/100 Information Technology ActPractice Test 1 1 / 100The Information Technology Act, 2000 applies to offences committed Any where in India only Anywhere in India except in the state of Jammu and Kashmir In India and outside India only If the offender is an Indian national In India and outside India by any person 2 / 100What type of cyber-crime, its laws and punishments does section 66 of the Indian Information Technology Act holds? Putting antivirus into the victim Stealing data Cracking or illegally hack into any system Stealing hardware components 3 / 100What does ‘Identity Theft’, for which punishment is provided under the Information Technology Act, mean? Signing of a document by an unauthorized person Falsely representing before certifying authority as authorized person Removing movable or tangible computer parts out of the possession of the owner Fraudulently and dishonesty making use of the electronic signature, password or other unique identification of other persons 4 / 100What is the punishment in India for stealing computer documents, assets or any software’s source code from any organization, individual, or from any other means? 1 year of imprisonment and a fine of Rs. 1,00,000 6 months of imprisonment and a fine of Rs. 50,000 2 years of imprisonment and a fine of Rs. 2,50,000 3 years of imprisonment and a fine of Rs. 5,00,000 5 / 100What is meaning of “Cyber Security”? Protecting information in computer Protecting computer equipment, devices or communications Protecting the computer or network access All of the above 6 / 100According to Section 25 of the Information Technology Act, 2000, the ‘Controller’ may revoke the license regarding issue of electronic signature certificate issued under Section 21 of the Act: By making an inquiry and without giving a reasonable opportunity of showing cause against the proposed revocation Without making an inquiry but by giving a reasonable opportunity of showing cause against the proposed revocation By making an inquiry and by giving a reasonable opportunity of showing cause against the proposed revocation Without making an inquiry and without giving a reasonable opportunity of showing cause against the proposed revocation 7 / 100Hina wants to store income tax records of the last three years in electronic form. However, she is not sure whether it will satisfy legal requirement should there be a need to produce those records at a later date before appropriate authority. Advise her by selecting the most appropriate answer:- She can store the records in electronic form only if they are retrievable, usable and can be accurately reproduced at a later date She can store the records on any media as long as she is able to retrieve it at a later date She can store the records in electronic form on CD-ROM No problem, she can store the records in electronic form on a floppy disk 8 / 100What is/are component of Information Technology Act 2000? Legal Recognition to Digital Signatures Digital Certificates Regulation of Certification Authorities All the above 9 / 100Which of the following is sensitive personal information according to rule 3 of the Information Technology (Reasonable Security Practices and Procedures and Sensitive Data or Information) Rules, 2011? 1. Credit card details 2. Medical records 3. Mobile number 4. Sexual orientation Choose the correct option from below: 1, 3 and 4 are correct 1, 2 and 3 are correct All of these are correct 1, 2 and 4 are correct 10 / 100The penalty for damage to computer, computer system, etc. as laid down in Section 43 of the Information Technology Act, 2000 Shall extend to compensation not exceeding twenty five lakh rupees to the person so affected Shall extend to compensation not exceeding fifty lakh rupees to the person so affected Shall extend to compensation not exceeding ten lakh rupees to the person so affected Shall extend to compensation not exceeding one crore rupees to the person so affected 11 / 100Publication of obscene material is punishable under:- None of the above Section 293 of Indian Penal Code (A) and (B) both Section 67 of Information Technology Act 12 / 100A accesses the e-mail of B unauthorisedly by cracking password and further uses B’s e-mail to send message to B’s uncle pretending that the message is sent by B, requests for depositing thirty thousand rupees in the account number given in the e-mail as his cash has been stolen and he has to urgently deposit the college fees. A commits contravention/offence under which sections of the Information Technology Act, 2000? Sections 66C and 67 Sections 43(C), 67 and 66D Sections 43(F) and 66C Sections 66C and 66D 13 / 100A digital signature certificate issued by a certifying authority. Can never be revoked Can be revoked if the subscriber makes a request Can be revoked if there is a disagreement between the partners of a firm Can be revoked depending upon the kind of certificate issued 14 / 100Which are the grounds which