/100 Information Technology ActPractice Test 1 1 / 100Which Section of the Information Technology (Amendment) Act, 2008 deals with the validity of contracts formed through electronic means: Section 12 Section 10A Section 11 Section 13 2 / 100A private key and its mathematically related public key, which are so related that the public key, can verify a digital signature created by the private key, in an Asymmetric Crypto system means: Both keys Soft keys Soft pair Key pair 3 / 100The Supreme Court of India has stuck down Section 66A of the Information Technology Act, 2000, for violation of which one of the following Articles of the Constitution of India? Article 20 Article 19(1)(a) Article 14 Article 21 4 / 100The section deals with legal recognition of digital signature Section 4 Section 6 Section 3 Section 5 5 / 100Punishment for Breach of Confidentiality and Privacy of Information Technology Act offence is . . . . . . . . Imprisonment up to 10 years Imprisonment up to 5 years Imprisonment up to 2 years Imprisonment up to 3 years 6 / 100Publication of obscene material is punishable under:- (A) and (B) both Section 293 of Indian Penal Code None of the above Section 67 of Information Technology Act 7 / 100“Cyber Crime” includes Security or financial crime Pornography On-line gambling and cyber terrorism All of the above 8 / 100The Information Technology Act, 2000 provides that: Offences other than those committed against a company or corporation are compoundable None of the offences under this Act are compoundable Offences other than those punishable by imprisonment for life or for a term exceeding three years are compoundable with certain exceptions All offences under the Act are compoundable 9 / 100The Information Technology Act, 2000 applies to offences committed In India and outside India by any person Any where in India only In India and outside India only If the offender is an Indian national Anywhere in India except in the state of Jammu and Kashmir 10 / 100Which section of Information Technology Act was invalidated by Supreme Court of India Section 66A Section 66F Section 66B Section 66D 11 / 100According to the Information Technology Act, 2000, an electronic record is deemed to be received at a place where addressee All these Has his server Has his place of business Retrieves the record 12 / 100Which section of Information Technology Act deals with Cyber terrorism? Section 66C Section 66F Section 66A Section 66B 13 / 100Under the provisions of the Information Technology Act, 2000, who among the following has power to suspend or revoke digital signature certificate? Subscriber listed in the digital signature certificate Adjudicating officer appointed under Section 46(1) of the Act Controller of certifying authorities Certifying Authority which has issued a digital signature certificate 14 / 100Which of the following related with ‘Digital Signature’? Public key Private key All of the above Authentication of electronic records 15 / 100For the purpose of Section 13 of the Information Technology Act, 2000, if the originator or the addressee has more than one place of business, which one of the following shall be the place of business? Any of the places of business Place of residence Latest place of business Principal place of business 16 / 100What is the punishment for identity theft in Information Technology Act? None of the above Twoyear imprisonment or 1 lakh rupees penalty or both Three year imprisonment or 2 lakh rupees penalty or both Three year imprisonment or 1 lakh rupees penalty or both 17 / 100In which of the following cases the reservation for Jats was struck down? Prem Kumar Singh v. State of Uttar Pradesh, 2011 (3) ALJ 343 Dr. Gulshan Prakash v. State of Haryana, (2009) 14 SCALE 290 Ram Singh v. Union of India, 2015 (3) SCALE 570 Uttar Pradesh Power Corpn. Ltd. v. Rajesh Kumar, AIR 2012 SC 2728 18 / 100Which of the following case is related to Information Technology Act Lata Singh v. State of Uttar Pradesh Ajay Hasia case P. Rathinam case Shreya Singhal v. Union of India 19 / 100Which of the following is not a type of peer-to-peer cyber crime? Credit card details leak in deep web Injecting Trojans to a target victim Phishing MiTM 20 / 100Information Technology Act 2000 amended various sections of which of the following Acts? Reserve Bank of India Act 1934 Indian Evidence Act 1872 & Bankers Book Evidence Act 1891 All of the above Indian Penal Code 1860 21 / 100A digital signature certificate issued by a certifying authority. Can be revoked depending upon the kind of certificate issued Can never be revoked Can be revoked if there is a disagreement between the partners of a firm Can be revoked if the subscriber makes a request 22 / 100Where a person causes or is likely to cause death or damage to or destruction of property by denying access to any person who is authorized to access computer resource or introducing or causing to introduce any computer