implementing security measures to protect data from breaches.
d) Having a clear policy on how data is stored and used.
Answers: a) Collecting only the personal data that is necessary, c) Implementing security measures to protect data from breaches, d) Having a clear policy on how data is stored and used
The IT Act's provisions for "protected systems" are important for which three sectors?
a) The informal sector like street vendors.
b) National defense and security organizations.
c) Banking and financial institutions.
d) Critical infrastructure like power and transportation.
Answers: b) National defense and security organizations, c) Banking and financial institutions, d) Critical infrastructure like power and transportation
Which three legal remedies might be available to a victim of cyber bullying?
a) Filing a complaint with the cyber crime cell.
b) Seeking an injunction from a court to stop the harassment.
c) Claiming damages for mental harassment.
d) Physically confronting the bully.
Answers: a) Filing a complaint with the cyber crime cell, b) Seeking an injunction from a court to stop the harassment, c) Claiming damages for mental harassment
The role of the judiciary in cyber law involves which three aspects?
a) Interpreting the provisions of the IT Act.
b) Adjudicating cases related to cyber crimes.
c) Issuing guidelines for the investigation of cyber crimes.
d) Developing new software for the government.
Answers: a) Interpreting the provisions of the IT Act, b) Adjudicating cases related to cyber crimes, c) Issuing guidelines for the investigation of cyber crimes
Identify three ways to promote cyber awareness among citizens.
a) Ignoring the need for digital literacy.
b) Conducting workshops and seminars in schools and communities.
c) Running public awareness campaigns about safe online practices.
d) Incorporating cyber safety lessons into the educational curriculum.
Answers: b) Conducting workshops and seminars in schools and communities, c) Running public awareness campaigns about safe online practices, d) Incorporating cyber safety lessons into the educational curriculum
The concept of jurisdiction in cyber law is complex because of which three reasons?
a) A cyber crime can be committed from one country against a victim in another.
b) Digital evidence can be stored on servers located in different countries.
c) The internet has no physical boundaries.
d) All countries have identical cyber laws.
Answers: a) A cyber crime can be committed from one country against a victim in another, b) Digital evidence can be stored on servers located in different countries, c) The internet has no physical boundaries
Which three of the following are responsibilities of an intermediary (like a social media platform) under the IT Act?
a) To actively monitor all content posted by users at all times.
b) To publish their rules and regulations and a privacy policy.
c) To act upon receiving actual knowledge of illegal content (via court order or government directive).
d) To guarantee the truthfulness of every user's post.
Answers: b) To publish their rules and regulations and a privacy policy, c) To act upon receiving actual knowledge of illegal content (via court order or government directive)
The punishment for identity theft under the IT Act can include which three?
a) Imprisonment.
b) A fine.
c) Being awarded a new identity.
d) Liability to pay compensation to the victim.
Answers: a) Imprisonment, b) A fine, d) Liability to pay compensation to the victim
Select three correct statements about the admissibility of electronic evidence.
a) The IT Act provides for the admissibility of electronic records as evidence.
b) Electronic evidence is never accepted in Indian courts.
c) Specific conditions regarding the reliability of the source must be met.
d) It is treated on par with documentary evidence.
Answers: a) The IT Act provides for the admissibility of electronic records as evidence, c) Specific conditions regarding the reliability of the source must be met, d) It is treated on par with documentary evidence
Ethical hacking is characterized by which three principles?
a) It is done with malicious intent to cause damage.
b) It is performed with the explicit permission of the system owner.
c) Its purpose is to find vulnerabilities to improve security.
d) The findings are used to fix security flaws, not exploit them.
Answers: b) It is performed with the explicit permission of the system owner, c) Its purpose is to find vulnerabilities to improve security, d) The findings are used to fix security flaws, not exploit them