Thursday, 19 May 2016

Cyber Law Quiz 1 (50 questions)

1. World Computer Security Day:

(a)October 30 (b) November 30

(c) December 30 (d) January 30

Answer: (b)

2. Many cyber crimes come under the Indian Penal Code. Which one of the following is an example?

(a) Sending threatening messages by email

(b) Forgery of electronic records  

(c) Bogus websites

(d) All of these

Answer: (d)

3.  Information Technology Act, 2000  made amendment to which of the following existing laws?

(a) Indian Penal Code                        (b) Indian Evidence Act

(c) Bankers Book Evidence Act        (d) All of these

Answer: (d)

4. A ____ is a set of exclusive rights granted by a state to an inventor or his assignee for a limited period of time in exchange for a disclosure of an invention:

(a) Copyright (b) Blog

(c) Patent (d) Trademark

Answer: (c)

5. ____ gives the author of an original work exclusive right for a certain time period in relation to that work, including its publication, distribution and adaptation:

(a) Copyright (b) Copy left

(c) Patent (d) Trademark

Answer: (a)

6. The rental of software to consumers without the permission of the copyright holder known as

(a) Unbundling (b) Renting

(c) Counter Felting (d) Soft loading

Answer: (b)

7. Copying the materials published on the internet as one’s own  without proper acknowledgement is called _____:

(a) Internet Plagiarism (b) Internet reference

(c) Internet surfing (d) Internet publishing

Answer: (a)

8. Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit

of:

(a) Software Piracy (b) Cyber Crime

(c) Conventional Crime (d) None of these

Answer: (b)

9. _______  are a bundle of exclusive rights over creations of the mind, both artistic and commercial:

(a) Intellectual property rights (b) Copyright

(c) Patent (d) Trademark

Answer: (a)

10. Which of the following come under cyber crime?

(a)  Intellectual Property Crime (b) Pornography

(c) Online Gambling (d) All the above

Answer: (d)

11. Under the I.T. Act, whoever commits or conspires to commit cyber terrorism shall be punishable with imprisonment which may extend to ____.

(a) two years (b) five years

(c) ten years        (d) imprisonment for life

Answer: (d)

12. An unauthorized program which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing:

(a) Trojan Horse (b) Voyeur

(c) Diddling (d) Spamming

Answer: (a)

13. As per the IT (Amendment) Act 2008, Tampering with Computer Source Documents  shall be punishable with imprisonment up to years, or with

fine which may extend up to _____rupees, or with both.

(a) two lakh (b) three lakh

(c) four  lakh (d) five lakh

Answer: (a)

14. Which of the following is a cyber crime against individual?

(a) Email spoofing (b) Cyber Defamation

(c) Cyber stalking (d) All of these

Answer: (d)

15. The first cyber police station in Kerala was inagurated in:

(a) 2009   (b) 2010   (c) 2011  (d) 2012

Answer: (a)

16. Which of the following is an Intellectual Property crime?

(a) Theft of computer source code      

(b) Trademarks violations

(c) Software piracy

(d)  All of these

Answer: (d)

17. Altering raw data just before it is processed by a computer and then changing it back after the processing is completed, is termed:

(a) Salami Attack (b) Data diddling

(c) Computer voyeur (d) none of these

Answer: (b)

18. Use of computer resources to intimidate or coerce others, is termed:

(a) Cybernetics (b) Cyber terrorism

(c) Web hosting (d) none of these

Answer: (b)

19. The criminal reads or copies confidential or proprietary information,but the data is neither deleted nor changed- This is termed:

(a) Computer voyeur (b) Spamming

(c) Data diddling         (d) None of these

Answer: (a)

20. India’s first cyber police station was started at:

(a) Chennai (b) Bangalore

(c) New Delhi (d) Mumbai

Answer: (b)

21. Posting derogatory remarks about the employer on a social networking site is an example of:

(a) Hacking (b) Spamming

(c) Cyber defamation (d) Spoofing

Answer: (c)

22. The president of India who gave assent to Information Technology Act 2000:

(a) APJ Abdul Kalam  (b) K.R.Narayanan

(c) Pratibha Patil        (d) None of these

Answer: (b)

23. The IT (Amendment) Bill 2008 was passed by the two houses of the Indian Parliament on_____ 2008.

(a) December 23 and 24 (b)  February 7 and 8

(c) October 26 and 27 (d) Decemeber 30 and 31

Answer: (a)

24.Cyber crime can be defined as:

(a) A crime committed online

(b) Stealing of a computer

(c) Organising theft in a computer shop

(d) None of these

Answer: (a)

25. Cyber Laws are included in:

(a) Union List (b) State List

(c) Residuary Powers (d) Concurrent List

Answer: (c)

26. The seat of the Asian School of Cyber Laws:

(a)New Delhi (b) Pune

(c) Chennai (d)   Mumbai

Answer: (b)

27. The explicit portrayal of sexual subject matter is termed:

(a) Pornography (b) Spamming 

(c) Junking (d) None of these

Answer: (a)

28. _____refers to email that appears to have been originated from one source when it was actually sent from another source.