contamination, with the intention of threatening integrity or sovereignty of India or to strike terror in India, is punishable under Information Technology Act as Cyber Squatting Cyber Terrorism Hacking of Computer Internet Piracy 23 / 100Digital Signature authenticates the electronic record by use of Asymmetric cryptosystem All of these Symmetric cryptosystem Biometrics information 24 / 100The police has arrested Roma for publishing pornography in electronic form. Police wants to produce the images recovered from Roma’s website as evidence. The Police, however, is not sure whether such evidence will be admissible in court. In the light of these facts, select the most appropriate answer:- The court cannot admit the printouts as evidence The Court can admit the printouts of the original image files as evidence The Court can admit the printouts as evidence if the police attach a certificate saying that the requirement of admissibility of digital evidence have been fulfilled The Court can admit copies of the original image files as evidence 25 / 100The Information Technology (Amendment) Act, 2008 strengthened the law to combat cyber crime. On which date such Amendment Act came into force? On 27th October, 2008 On 27th October, 2009 On 17th October, 2008 On 17th October, 2009 26 / 100What is the time limit for filing appeal against the order of Cyber appellate tribunal? 60 days 30 days 90 days 45 days 27 / 100A accesses the e-mail of B unauthorisedly by cracking password and further uses B’s e-mail to send message to B’s uncle pretending that the message is sent by B, requests for depositing thirty thousand rupees in the account number given in the e-mail as his cash has been stolen and he has to urgently deposit the college fees. A commits contravention/offence under which sections of the Information Technology Act, 2000? Sections 66C and 67 Sections 43(C), 67 and 66D Sections 66C and 66D Sections 43(F) and 66C 28 / 100The section deals with the use of electronic records and digital signature in Government and its agencies Section 6 Section 7 Section 3 Section 5 29 / 100Under the provisions of the Information Technology Act, 2000 the responsibility of intermediary regarding objectionable content being used to commit the unlawful act extends to: 1. immediately take down the content as soon as intermediaries receive information. 2. taking it down after receiving Court order asking intermediary to expeditiously remove or disable access to certain material. 3. taking it down after receiving Government order asking intermediary to expeditiously remove or disable access to certain material. Which of the statements given above is/are correct? 1 2 only 3 only 2 and 3 30 / 100Under the Information Technology Act, 2000, a Certifying Authority may revoke a Digital Signature Certificate . . . . . . . . All of these On death of the subscriber On request by the subscriber Upon the dissolution of the firm or winding up of the company where the subscriber is a firm or a company 31 / 100Which section of Information Technology Act deals with Hacking of computer systems and its penalties? Section 62 Section 65 Section 66 Section 67 32 / 100Digital Signature Certificate under the Information Technology Act is issued by:- Deputy Controller of Certifying Authorities None of these Controller of Certifying Authorities Certifying Authority 33 / 100Santosh has managed to obtain the password to Vina’s e-mail account. He has been regularly accessing Vina’s e-mail account and reading all her mails. Select the most appropriate answer:- Santosh is liable for hacking under the Information Technology Act Santosh may be liablefor unauthorised access and hacking under the Information Technology Act Santosh is liable for unauthorised access under the Information Technology Act Santosh is liable for trespass under the Indian Penal Code 34 / 100What type of cyber-crime, its laws and punishments does section 66 of the Indian Information Technology Act holds? Cracking or illegally hack into any system Stealing data Putting antivirus into the victim Stealing hardware components 35 / 100Information Technology (IT) Act 2000 came into force on . . . . . . . .? 17th October 2000 1st June 2000 9th June 2000 1st October 2000 36 / 100Controller of Certifying Authorities under the Information Technology Act is appointed by:- State Government IT (Information Technology) Secretary, Government of India Central Government None of the above 37 / 100What is/are component of Information Technology Act 2000? All the above Legal Recognition to Digital Signatures Regulation of Certification Authorities Digital Certificates 38 / 100Who can investigate the cyber crime under the Information Technology Act? Sub-Inspector of Police Any of the above Inspector of Police Deputy Superintendent of Police 39 / 100Which of the following Sections of the Information Technology Act, 2000, was/were dealt with in the Shreya Singhal v. Union of India