section 80 covers? Not to commit To commit Of not having committed Of committing 15 / 100Santosh has managed to obtain the password to Vina’s e-mail account. He has been regularly accessing Vina’s e-mail account and reading all her mails. Select the most appropriate answer:- Santosh is liable for trespass under the Indian Penal Code Santosh is liable for hacking under the Information Technology Act Santosh may be liablefor unauthorised access and hacking under the Information Technology Act Santosh is liable for unauthorised access under the Information Technology Act 16 / 100In which of the following judgments has the Supreme Court struck down Section 66A of the Information Technology Act, 2000? PUCL v. Union of India, (1997) 1 SCC 301 Selvi and Others v. State of Karnataka, (2010) 7 SCC 263 Amar Singh v. Union of India, (2011)7 SCC 67 Shreya Singhal v. Union of India, AIR 2015 SC 1523 17 / 100Which are the sections of Information Technology Act applicable for Cyber pornography? 67, 67C, 670 67, 67A, 67B None of the above 66, 66A, 66B 18 / 100Hacking with computer system is defined by Information Technology Act in:- Section 69 Section 65 Section 66 Section 67 19 / 100What is the updated version of the Information Technology Act, 2000? Information Technology Act, 2007 Information Technology Act, 2008 Advanced Information Technology Act, 2008 Advanced Information Technology Act, 2007 20 / 100Unauthorized use of other’s trademark which may leads to trademark infringement and or passing-off is known as- Meta-Hacking Meta-Fixing Meta-tagging Meta-Catching 21 / 100Under the Information Technology Act: 1. Intermediary is not liable for any third party information if its function is limited to providing access to a communication system. 2. Intermediary is not liable if it does not initiate the transmission, does not select receiver and does not select information. 3. Intermediary is not liable if he aids or induces the third party to commit unlawful act. Which of the statements given above is/are correct? 1, 2 and 3 1 and 2 only 2 and 3 only 1 only 22 / 100Digital Signature authenticates the electronic record by use of Biometrics information All of these Asymmetric cryptosystem Symmetric cryptosystem 23 / 100What is/are ways of committing the offence of “Cyber Crime”? e-mail gambling All of the above Virus attacks Unauthorised access to computer systems or hacking 24 / 100The offences under Section 66B, 66C, 66D and 66E of Information Technology Act, 2000, are: Sessions Triable Non-bailable Cognizable None of the above 25 / 100A person, who sends, generates, stores or transmits any electronic message; or causes any electronic message to be sent, generated, stored or transmitted to any other person, is called: Intermediary Sender Generator Originator 26 / 100Under the provisions of the Information Technology Act, 2000 the responsibility of intermediary regarding objectionable content being used to commit the unlawful act extends to: 1. immediately take down the content as soon as intermediaries receive information. 2. taking it down after receiving Court order asking intermediary to expeditiously remove or disable access to certain material. 3. taking it down after receiving Government order asking intermediary to expeditiously remove or disable access to certain material. Which of the statements given above is/are correct? 2 only 1 2 and 3 3 only 27 / 100Where a person causes or is likely to cause death or damage to or destruction of property by denying access to any person who is authorized to access computer resource or introducing or causing to introduce any computer contamination, with the intention of threatening integrity or sovereignty of India or to strike terror in India, is punishable under Information Technology Act as Cyber Terrorism Hacking of Computer Internet Piracy Cyber Squatting 28 / 100The Information Technology Act provides that All offences under the Act are compoundable None of the offence under this Act are compoundable Offences other than those committed against a company or corporation are compoundable Offences other than those punishable for a term exceeding three years and other than those against child or woman are not compoundable 29 / 100Information Technology (IT) Act 2000 came into force on . . . . . . . .? 