Cyber Law & Forensics

Cyber Law & Forensics

Cyber Law & Forensics Quiz Crafted by –

Mrinmoy Mukherjee

Team Member,

Sherlock Institute of Forensic Science India Pvt. Ltd, New Delhi

 

Introduction to Cyber Law & Forensics

Cyber Law encapsulates the legal issues related to using of the Internet. IT law covers mainly the digital information (including information security and electronic commerce) aspects and it has been described as "paper laws" for a "paperless environment". India's The Information Technology Act 2000 has tried to assimilate legal principles available in several such laws (relating to information technology) enacted earlier in several other countries, as also various guidelines pertaining to information technology law. The Act gives legal validity to electronic contracts, recognition of electronic signatures. This is modern legislation that makes acts like hacking, data theft, spreading of viruses, identity theft, defamation (sending offensive messages) pornography, child pornography, cyber terrorism, a criminal offence.


 Let's look at the questions and their answers


 Ques 1. Assessing Computer without prior authorization is a cyber-crime that comes under____

a) Section 65

b) Section 66

c) Section 68

d) Section 70

Answer – b) Section 66


Ques 2. Section 66A of the IT Act, 2000 is considered as a legal zombie because                                                 

a) It was declared to uphold the constitutional virtues as enshrined in the preamble in Shreya Singhal v/s Union of India Case.

b) High Court of Maharashtra performed the ruling.

c) It is still misused in some parts of the country even after being struck down.

d) All of the above.

Answer – c) It is still misused in some parts of the country even after being struck down.


Ques 3. Admissibility of Electronic records is based on

a) Section 32 of IPC

b) Section 65B of IPC

c) Section 32 of IEA

d) Section 65B of IEA

Answer – d) Section 65B of IEA


Ques 4. _____________ are programs or devices that capture the vital information from the target network or particular network.

a) Routers

b) Trappers

c) Wireless-crackers

d) Sniffers

Answer – d) Sniffers


Ques 5. Which of the below-mentioned protocol is not susceptible to sniffing?

a) HTTP

b) SMTP

c) POP

d) TCP

Answer – d) TCP


Ques 6. ________________ enables a hacker to open a piece of program or application and re-build it with further features & capabilities.

a) Social engineering

b) Reverse engineering

c) Planting malware

d) Injecting code

Answer – b) Reverse engineering


Ques 7. What is the punishment in India for stealing computer documents, assets or any software’s source code from any organization, individual, or from any other means?

a) 6 months of imprisonment and a fine of Rs. 50,000

b) 1 year of imprisonment and a fine of Rs. 100,000

c) 2 years of imprisonment and a fine of Rs. 250,000

d) 3 years of imprisonment and a fine of Rs. 500,000

Answer – d) 3 years of imprisonment and a fine of Rs. 500,000


Ques 8. Cracking digital identity of any individual or doing identity theft, comes under __________ of IT Act.

a) Section 65

b) Section 66

c) Section 68

d) Section 70

Answer – b) Section 66


Ques 9. __________ is the practice implemented to spy someone using technology for gathering sensitive information.

a) Cyber espionage

b) Cyber-spy

c) Digital Spying

d) Spyware

Answer – a) Cyber espionage


Ques 10. Which section of the Indian IT Act declares that any 3rd party information or personal data leakage in corporate firms or organizations will be a punishable offense?

a) Section 59

b) Section 69

c) Section 79

d) Section 89

Answer – c) Section 79


Share on