case? Section 66A, Section 69A and Section 79 Section 66A only Section 69A only Section 69A and Section 79 only 40 / 100Which one of the following offences is considered as cognizable under the provisions of the Information Technology Act, 2000? The offences punishable with imprisonment of two years and above The offences punishable with imprisonment of five years and above The offences punishable with imprisonment of three years and above The offences punishable with imprisonment of four years and above 41 / 100Mona is confused about ‘asymmetric encryption’ Clarify her doubts by choosing the most appropriate statement: A message encrypted with a private key can only be decrypted with a public key A message encrypted with a public key can only be decrypted with the corresponding private key A message encrypted with a symmetric key can only be decrypted with the same encrypting key A message encrypted with a public key can only be decrypted with a private key 42 / 100The Information Technology Act, 2000 applies to which of the following transactions/documents? Trust Electronic cheque All these Promissory note 43 / 100Sunil is suspected of publishing false digital signature certificates. Sunil is very clever. He creates the false digital signatures certificate using his home computer but sends the certificate using a public computer from a cyber cafe. Suggest the most appropriate method which the law enforcement officials may adopt to arrest Sunil:- Immediately raid his house and arrest him on grounds of suspicion Obtain an arrest warrant and arrest him from the cyber cafe Obtain a search and arrest warrant and arrest him from his house Conduct the raid on cyber cafe and arrest him while he is mailing the false digital signature certificate 44 / 100What is meaning of “Cyber Security”? Protecting computer equipment, devices or communications Protecting the computer or network access Protecting information in computer All of the above 45 / 100The Certifying Authority empowered to issue a Digital Signature Certificate shall have to procure a license from the . . . . . . . . to issue Digital Signature Certificates. Commissioner Controller of Certifying Authority Central government State government 46 / 100As per Information Technology Act 2000, Those who Fail to furnish documents will be penalized upto 50000 25000 5000 per day 150,000 47 / 100In which of the following judgments has the Supreme Court struck down Section 66A of the Information Technology Act, 2000? Shreya Singhal v. Union of India, AIR 2015 SC 1523 PUCL v. Union of India, (1997) 1 SCC 301 Selvi and Others v. State of Karnataka, (2010) 7 SCC 263 Amar Singh v. Union of India, (2011)7 SCC 67 48 / 100What is the penalty for destroying computer source code? Three year imprisonment or 2 lakh rupees penalty or both Three year imprisonment or 5 lakh rupees penalty or both Two year imprisonment or 2 lakh rupees penalty or both Three year imprisonment or 3 lakh rupees penalty or both 49 / 100According to Section 25 of the Information Technology Act, 2000, the ‘Controller’ may revoke the license regarding issue of electronic signature certificate issued under Section 21 of the Act: By making an inquiry and by giving a reasonable opportunity of showing cause against the proposed revocation By making an inquiry and without giving a reasonable opportunity of showing cause against the proposed revocation Without making an inquiry but by giving a reasonable opportunity of showing cause against the proposed revocation Without making an inquiry and without giving a reasonable opportunity of showing cause against the proposed revocation 50 / 100What is/are classification of cyber crime? Harassment via e-mail Dissemination of obscene material All of the above Cyber stalking 51 / 100Which are the grounds which section 80 covers? Of not having committed To commit Not to commit Of committing 52 / 100The Information Technology Amendment Act came into force in; 2009 2007 2008 2010 53 / 100The offences under Section 66B, 66C, 66D and 66E of Information Technology Act, 2000, are: Sessions Triable Cognizable Non-bailable None of the above 54 / 100What is the updated version of the Information Technology Act, 2000? Advanced Information Technology Act, 2008 Information Technology Act, 2008 Information Technology Act, 2007 Advanced Information Technology Act, 2007 55 / 100Select the most appropriate statement about a recognized foreign certifying authority (CA) in India:- A recognized foreign Certifying Authority is a Certifying Authority for the purposes of the Information Technology Act A recognized foreign Certifying Authority is a Certifying Authority recognized by the Controller of certifying authorities and previously approved by the Central Government A foreign Certifying Authority is a Certifying Authority previously approved by the Central Government before being recognized by the Controller and is required to be notified in the