17th October 2000 9th June 2000 1st October 2000 1st June 2000 30 / 100Sunil is suspected of publishing false digital signature certificates. Sunil is very clever. He creates the false digital signatures certificate using his home computer but sends the certificate using a public computer from a cyber cafe. Suggest the most appropriate method which the law enforcement officials may adopt to arrest Sunil:- Obtain a search and arrest warrant and arrest him from his house Immediately raid his house and arrest him on grounds of suspicion Conduct the raid on cyber cafe and arrest him while he is mailing the false digital signature certificate Obtain an arrest warrant and arrest him from the cyber cafe 31 / 100Which section of Information Technology Act deals with Cyber terrorism? Section 66A Section 66C Section 66F Section 66B 32 / 100Which of the following is not a type of peer-to-peer cyber crime? Phishing Injecting Trojans to a target victim MiTM Credit card details leak in deep web 33 / 100The police suspects Rana of aiding terrorists by arranging safe house and finance. The Police has realized that Rana has several e-mail accounts and operates those e-mail accounts using aliases. The police wants to access the e-mail messages being sent and received by Rana to confirm its suspicion. Select the most appropriate method which may be used by the police to access Rana’s e-mail account:- Detain him on charges of suspicion and ask for judicial custody from a court till the police completes its investigation and make further arrests. The police can obtain the passwords from his arrested associates Arrest him and interrogate him so that he gives the password to all his e-mail accounts Crack the password of his e-mail account by installing a 'Trojan programme' in his computer without his knowledge Obtain an order from the appropriate authority directing him to hand over the passwords to the police 34 / 100Controller of Certifying Authorities (CCA) work under? Reserve Bank of India Ministry of Communication and Information Technology Autonomous body Prime Minister Office 35 / 100A private key and its mathematically related public key, which are so related that the public key, can verify a digital signature created by the private key, in an Asymmetric Crypto system means: Soft keys Key pair Both keys Soft pair 36 / 100Section 1(2) of the Information Technology Act, 2000 states that It shall extend to the whole of India except Jammu and Kashmir It applies only to any offence or contravention committed outside India by any person It shall extend to whole of India and it applies also to any offence or contravention thereunder committed outside India by any person It shall extend to the whole of India only 37 / 100How many schedules are there in Information Technology Act 2000? 3 4 6 2 38 / 100Digital Signature Certificate under the Information Technology Act is issued by:- Certifying Authority Deputy Controller of Certifying Authorities Controller of Certifying Authorities None of these 39 / 100By which Act of 2000, some sections relating to forgery under the IPC (Indian Penal Code), were amended? The Cr.P.c. (Amendment) Act The Information Technology Act The Indian Evidence (Amendment) Act The Trade Mark Act 40 / 100If the digital signature of any subscriber is alleged to have been affixed to an electronic record, the fact that such digital signature is the digital signature of the subscriber must be proved, except in the case of a: Computerised digital signature Secure digital signature Certified digital signature Official digital signature 41 / 100Cyber security’ according to the Information Technology Act, 2000 means Any electronic, magnetic, optical or other high speed data processing device or system which performs logical, arithmetic and memory functions by manipulation of electronic, magnetic or optical impulse Affixing with its grammatical variations and cognate expressions means adoption of any methodology or procedure by a person for the purpose of authenticating an electronic record A device and collection of devices, including input and output support devices and excluding calculations which are not programmable and capable of being used Protecting information, equipment, devices, computer, computer, computer resource, communication device and information stored therein from unauthorised access, use, disclosure, disruption, modification or destruction 42 / 100For the purpose of Section 13 of the Information Technology Act, 2000, if the originator or the addressee has more than one place of business, which one of the following shall be the place of business? Any of the places of business Principal place of business Place of residence Latest place of business 43 / 100Which one of the following offences is considered as cognizable under the provisions of the Information Technology Act, 2000? The offences punishable with imprisonment of four years and above The offences punishable with imprisonment of three years and above The offences punishable with imprisonment of five years and above The offences punishable with imprisonment of two years and above 44 / 100What is not the definition of Hacking? Valid concept The gaining of unauthorized access to data in a system or computer Deliberate deception to secure unfair or unlawful gain Breaking into computer system 45 / 100Which one of the following is the punishment for cyber terrorism under the Information Technology Act, 2000? Imprisonment for life 10 years rigorous imprisonment 7 years rigorous imprisonment 5 years rigorous imprisonment 46 / 100Under the provisions