(a) Email bombing (b) Email spoofing

(c) Email spamming (d)  None of these

Answer: (b)

29. A type of cyber crime that occurs in pay per click onlineadvertising when a person, automated script or computer programimitates a legitimate user of a web browser clicking on an ad, for the purpose of generating a charge per click without having actualinterest in the target of the ad’s link.

(a) Phishing (b) Zombie

(c) Click fraud (d) None of these

Answer: (c)

30. Which of the following is a cyber crime?

( a) Hacking (b) Worm attack

(c) Virus attack (d) All of these

Answer: (d)

31. In cyber law terminology ‘DoS’ means:

(a) Denial of Service (b) Disc operating System

(c) Distant Operator service(d) None of these

Answer: (a)

32. A program that has capability to infect other programs and make copies of itself and spread into other programs is called:

(a) Worm (b) Virus

(c) Trojan (d) None of these

Answer: (b)

33. The Indian Parliament passed the Information Technology Bill , which is regarded as the mother legislation regulating the use of computers, computer systems and computer networks as also data and information in the electronic format , in the year:

(a) 2000 (b) 2001

(c) 2002 (d) 2003

Answer: (a)

34. Which one of the following is an example of ‘denial of serviceattack’?

(a) Attempts to “flood” a network, thereby preventing legitimate network traffic

(b) Attempts to disrupt connections between two machines, thereby preventing access to a service

(c) Attempts to prevent a particular individual from accessing a service

 (d)  All of these

Answer: (d)

35.  The use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization is termed:

(a) Cyberspace (b) Cyberstalking

(c) Pornography (d) None of these

Answer: (b)

36. _____ refers to a code of safe and responsible behavior for the internet community:

(a) Cyber crime (b) Cyber Literacy

(c) Cyber Ethics (d) None of the above

Answer: (c)

37. ____ is a theft in which the internet surfing hours of the victim are used up by another person by gaining access to the login ID and the password:

(a) Logic bombs (b) Salami attacks

(c)  Internet Time theft (d) Web jacking

Answer: (c)

38. _____ software programs are designed to keep computers safe from hackers:

(a) Fire Walls      (b) Cyber security measure

 (c) Cyber laws   (d) None of these

Answer: (a)

39. The compulsive use of internet pornography known as :

(a) Cyber Addiction (b) Cyber sex

(c) Information Overload (d) Cyber Crime

Answer: (b)

40. This unlawful act wherein the computer is either a tool or target or both:

(a) cyber ethics (b) Cyber Crimes

(c) Cyber literacy (d)None of these above

Answer: (b)

41. Cryptography is used for ______.

(a) Privacy                          (b) safety

(c) copyright purpose    (d) All of these

Answer: (d)

42. This is the exclusive right granted by statute to the author of the works to reproduce dramatic, artistic, literary or musical work or to authorize its

reproduction by others:

(a) Patent (b) Copy Right

(c)Trade Mark (d) None of the above

Answer: (b)

43. Which of the following is not harmful for computer?

(a) Spyware (b) Cookies

(c) Virus (d) Malware

Answer: (b)

44. Which one of the following is an example of unethical behavior of cyber world?

(a)  Communalism             (b) Eve teasing

(c) terrorism                       (d) Pirating Music and Videos

Answer: (d)

45. India passed the IT Act 2000 and notified it for effectiveness on:

(a) 2000 May 17 (b) 2000 June 9

(c) 2000 July 9 (d) 2000 October 17

Answer: (d)

46. Which of the following come under software piracy?

(a) Unbundling (b) Renting

(c)Counter Felting (d) All the above

Answer: (d)

47. Loosely organized groups of Internet criminals are called as:

(a) Cyber Criminals (b) Web Gangs

(c) Organized hackers (d) Crackers

Answer: (b)

48. Cryptography is the practice and study of ———.

(a) Accessing information (b) Hiding information

(c) Distributing information  (d) None of the above.

Answer: (b)

49. Feeling guilty or defensive about our internet use is a symptom of ________.

(a)  Cyber addiction (b) Net Gaming

(c) Online-Chatting (d) Cyber crime

Answer: (a)

50. Making distributing and selling the software copies those are fake, known as:

(a) Renting                        (b) Unbundling

(c) Soft Loading               (d)Counter felting

Answer: (d)

No comments:

Post a Comment