Official Gazette A recognized foreign Certifying Authority is recognized in India as a Certifying Authority 56 / 100If the digital signature of any subscriber is alleged to have been affixed to an electronic record, the fact that such digital signature is the digital signature of the subscriber must be proved, except in the case of a: Official digital signature Computerised digital signature Secure digital signature Certified digital signature 57 / 100Which one of the following Sections of the Information Technology Act, 2000, deals with punishment for tampering with computer source documents? Section 64 Section 67 Section 65 Section 66 58 / 100Cyber Crime relates to Computer e-mail Internet All of the above 59 / 100Which Section of the Information Technology Act, 2000 deals with ‘authentication of electronic records’? Section 4 Section 3 Section 6 Section 5 60 / 100The Information Technology Act provides that None of the offence under this Act are compoundable Offences other than those committed against a company or corporation are compoundable Offences other than those punishable for a term exceeding three years and other than those against child or woman are not compoundable All offences under the Act are compoundable 61 / 100‘Subscriber’, according to Section 2(ZG) of the Information Technology Act, 2000, means a person: Who helps in the issue of Electronic Signature Certificate Who issues the Electronic Signature Certificate Who sends, generates any Electronic Signature Certificate In whose name the Electronic Signature Certificate is issued 62 / 100Which of the following is sensitive personal information according to rule 3 of the Information Technology (Reasonable Security Practices and Procedures and Sensitive Data or Information) Rules, 2011? 1. Credit card details 2. Medical records 3. Mobile number 4. Sexual orientation Choose the correct option from below: 1, 2 and 4 are correct 1, 3 and 4 are correct All of these are correct 1, 2 and 3 are correct 63 / 100Under which section of Information Technology Act, stealing any digital asset or information is written a cyber-crime. 70 65 67 65-D 64 / 100Which one of the following is the punishment for cyber terrorism under the Information Technology Act, 2000? 10 years rigorous imprisonment Imprisonment for life 5 years rigorous imprisonment 7 years rigorous imprisonment 65 / 100Under the Information Technology Act protected system means:- Declared protected system by appropriate Government Declared protected system by State Government only Declared protected system by Central Government only A system which is resistant to all known attacks 66 / 100Under the provision of the Information Technology Act, 2000, an application for renewal of a license shall be made in such form, accompanied by such fee, not exceeding five thousand rupees, as may be prescribed by the Central Government and shall be made not less than in how many days before the date of expiry of the period of validity of the license? Forty five days Sixty days Ninety days Thirty days 67 / 100Unauthorized use of other’s trademark which may leads to trademark infringement and or passing-off is known as- Meta-Hacking Meta-Fixing Meta-Catching Meta-tagging 68 / 100Who of the following on acting in good faith are protected from prosecution under Section 84 of the Information Technology Act, 2000? All the above The Controller The Originator The Subscriber 69 / 100The police suspects Rana of aiding terrorists by arranging safe house and finance. The Police has realized that Rana has several e-mail accounts and operates those e-mail accounts using aliases. The police wants to access the e-mail messages being sent and received by Rana to confirm its suspicion. Select the most appropriate method which may be used by the police to access Rana’s e-mail account:- Detain him on charges of suspicion and ask for judicial custody from a court till the police completes its investigation and make further arrests. The police can obtain the passwords from his arrested associates Arrest him and interrogate him so that he gives the password to all his e-mail accounts Crack the password of his e-mail account by installing a 'Trojan programme' in his computer without his knowledge Obtain an order from the appropriate authority directing him to hand over the passwords to the police 70 / 100Hina wants to store income tax records of the last three years in electronic form. However, she is not sure whether it will satisfy legal requirement should there be a need to produce those records at a later date before appropriate authority. Advise her by selecting the most appropriate answer:- She can store the records in electronic form on CD-ROM She can store the records in electronic form only if they are retrievable, usable and can be accurately reproduced at a later date She can store the records on any media as long as she is able to retrieve it at a later date No problem, she can store the