0% found this document useful (0 votes)
331 views6 pages

01-Cyber Law Sample Questions (Answer)

The document contains questions from two sets (Set 1 and Set 2) on topics related to cyber law and information technology law. Set 1 questions cover topics like the definition of cybercrime under Indian law, what copyright law does not protect, whether intellectual property can be sold, requirements for a crime to be considered a computer crime, and public key encryption methods. Set 2 questions cover similar topics around the objectives of the Information Technology Act 2000 in India, remedies for copyright infringement, advantages of public key encryption systems, what fair use refers to, categories of cybercriminals, how computers can be used in crimes, types of e-contracts, and patents.

Uploaded by

Toan Phan Thanh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
331 views6 pages

01-Cyber Law Sample Questions (Answer)

The document contains questions from two sets (Set 1 and Set 2) on topics related to cyber law and information technology law. Set 1 questions cover topics like the definition of cybercrime under Indian law, what copyright law does not protect, whether intellectual property can be sold, requirements for a crime to be considered a computer crime, and public key encryption methods. Set 2 questions cover similar topics around the objectives of the Information Technology Act 2000 in India, remedies for copyright infringement, advantages of public key encryption systems, what fair use refers to, categories of cybercriminals, how computers can be used in crimes, types of e-contracts, and patents.

Uploaded by

Toan Phan Thanh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

SET – 2

1. The Information Technology Act 2000 is mainly

A. Intended to promote e-governance


B. Give legal recognition to e- transactions and EDI
C. Punish Cyber Criminals
D. A and B
E. A and C

2. Remedies available in case of Copyright Infringement

A. Civil Remedies
B. Criminal Remedies
C. All of the Above
D. Either A or B

3. Public Key System is useful because

A. It is a symmetric key system


B. It uses two keys
C. Private key can be a secret
D. There is no Key Distribution Problem as Public Key can be kept in a commonly
accessible database

4. ‘Fair use’ is a term most relevant to

A. Intellectual Property Rights


B. Books borrowed for home reading
C. Copy right
D. Use of reference books
5. Cyber Criminals come in the category of

A. Intruders
B. Hackers
C. Employees
D. All

6. A computer can act as

A. Crime
B. Evidence
C. None
D. Both

7. Various kinds of e-contracts include

A. Click Contracts
B. Shrink Contracts
C. Web Contracts
D. All

8. Patents are generally not granted to

A. Non obvious subject matter


B. Processes and Methods
C. Inventions that are new
D. Items that have Practical Use

9. Idea Expression Dichotomy means

A. Idea can be copyrighted


B. the formulation of thought on a particular subject
C. many persons may individually arrive at the same idea, they can claim copyright
D. the expression of idea can be copyrighted
10. In case of uploading a video, if it invades the privacy of a person exposing the person’s
private areas without such person’s consent, then it is covered under

A. Section 43 of IT Act
B. Section 85 of IT Act
C. Section 69 of IT Act
D. Section 66 E of IT Act

SET – 1

1. Cyber Crime is defined under Indian Cyber Law

A. True
B. False

2. Copyright law does not protect

A. Musical Works
B. Literary Works
C. Ideas or Concepts
D. Sound Recordings

3. Whether Intellectual Property can be sold

A. No
B. Sale is possible
C. Yes
D. None

4. To be considered a computer crimes, what needs to be involved in the crime


A. Technology
B. Computers
C. Data
D. Networks

5. Public key encryption method is a system

A. Which uses a set of public keys one for each participant in e-Commerce
B. Which uses the RSA coding system
C. In which each person who wants to communicate has two keys; a private key known to
him only and a public key which is publicized to enable others to send message to him
D. Which is a standard for use in e-Commerce.

6. The Information Technology Act, 2000 is concerned with :

A. Legal recognition of digital signatures


B. Definition of various types of computer crimes and penalties for the same
C. Appointment of certifying authorities for issuing digital signatures
D. Recognition of digital records and their admissibility as evidence in courts
E. All of the above

7. Patents are generally granted to

A. Inventions that are new


B. Non obvious subject matter
C. Processes and Methods
D. A and B
E. B and C

SET – 2

11. The Information Technology Act 2000 is mainly

F. Intended to promote e-governance


G. Give legal recognition to e- transactions and EDI
H. Punish Cyber Criminals
I. A and B
J. A and C

12. Remedies available in case of Copyright Infringement

E. Civil Remedies
F. Criminal Remedies
G. All of the Above
H. Either A or B

13. Public Key System is useful because

E. It is a symmetric key system


F. It uses two keys
G. Private key can be a secret
H. There is no Key Distribution Problem as Public Key can be kept in a commonly
accessible database

14. ‘Fair use’ is a term most relevant to

E. Intellectual Property Rights


F. Books borrowed for home reading
G. Copy right
H. Use of reference books

15. Cyber Criminals come in the category of

E. Intruders
F. Hackers
G. Employees
H. All

16. A computer can act as

E. Crime
F. Evidence
G. None
H. Both

17. Various kinds of e-contracts include

E. Click Contracts
F. Shrink Contracts
G. Web Contracts
H. All

You might also like