/100

Information Technology Act

Practice Test 1

1 / 100

The Information Technology Act, 2000 applies to offences committed

2 / 100

What type of cyber-crime, its laws and punishments does section 66 of the Indian Information Technology Act holds?

3 / 100

What does ‘Identity Theft’, for which punishment is provided under the Information Technology Act, mean?

4 / 100

What is the punishment in India for stealing computer documents, assets or any software’s source code from any organization, individual, or from any other means?

5 / 100

What is meaning of “Cyber Security”?

6 / 100

According to Section 25 of the Information Technology Act, 2000, the ‘Controller’ may revoke the license regarding issue of electronic signature certificate issued under Section 21 of the Act:

7 / 100

Hina wants to store income tax records of the last three years in electronic form. However, she is not sure whether it will satisfy legal requirement should there be a need to produce those records at a later date before appropriate authority. Advise her by selecting the most appropriate answer:-

8 / 100

What is/are component of Information Technology Act 2000?

9 / 100

Which of the following is sensitive personal information according to rule 3 of the Information Technology (Reasonable Security Practices and Procedures and Sensitive Data or Information) Rules, 2011?
1. Credit card details
2. Medical records
3. Mobile number
4. Sexual orientation
Choose the correct option from below:

10 / 100

The penalty for damage to computer, computer system, etc. as laid down in Section 43 of the Information Technology Act, 2000

11 / 100

Publication of obscene material is punishable under:-

12 / 100

A accesses the e-mail of B unauthorisedly by cracking password and further uses B’s e-mail to send message to B’s uncle pretending that the message is sent by B, requests for depositing thirty thousand rupees in the account number given in the e-mail as his cash has been stolen and he has to urgently deposit the college fees. A commits contravention/offence under which sections of the Information Technology Act, 2000?

13 / 100

A digital signature certificate issued by a certifying authority.

14 / 100

Which are the grounds which section 80 covers?

15 / 100

Santosh has managed to obtain the password to Vina’s e-mail account. He has been regularly accessing Vina’s e-mail account and reading all her mails. Select the most appropriate answer:-

16 / 100

In which of the following judgments has the Supreme Court struck down Section 66A of the Information Technology Act, 2000?

17 / 100

Which are the sections of Information Technology Act applicable for Cyber pornography?

18 / 100

Hacking with computer system is defined by Information Technology Act in:-

19 / 100

What is the updated version of the Information Technology Act, 2000?

20 / 100

Unauthorized use of other’s trademark which may leads to trademark infringement and or passing-off is known as-

21 / 100

Under the Information Technology Act:
1. Intermediary is not liable for any third party information if its function is limited to providing access to a communication system.
2. Intermediary is not liable if it does not initiate the transmission, does not select receiver and does not select information.
3. Intermediary is not liable if he aids or induces the third party to commit unlawful act.
Which of the statements given above is/are correct?

22 / 100

Digital Signature authenticates the electronic record by use of

23 / 100

What is/are ways of committing the offence of “Cyber Crime”?

24 / 100

The offences under Section 66B, 66C, 66D and 66E of Information Technology Act, 2000, are:

25 / 100

A person, who sends, generates, stores or transmits any electronic message; or causes any electronic message to be sent, generated, stored or transmitted to any other person, is called:

26 / 100

Under the provisions of the Information Technology Act, 2000 the responsibility of intermediary regarding objectionable content being used to commit the unlawful act extends to:
1. immediately take down the content as soon as intermediaries receive information.
2. taking it down after receiving Court order asking intermediary to expeditiously remove or disable access to certain material.
3. taking it down after receiving Government order asking intermediary to expeditiously remove or disable access to certain material.
Which of the statements given above is/are correct?

27 / 100

Where a person causes or is likely to cause death or damage to or destruction of property by denying access to any person who is authorized to access computer resource or introducing or causing to introduce any computer contamination, with the intention of threatening integrity or sovereignty of India or to strike terror in India, is punishable under Information Technology Act as

28 / 100

The Information Technology Act provides that

29 / 100

Information Technology (IT) Act 2000 came into force on . . . . . . . .?