records in electronic form on a floppy disk 71 / 100The adjudicating officer under section 46 of the Information Technology Act, shall exercise jurisdiction to adjudicate the matter in which claim of loss does not exceed to Ten Crores Three Crores Two Crores Five Crores 72 / 100What do we understand by ‘key pair’ under the Information Technology Act? It is public key having both symmetric and syammetric crypto features It is an electronic key in the form of two passwords It is a private key having both symmetric and asymmetric crypto features It is a private key and its mathematically related public key 73 / 100According to the provisions of the Prevention of Corruption Act 1988, which one of the following is NOT correct? In Mumbai, an Assistant Commissioner of Police is authorized to investigate a matter generally without order of the Metropolitan Magistrate/Magistrate of the first class In Ahmedabad, an Assistant Commissioner of Police is authorized to investigate a matter generally without order of the Metropolitan Magistrate/Magistrate of the first class In Kanpur, a Deputy Superintendent of Police is authorized to investigate a matter generally without order of the Metropolitan Magistrate /Magistrate of the first class A Sub-Inspector of Delhi Special Police Establishment, is authorized to investigate a matter generally without order of the Metropolitan Magistrate/Magistrate of the first class 74 / 100What are statutes to combat cyber crime? All of the above Copyright Act Indian Penal Code Information Technology Act 75 / 100Information technology Act, 2000 came into enforce on 10th October, 2000 17th September, 2000 17th October, 2000 20th December, 2000 76 / 100Controller of Certifying Authorities (CCA) work under? Ministry of Communication and Information Technology Autonomous body Prime Minister Office Reserve Bank of India 77 / 100How many schedules are there in Information Technology Act 2000? 4 6 3 2 78 / 100Which of the following statements is/are correct? 1. Under the Information Technology Act, 2000, the appellant can make a legal representation in person. 2. The appellant can authorize one or more legal practitioners to present his case before the Cyber Appellate Tribunal. 3. The provisions of the Limitation Act, 1963 are not applicable to an appeal before the Cyber Appellate Tribunal. 4. The Cyber Appellate Tribunal is bound by the procedure laid down by the Code of Civil Procedure, 1908. Select the correct answer using the give below:- 1 and 2 only 1, 2 and 4 3 and 4 2 only 79 / 100Under the provisions of the Information Technology Act, 2000, which of the following statements about Cyber Terrorism are correct? 1. It is an independent offence 2. It was incorporated by the Information Technology (Amendment) Act, 2008 3. The seriousness of cyber terrorism as offence is reflected in the fact that it does not need mens rea as element of crime 4. It is defined under Section 66F of the Act Select the correct answer using the given below: 3 and 4 only 1, 2, 3 and 4 1, 2 and 4 only 1, 2 and 3 only 80 / 100What is the punishment in India for stealing computer documents, assets or any software’s source code from any organization, individual, or from any other means? 6 months of imprisonment and a fine of Rs. 50,000 1 year of imprisonment and a fine of Rs. 1,00,000 2 years of imprisonment and a fine of Rs. 2,50,000 3 years of imprisonment and a fine of Rs. 5,00,000 81 / 100What is the proposed punishment for Cyber Terrorism in Information Technology Act? 1 Crore rupees penalty 6 year imprisonment 10 year imprisonment Life Imprisonment 82 / 100By which Act of 2000, some sections relating to forgery under the IPC (Indian Penal Code), were amended? The Information Technology Act The Indian Evidence (Amendment) Act The Cr.P.c. (Amendment) Act The Trade Mark Act 83 / 100What is/are ways of committing the offence of “Cyber Crime”? e-mail gambling Virus attacks Unauthorised access to computer systems or hacking All of the above 84 / 100Under the Information Technology Act: 1. Intermediary is not liable for any third party information if its function is limited to providing access to a communication system. 2. Intermediary is not liable if it does not initiate the transmission, does not select receiver and does not select information. 3. Intermediary is not liable if he aids or induces the third party to commit unlawful act. Which of the statements given above is/are correct? 