of the Information Technology Act, 2000, who among the following has power to suspend or revoke digital signature certificate? Subscriber listed in the digital signature certificate Certifying Authority which has issued a digital signature certificate Controller of certifying authorities Adjudicating officer appointed under Section 46(1) of the Act 47 / 100Which one of the following Sections of the Information Technology Act, 2000, provides for Audit of documents etc. maintained in electronic form? Section 10 Section 6A Section 8 Section 7A 48 / 100Which one of the following Sections of the Information Technology Act, 2000, deals with punishment for tampering with computer source documents? Section 64 Section 65 Section 66 Section 67 49 / 100Hacking under the Information Technology Act, 2000 means:- Unauthorized access to another person's computer system Deleting information stored in another person's computer system Knowingly or intentionally deleting information stored in another person's computer system Knowingly or intentionally deleting valuable information stored in another person's computer system 50 / 100Information Technology Act 2000 amended various sections of which of the following Acts? All of the above Indian Penal Code 1860 Reserve Bank of India Act 1934 Indian Evidence Act 1872 & Bankers Book Evidence Act 1891 51 / 100Under the provision of the Information Technology Act, 2000, an application for renewal of a license shall be made in such form, accompanied by such fee, not exceeding five thousand rupees, as may be prescribed by the Central Government and shall be made not less than in how many days before the date of expiry of the period of validity of the license? Ninety days Forty five days Sixty days Thirty days 52 / 100According to the provisions of the Prevention of Corruption Act 1988, which one of the following is NOT correct? In Kanpur, a Deputy Superintendent of Police is authorized to investigate a matter generally without order of the Metropolitan Magistrate /Magistrate of the first class A Sub-Inspector of Delhi Special Police Establishment, is authorized to investigate a matter generally without order of the Metropolitan Magistrate/Magistrate of the first class In Ahmedabad, an Assistant Commissioner of Police is authorized to investigate a matter generally without order of the Metropolitan Magistrate/Magistrate of the first class In Mumbai, an Assistant Commissioner of Police is authorized to investigate a matter generally without order of the Metropolitan Magistrate/Magistrate of the first class 53 / 100What is the punishment for identity theft in Information Technology Act? Three year imprisonment or 2 lakh rupees penalty or both Twoyear imprisonment or 1 lakh rupees penalty or both None of the above Three year imprisonment or 1 lakh rupees penalty or both 54 / 100Public key under the Information Technology Act, 2000 means . . . . . . . . The key used by group The key of a key pair used to verify a digital signature and listed in the Digital Signature Certificate The key pair as mentioned by State Government All of these 55 / 100What is/are classification of cyber crime? Cyber stalking Harassment via e-mail Dissemination of obscene material All of the above 56 / 100Which of the following related with ‘Digital Signature’? All of the above Public key Authentication of electronic records Private key 57 / 100The Supreme Court of India has stuck down Section 66A of the Information Technology Act, 2000, for violation of which one of the following Articles of the Constitution of India? Article 20 Article 19(1)(a) Article 21 Article 14 58 / 100In which of the following cases the reservation for Jats was struck down? Prem Kumar Singh v. State of Uttar Pradesh, 2011 (3) ALJ 343 Ram Singh v. Union of India, 2015 (3) SCALE 570 Uttar Pradesh Power Corpn. Ltd. v. Rajesh Kumar, AIR 2012 SC 2728 Dr. Gulshan Prakash v. State of Haryana, (2009) 14 SCALE 290 59 / 100The adjudicating officer under section 46 of the Information Technology Act, shall exercise jurisdiction to adjudicate the matter in which claim of loss does not exceed to Five Crores Three Crores Ten Crores Two Crores 60 / 100The Information Technology (Amendment) Act, 2008 strengthened the law to combat cyber crime. On which date such Amendment Act came into force? On 27th October, 2009 On 17th October, 2008 On 27th October, 2008 On 17th October, 2009 61 / 100Which of the following case is related to Information Technology Act Shreya Singhal v. Union of India Lata Singh v. State of Uttar Pradesh P. Rathinam case Ajay Hasia case 62 / 100As per Information Technology Act 2000, Those who Fail to furnish documents will be penalized upto 150,000 25000 5000 per day 50000 63 / 100Punishment for Breach of Confidentiality and Privacy of Information Technology Act offence is . . . . . . . . Imprisonment up to 3 years Imprisonment up to 2 years Imprisonment up to 5 years Imprisonment up to 10 years 64 / 100Which section of Information Technology Act was invalidated by Supreme Court of India Section 66D Section 66F Section 66A Section 66B 65 / 100“Cyber Crime” includes Security or financial crime Pornography All of the above On-line gambling and cyber terrorism 66 / 100Under the Information Technology Act, 2000, a Certifying Authority may revoke a Digital Signature Certificate . . . . . . . . Upon the dissolution of the firm or winding up of the company where the subscriber is a firm or a company On request by the subscriber All of these On death of the subscriber 67 / 100‘Subscriber’, according to Section 2(ZG) of the Information Technology Act, 2000, means a person: Who sends, generates any Electronic Signature Certificate In whose name the Electronic Signature Certificate is issued Who issues the Electronic Signature Certificate Who helps in the issue of Electronic Signature Certificate 68 / 100Controller of Certifying Authorities under the Information Technology Act is appointed by:- None of the above State Government Central Government IT (Information Technology) Secretary, Government of India 69 / 100What is the penalty for destroying computer source code? Three year imprisonment or 3 lakh rupees penalty or both Three year imprisonment or 2 lakh rupees penalty or both Three year imprisonment or 5 lakh rupees penalty or both Two year imprisonment or 2 lakh rupees penalty or both 70 / 100The Information Technology Amendment Act came into force in; 2007 2009 2008 2010 71 / 100The section deals with the use of electronic records and digital signature in Government and its agencies Section 7 Section 5 Section 6 Section 3 72 / 100Under the provisions of the Information Technology Act, 2000, which of the following statements about Cyber Terrorism are correct? 1. It is an independent offence 2. It was incorporated by the Information Technology (Amendment) Act, 2008 3. The seriousness of cyber terrorism as offence is reflected in the fact that it does not need mens rea as element of crime 4. It is defined under Section 66F of the Act Select the correct answer using the given below: 3 and 4 only 1, 2, 3 and 4 1, 2 and 3 only 1, 2 and 4 only 73 / 100Under the Information Technology Act protected system means:- Declared protected system by Central Government only Declared protected system by State Government only Declared protected system by appropriate Government A system which is resistant to all known attacks 74 / 100Which is the appeal court on the orders issued by Cyber appellate tribunal? Supreme Court Munsiff Court District Court High Court 75 / 100The section deals with legal recognition of digital signature Section 4 Section 6 Section 3 Section 5 76 / 100The police has arrested Roma for publishing pornography in electronic form. Police wants to produce the images recovered from Roma’s website as evidence. The Police, however, is not sure whether such evidence will be admissible in court. In the light of these facts, select the most appropriate answer:- The court cannot admit the printouts as evidence The Court can admit the printouts as evidence if the police attach a certificate saying that the requirement of admissibility of digital evidence have been fulfilled The Court can admit the printouts of the original image files as evidence The Court can admit copies of the original image files as evidence 77 / 100Which section of Information Technology Act deals with Hacking of computer systems and its penalties? Section 67 Section 65 Section 62 Section 66 78 / 100According to the Information Technology Act, 2000, an electronic record is deemed to be received at a place where addressee Retrieves the record Has his server All these Has his place of business 79 / 100Under the provisions of the Information Technology Act, 2000, ‘cyber cafe’ means: A place having internet connection An establishment having internet access Any facility from where access to the internet is offered by any person in the ordinary course of business to the members of the public An establishment having 24 hours internet access 80 / 100Under the Information Technology Act, which of the following is true? The controller can compound any contravention either before or after the institution of adjudication proceedings The Controller cannot compound any contraventions The controller will have to seek the permission of Central Government for compounding of any contravention The controller is bound to impose penalty prescribed by the Act in case of all contraventions 81 / 100What is the time limit for filing appeal against the order of Cyber appellate tribunal? 