30 / 100

Sunil is suspected of publishing false digital signature certificates. Sunil is very clever. He creates the false digital signatures certificate using his home computer but sends the certificate using a public computer from a cyber cafe. Suggest the most appropriate method which the law enforcement officials may adopt to arrest Sunil:-

31 / 100

Which section of Information Technology Act deals with Cyber terrorism?

32 / 100

Which of the following is not a type of peer-to-peer cyber crime?

33 / 100

The police suspects Rana of aiding terrorists by arranging safe house and finance. The Police has realized that Rana has several e-mail accounts and operates those e-mail accounts using aliases. The police wants to access the e-mail messages being sent and received by Rana to confirm its suspicion. Select the most appropriate method which may be used by the police to access Rana’s e-mail account:-

34 / 100

Controller of Certifying Authorities (CCA) work under?

35 / 100

A private key and its mathematically related public key, which are so related that the public key, can verify a digital signature created by the private key, in an Asymmetric Crypto system means:

36 / 100

Section 1(2) of the Information Technology Act, 2000 states that

37 / 100

How many schedules are there in Information Technology Act 2000?

38 / 100

Digital Signature Certificate under the Information Technology Act is issued by:-

39 / 100

By which Act of 2000, some sections relating to forgery under the IPC (Indian Penal Code), were amended?

40 / 100

If the digital signature of any subscriber is alleged to have been affixed to an electronic record, the fact that such digital signature is the digital signature of the subscriber must be proved, except in the case of a:

41 / 100

Cyber security’ according to the Information Technology Act, 2000 means

42 / 100

For the purpose of Section 13 of the Information Technology Act, 2000, if the originator or the addressee has more than one place of business, which one of the following shall be the place of business?

43 / 100

Which one of the following offences is considered as cognizable under the provisions of the Information Technology Act, 2000?

44 / 100

What is not the definition of Hacking?

45 / 100

Which one of the following is the punishment for cyber terrorism under the Information Technology Act, 2000?

46 / 100

Under the provisions of the Information Technology Act, 2000, who among the following has power to suspend or revoke digital signature certificate?

47 / 100

Which one of the following Sections of the Information Technology Act, 2000, provides for Audit of documents etc. maintained in electronic form?

48 / 100

Which one of the following Sections of the Information Technology Act, 2000, deals with punishment for tampering with computer source documents?

49 / 100

Hacking under the Information Technology Act, 2000 means:-

50 / 100

Information Technology Act 2000 amended various sections of which of the following Acts?

51 / 100

Under the provision of the Information Technology Act, 2000, an application for renewal of a license shall be made in such form, accompanied by such fee, not exceeding five thousand rupees, as may be prescribed by the Central Government and shall be made not less than in how many days before the date of expiry of the period of validity of the license?

52 / 100

According to the provisions of the Prevention of Corruption Act 1988, which one of the following is NOT correct?

53 / 100

What is the punishment for identity theft in Information Technology Act?

54 / 100

Public key under the Information Technology Act, 2000 means . . . . . . . .

55 / 100

What is/are classification of cyber crime?

56 / 100

Which of the following related with ‘Digital Signature’?

57 / 100

The Supreme Court of India has stuck down Section 66A of the Information Technology Act, 2000, for violation of which one of the following Articles of the Constitution of India?

58 / 100

In which of the following cases the reservation for Jats was struck down?

59 / 100

The adjudicating officer under section 46 of the Information Technology Act, shall exercise jurisdiction to adjudicate the matter in which claim of loss does not exceed to

60 / 100

The Information Technology (Amendment) Act, 2008 strengthened the law to combat cyber crime. On which date such Amendment Act came into force?

61 / 100

Which of the following case is related to Information Technology Act

62 / 100

As per Information Technology Act 2000, Those who Fail to furnish documents will be penalized upto

63 / 100

Punishment for Breach of Confidentiality and Privacy of Information Technology Act offence is . . . . . . . .

64 / 100

Which section of Information Technology Act was invalidated by Supreme Court of India

65 / 100

“Cyber Crime” includes

66 / 100

Under the Information Technology Act, 2000, a Certifying Authority may revoke a Digital Signature Certificate . . . . . . . .