2 and 3 only 1 and 2 only 1 only 1, 2 and 3 85 / 100The penalty for damage to computer, computer system, etc. as laid down in Section 43 of the Information Technology Act, 2000 Shall extend to compensation not exceeding ten lakh rupees to the person so affected Shall extend to compensation not exceeding twenty five lakh rupees to the person so affected Shall extend to compensation not exceeding fifty lakh rupees to the person so affected Shall extend to compensation not exceeding one crore rupees to the person so affected 86 / 100Hacking under the Information Technology Act, 2000 means:- Knowingly or intentionally deleting valuable information stored in another person's computer system Deleting information stored in another person's computer system Knowingly or intentionally deleting information stored in another person's computer system Unauthorized access to another person's computer system 87 / 100Which is the appeal court on the orders issued by Cyber appellate tribunal? Munsiff Court High Court District Court Supreme Court 88 / 100What is not the definition of Hacking? The gaining of unauthorized access to data in a system or computer Valid concept Deliberate deception to secure unfair or unlawful gain Breaking into computer system 89 / 100Hacking with computer system is defined by Information Technology Act in:- Section 69 Section 65 Section 66 Section 67 90 / 100Which one of the following Sections of the Information Technology Act, 2000, provides for Audit of documents etc. maintained in electronic form? Section 7A Section 6A Section 10 Section 8 91 / 100Cyber security’ according to the Information Technology Act, 2000 means Protecting information, equipment, devices, computer, computer, computer resource, communication device and information stored therein from unauthorised access, use, disclosure, disruption, modification or destruction Affixing with its grammatical variations and cognate expressions means adoption of any methodology or procedure by a person for the purpose of authenticating an electronic record A device and collection of devices, including input and output support devices and excluding calculations which are not programmable and capable of being used Any electronic, magnetic, optical or other high speed data processing device or system which performs logical, arithmetic and memory functions by manipulation of electronic, magnetic or optical impulse 92 / 100A person, who sends, generates, stores or transmits any electronic message; or causes any electronic message to be sent, generated, stored or transmitted to any other person, is called: Sender Generator Originator Intermediary 93 / 100Under the provisions of the Information Technology Act, 2000, ‘cyber cafe’ means: Any facility from where access to the internet is offered by any person in the ordinary course of business to the members of the public A place having internet connection An establishment having 24 hours internet access An establishment having internet access 94 / 100Public key under the Information Technology Act, 2000 means . . . . . . . . The key pair as mentioned by State Government The key of a key pair used to verify a digital signature and listed in the Digital Signature Certificate All of these The key used by group 95 / 100Under the Information Technology Act, which of the following is true? The controller can compound any contravention either before or after the institution of adjudication proceedings The controller will have to seek the permission of Central Government for compounding of any contravention The controller is bound to impose penalty prescribed by the Act in case of all contraventions The Controller cannot compound any contraventions 96 / 100Information Technology (Amendment) Act, 2008 has come into force in? October 2009 January 2009 January 2008 October 2008 97 / 100Which are the sections of Information Technology Act applicable for Cyber pornography? 66, 66A, 66B 67, 67A, 67B 67, 67C, 670 None of the above 98 / 100What is the name of the IT (Information Technology) law that India is having in the Indian legislature? India's Digital Information Technology (DIT) Act, 2000 India's Information Technology (IT) Act, 2000 India's Technology (IT) Act, 2000 The Technology Act, 2008 99 / 100What does ‘Identity Theft’, for which punishment is provided under the Information Technology Act, mean? Fraudulently and dishonesty making use of the electronic signature, password or other unique identification of other persons Signing of a document by an unauthorized person Falsely representing before certifying authority as authorized person Removing movable or tangible computer parts out of the possession of the owner 100 / 100Section 1(2) of the Information Technology Act, 2000 states that It shall extend to the whole of India except Jammu and Kashmir It shall extend to the whole of India only It shall extend to whole of India and it applies also to any offence or contravention thereunder committed outside India by any person It applies only to any offence or contravention committed outside India by any person Thank you for completing your free MCQ practice test! To stay updated on upcoming tests, please provide your name and email below. Your score is LinkedIn Facebook Twitter 0% Restart quiz Average score : 19%LeaderboardPos.NameDurationPoints1Bhavi Vikal7 minutes 11 seconds14Best scoreYou must log in to see your results.ProgressYou must log in to see your results.