Cyber Law & Forensics
Cyber Law & Forensics Quiz Crafted by –
Mrinmoy Mukherjee
Team Member,
Sherlock Institute of Forensic Science India Pvt. Ltd, New Delhi
Introduction to Cyber Law & Forensics
Cyber Law encapsulates the legal issues related to using of the Internet. IT law covers mainly the digital information (including information security and electronic commerce) aspects and it has been described as "paper laws" for a "paperless environment". India's The Information Technology Act 2000 has tried to assimilate legal principles available in several such laws (relating to information technology) enacted earlier in several other countries, as also various guidelines pertaining to information technology law. The Act gives legal validity to electronic contracts, recognition of electronic signatures. This is modern legislation that makes acts like hacking, data theft, spreading of viruses, identity theft, defamation (sending offensive messages) pornography, child pornography, cyber terrorism, a criminal offence.
Let's look at the questions and their answers
Ques 1. Assessing Computer without prior authorization is a cyber-crime that comes under____
a) Section 65
b) Section 66
c) Section 68
d) Section 70
Answer – b) Section 66
Ques 2. Section 66A of the IT Act, 2000 is considered as a legal zombie because
a) It was declared to uphold the constitutional virtues as enshrined in the preamble in Shreya Singhal v/s Union of India Case.
b) High Court of Maharashtra performed the ruling.
c) It is still misused in some parts of the country even after being struck down.
d) All of the above.
Answer – c) It is still misused in some parts of the country even after being struck down.
Ques 3. Admissibility of Electronic records is based on
a) Section 32 of IPC
b) Section 65B of IPC
c) Section 32 of IEA
d) Section 65B of IEA
Answer – d) Section 65B of IEA
Ques 4. _____________ are programs or devices that capture the vital information from the target network or particular network.
a) Routers
b) Trappers
c) Wireless-crackers
d) Sniffers
Answer – d) Sniffers
Ques 5. Which of the below-mentioned protocol is not susceptible to sniffing?
a) HTTP
b) SMTP
c) POP
d) TCP
Answer – d) TCP
Ques 6. ________________ enables a hacker to open a piece of program or application and re-build it with further features & capabilities.
a) Social engineering
b) Reverse engineering
c) Planting malware
d) Injecting code
Answer – b) Reverse engineering
Ques 7. What is the punishment in India for stealing computer documents, assets or any software’s source code from any organization, individual, or from any other means?
a) 6 months of imprisonment and a fine of Rs. 50,000
b) 1 year of imprisonment and a fine of Rs. 100,000
c) 2 years of imprisonment and a fine of Rs. 250,000
d) 3 years of imprisonment and a fine of Rs. 500,000
Answer – d) 3 years of imprisonment and a fine of Rs. 500,000
Ques 8. Cracking digital identity of any individual or doing identity theft, comes under __________ of IT Act.
a) Section 65
b) Section 66
c) Section 68
d) Section 70
Answer – b) Section 66
Ques 9. __________ is the practice implemented to spy someone using technology for gathering sensitive information.
a) Cyber espionage
b) Cyber-spy
c) Digital Spying
d) Spyware
Answer – a) Cyber espionage
Ques 10. Which section of the Indian IT Act declares that any 3rd party information or personal data leakage in corporate firms or organizations will be a punishable offense?
a) Section 59
b) Section 69
c) Section 79
d) Section 89
Answer – c) Section 79