67 / 100

‘Subscriber’, according to Section 2(ZG) of the Information Technology Act, 2000, means a person:

68 / 100

Controller of Certifying Authorities under the Information Technology Act is appointed by:-

69 / 100

What is the penalty for destroying computer source code?

70 / 100

The Information Technology Amendment Act came into force in;

71 / 100

The section deals with the use of electronic records and digital signature in Government and its agencies

72 / 100

Under the provisions of the Information Technology Act, 2000, which of the following statements about Cyber Terrorism are correct?
1. It is an independent offence
2. It was incorporated by the Information Technology (Amendment) Act, 2008
3. The seriousness of cyber terrorism as offence is reflected in the fact that it does not need mens rea as element of crime
4. It is defined under Section 66F of the Act
Select the correct answer using the given below:

73 / 100

Under the Information Technology Act protected system means:-

74 / 100

Which is the appeal court on the orders issued by Cyber appellate tribunal?

75 / 100

The section deals with legal recognition of digital signature

76 / 100

The police has arrested Roma for publishing pornography in electronic form. Police wants to produce the images recovered from Roma’s website as evidence. The Police, however, is not sure whether such evidence will be admissible in court. In the light of these facts, select the most appropriate answer:-

77 / 100

Which section of Information Technology Act deals with Hacking of computer systems and its penalties?

78 / 100

According to the Information Technology Act, 2000, an electronic record is deemed to be received at a place where addressee

79 / 100

Under the provisions of the Information Technology Act, 2000, ‘cyber cafe’ means:

80 / 100

Under the Information Technology Act, which of the following is true?

81 / 100

What is the time limit for filing appeal against the order of Cyber appellate tribunal?

82 / 100

Mona is confused about ‘asymmetric encryption’ Clarify her doubts by choosing the most appropriate statement:

83 / 100

Information Technology (Amendment) Act, 2008 has come into force in?

84 / 100

What are statutes to combat cyber crime?

85 / 100

Information technology Act, 2000 came into enforce on

86 / 100

Select the most appropriate statement about a recognized foreign certifying authority (CA) in India:-

87 / 100

Which Section of the Information Technology Act, 2000 deals with ‘authentication of electronic records’?

88 / 100

The Information Technology Act, 2000 provides that:

89 / 100

What is the proposed punishment for Cyber Terrorism in Information Technology Act?

90 / 100

Under which section of Information Technology Act, stealing any digital asset or information is written a cyber-crime.

91 / 100

Which of the following Sections of the Information Technology Act, 2000, was/were dealt with in the Shreya Singhal v. Union of India case?

92 / 100

The Certifying Authority empowered to issue a Digital Signature Certificate shall have to procure a license from the . . . . . . . . to issue Digital Signature Certificates.

93 / 100

Which Section of the Information Technology (Amendment) Act, 2008 deals with the validity of contracts formed through electronic means:

94 / 100

Who of the following on acting in good faith are protected from prosecution under Section 84 of the Information Technology Act, 2000?

95 / 100

Who can investigate the cyber crime under the Information Technology Act?

96 / 100

The Information Technology Act, 2000 applies to which of the following transactions/documents?

97 / 100

What is the name of the IT (Information Technology) law that India is having in the Indian legislature?

98 / 100

Cyber Crime relates to

99 / 100

What do we understand by ‘key pair’ under the Information Technology Act?

100 / 100

Which of the following statements is/are correct?
1. Under the Information Technology Act, 2000, the appellant can make a legal representation in person.
2. The appellant can authorize one or more legal practitioners to present his case before the Cyber Appellate Tribunal.
3. The provisions of the Limitation Act, 1963 are not applicable to an appeal before the Cyber Appellate Tribunal.
4. The Cyber Appellate Tribunal is bound by the procedure laid down by the Code of Civil Procedure, 1908.
Select the correct answer using the give below:-

Thank you for completing your free MCQ practice test! To stay updated on upcoming tests, please provide your name and email below.

Your score is

0%

Average score : 18%

Leaderboard

Pos.NameDurationPoints
1Bhavi Vikal7 minutes 11 seconds14

Best score

You must log in to see your results.

Progress

You must log in to see your results.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top