top of page

CYBER LAW - MCQ- 1

CYBER LAW - MCQ-1


(i)is a non-profit organisation which governs the domain names all over world in order to make the transaction on internet more secure and reliable.

(a)ICANN

(b)UDRP

(c)CEDRP

(d)ERDRP


(ii)Facilities can be availed through e-banking :

(a)Withdrawal of money from ATMs

(b)Payment towards purchases

(c)Credit cards, debit cards and smart cards

(d)(a), (b) and (c)


(iii)E-publishing products includes :

(a)Database and online catalogue

(b)File sharing

(c)(a) and (b)

(d)None of above


(iv)First case in Indiawith regard to cybersquatting was :

(a)Rediff Communication V. Cyberbooth and Ans.

(b)Tata Sons Ltd and Ans. V Fashion ID Limited

(c)Dr. Reddy's Laboratories Limited V. Manu Kosuri and Ans.

(d)Yahoo! Inc V. Akash Arora and Ans.


(v)The power to investigate offence under Section 78 of IT (Amendment) Act, 2008 vests in :

(a)Deputy Superintendent of Police (DSP)

(b)Inspector of Police (IP)

(c)Additional Superintendent of Police (Add./SP)

(d)Superintendent of Police (SP)


(vi)Publication of Information which is obscene in electronic form includes :

(a)Dissemination of Information

(b) Storage of Information

(c) Transmission of Information

(d) All of the above

(vii)Surveillance technologies being widely used for violating privacy in cyber world are :

(a) Cookies

(b) Web bugs

(c) File sharing

(d) Both (a) and (b)


(viii)…… is popular chat service still in use today and which enables users to connect to a server using a software program and communicate with each other live.

(a) Internet Relay chat

(c) Teleconferencing

(b) Telecommunication

(d) Message delivery


(ix)E-Governance is legal recognisation to the :

(a) Paper documents

(c) Business

(b) Electronic records

(d) Company



(x)The UNCITRAL in years 2001 adopted the Model law on

(a) Manual signatures

(b) Electronic signature

(c) Digital media

(d) Signature


(xi) Section 43 identifies_______different causes of causing damages to computer, computer system and computer network.

(a) 5

(c) 7

(b) 10

(d) 8


(xii) Tampering with source code activity deals with section :

(a) 65

(b) 66

(c) 67

(d) 70


(xiii)In www.economictimes.com top level domain name .com for :

(a) Organisation

(c) Educational

(b) Commercial

(d) Government


(xiv) To control the growing trendfelectronic voyeurism, a new section has been inserted into

the IT Act.

(a) 66 A

(b) 66 B

(d) 66 E

(c) 66 D


(xv) Cyber crime in cyberspace has :

(a) Universal jurisdiction

(b) Territorial jurisdiction

(c) Extra-ordinary jurisdiction

(d) Ordinary jurisdiction.




Comments


LEGALLAWTOOL-.png
67oooo_edited_edited.png
bottom of page