45 days 90 days 30 days 60 days 82 / 100Mona is confused about ‘asymmetric encryption’ Clarify her doubts by choosing the most appropriate statement: A message encrypted with a public key can only be decrypted with a private key A message encrypted with a symmetric key can only be decrypted with the same encrypting key A message encrypted with a public key can only be decrypted with the corresponding private key A message encrypted with a private key can only be decrypted with a public key 83 / 100Information Technology (Amendment) Act, 2008 has come into force in? January 2008 October 2009 October 2008 January 2009 84 / 100What are statutes to combat cyber crime? Information Technology Act All of the above Indian Penal Code Copyright Act 85 / 100Information technology Act, 2000 came into enforce on 17th October, 2000 20th December, 2000 17th September, 2000 10th October, 2000 86 / 100Select the most appropriate statement about a recognized foreign certifying authority (CA) in India:- A recognized foreign Certifying Authority is a Certifying Authority recognized by the Controller of certifying authorities and previously approved by the Central Government A recognized foreign Certifying Authority is a Certifying Authority for the purposes of the Information Technology Act A recognized foreign Certifying Authority is recognized in India as a Certifying Authority A foreign Certifying Authority is a Certifying Authority previously approved by the Central Government before being recognized by the Controller and is required to be notified in the Official Gazette 87 / 100Which Section of the Information Technology Act, 2000 deals with ‘authentication of electronic records’? Section 6 Section 4 Section 5 Section 3 88 / 100The Information Technology Act, 2000 provides that: Offences other than those committed against a company or corporation are compoundable Offences other than those punishable by imprisonment for life or for a term exceeding three years are compoundable with certain exceptions None of the offences under this Act are compoundable All offences under the Act are compoundable 89 / 100What is the proposed punishment for Cyber Terrorism in Information Technology Act? 10 year imprisonment 1 Crore rupees penalty 6 year imprisonment Life Imprisonment 90 / 100Under which section of Information Technology Act, stealing any digital asset or information is written a cyber-crime. 70 67 65 65-D 91 / 100Which of the following Sections of the Information Technology Act, 2000, was/were dealt with in the Shreya Singhal v. Union of India case? Section 66A, Section 69A and Section 79 Section 69A and Section 79 only Section 69A only Section 66A only 92 / 100The Certifying Authority empowered to issue a Digital Signature Certificate shall have to procure a license from the . . . . . . . . to issue Digital Signature Certificates. State government Central government Controller of Certifying Authority Commissioner 93 / 100Which Section of the Information Technology (Amendment) Act, 2008 deals with the validity of contracts formed through electronic means: Section 10A Section 12 Section 11 Section 13 94 / 100Who of the following on acting in good faith are protected from prosecution under Section 84 of the Information Technology Act, 2000? The Subscriber The Originator The Controller All the above 95 / 100Who can investigate the cyber crime under the Information Technology Act? Deputy Superintendent of Police Any of the above Sub-Inspector of Police Inspector of Police 96 / 100The Information Technology Act, 2000 applies to which of the following transactions/documents? All these Promissory note Trust Electronic cheque 97 / 100What is the name of the IT (Information Technology) law that India is having in the Indian legislature? India's Technology (IT) Act, 2000 India's Information Technology (IT) Act, 2000 The Technology Act, 2008 India's Digital Information Technology (DIT) Act, 2000 98 / 100Cyber Crime relates to Internet All of the above Computer e-mail 99 / 100What do we understand by ‘key pair’ under the Information Technology Act? It is a private key having both symmetric and asymmetric crypto features It is a private key and its mathematically related public key It is public key having both symmetric and syammetric crypto features It is an electronic key in the form of two passwords 100 / 100Which of the following statements is/are correct? 1. Under the Information Technology Act, 2000, the appellant can make a legal representation in person. 2. The appellant can authorize one or more legal practitioners to present his case before the Cyber Appellate Tribunal. 3. The provisions of the Limitation Act, 1963 are not applicable to an appeal before the Cyber Appellate Tribunal. 4. The Cyber Appellate Tribunal is bound by the procedure laid down by the Code of Civil Procedure, 1908. Select the correct answer using the give below:- 3 and 4 1, 2 and 4 1 and 2 only 2 only Thank you for completing your free MCQ practice test! To stay updated on upcoming tests, please provide your name and email below. Your score is LinkedIn Facebook Twitter 0% Restart quiz Average score : 18%LeaderboardPos.NameDurationPoints1Bhavi Vikal7 minutes 11 seconds14Best scoreYou must log in to see your results.ProgressYou must log in to see your results.