Law and Information Technology # MCQs Practice set

Q.1 Which of the following is the primary objective of cyber law?

To regulate physical trade
To protect digital rights and online activities
To manage environmental resources
To establish land ownership
Explanation - Cyber law governs online transactions, data protection, privacy, and security of digital information.
Correct answer is: To protect digital rights and online activities

Q.2 The IT Act of 2000 in India primarily deals with:

Property rights
E-commerce and cybercrimes
Maritime disputes
Environmental issues
Explanation - The Information Technology Act, 2000 provides legal recognition to electronic transactions and addresses cybercrime issues.
Correct answer is: E-commerce and cybercrimes

Q.3 Which of these is considered sensitive personal data under IT law?

Name
Blood group
Password
Favorite color
Explanation - Passwords are classified as sensitive personal data because they can grant access to protected information.
Correct answer is: Password

Q.4 Phishing attacks primarily aim to:

Improve website speed
Steal sensitive information
Block advertisements
Repair computer hardware
Explanation - Phishing is a cybercrime technique to deceive users into sharing confidential information like passwords and credit card details.
Correct answer is: Steal sensitive information

Q.5 Digital signatures are used to:

Encrypt physical documents
Authenticate electronic records
Create hand-drawn signatures
Protect offline transactions
Explanation - Digital signatures verify the authenticity and integrity of electronic documents and communications.
Correct answer is: Authenticate electronic records

Q.6 Which international organization focuses on cybersecurity cooperation?

UNICEF
INTERPOL
WHO
WTO
Explanation - INTERPOL coordinates international cooperation to tackle cybercrime and digital threats globally.
Correct answer is: INTERPOL

Q.7 The term 'hacking' legally refers to:

Repairing a computer system
Unauthorized access to computer data
Installing antivirus software
Upgrading computer hardware
Explanation - Hacking is the act of gaining unauthorized access to a computer system or network.
Correct answer is: Unauthorized access to computer data

Q.8 The General Data Protection Regulation (GDPR) originated in:

United States
European Union
India
Japan
Explanation - GDPR is a data privacy law created by the European Union to protect user data and privacy rights.
Correct answer is: European Union

Q.9 What is 'cyber stalking' under IT law?

Using computers for education
Tracking someone without consent online
Following someone in a physical space
Monitoring public data legally
Explanation - Cyber stalking involves harassing or tracking individuals via the internet or other digital means without their consent.
Correct answer is: Tracking someone without consent online

Q.10 Which of these acts involves financial cybercrime?

Phishing
Data mining
SEO optimization
Website design
Explanation - Phishing often targets financial information, making it a common type of financial cybercrime.
Correct answer is: Phishing

Q.11 Section 66 of the IT Act deals with:

Environmental law
Cyber terrorism
Unauthorized computer access
Corporate taxation
Explanation - Section 66 of the IT Act addresses computer-related offenses such as hacking and unauthorized access.
Correct answer is: Unauthorized computer access

Q.12 What is a 'computer virus' legally classified as?

Malware
Hardware issue
Programming language
Data encryption tool
Explanation - Computer viruses are a type of malware designed to disrupt or damage computer systems.
Correct answer is: Malware

Q.13 Which of these is an example of identity theft?

Sharing your own data
Using someone else's personal information for fraud
Backing up files
Installing licensed software
Explanation - Identity theft involves using another person's personal information without consent for illegal purposes.
Correct answer is: Using someone else's personal information for fraud

Q.14 In cyber law, 'digital evidence' refers to:

Physical crime scene data
Information stored or transmitted digitally
Paper documents
Analog tapes
Explanation - Digital evidence is data stored or transmitted in digital form that can be used in legal proceedings.
Correct answer is: Information stored or transmitted digitally

Q.15 Which body regulates cybersecurity policies in India?

SEBI
CERT-In
RBI
NITI Aayog
Explanation - CERT-In (Indian Computer Emergency Response Team) is responsible for cybersecurity incident response and policy guidance.
Correct answer is: CERT-In

Q.16 Which of these is NOT covered by the IT Act?

Digital signatures
Cyber terrorism
Tax evasion
Hacking
Explanation - The IT Act focuses on cybercrimes and digital transactions, not tax-related offenses.
Correct answer is: Tax evasion

Q.17 Ransomware attacks are best described as:

Free data storage services
Malware that encrypts data for payment
Legal backup software
Cloud-based antivirus programs
Explanation - Ransomware locks user data and demands payment for its release.
Correct answer is: Malware that encrypts data for payment

Q.18 Which section of the IT Act covers cyber terrorism?

Section 66F
Section 45
Section 80
Section 24A
Explanation - Section 66F of the IT Act defines and penalizes cyber terrorism activities.
Correct answer is: Section 66F

Q.19 The term 'cyber forensics' refers to:

The study of physical evidence
The practice of collecting and analyzing digital evidence
The creation of websites
Internet speed testing
Explanation - Cyber forensics involves collecting, preserving, and analyzing digital evidence for investigations.
Correct answer is: The practice of collecting and analyzing digital evidence

Q.20 Which of these actions violates intellectual property rights online?

Streaming a free educational video
Pirating copyrighted software
Using open-source code legally
Reading public domain content
Explanation - Pirating software is illegal as it infringes on intellectual property rights.
Correct answer is: Pirating copyrighted software

Q.21 In legal terms, 'cybersquatting' refers to:

Buying domain names to resell at a profit
Illegal hacking of websites
Hosting a free website
Encrypting a domain for safety
Explanation - Cybersquatting is the act of registering domain names similar to popular brands with the intent to resell for profit.
Correct answer is: Buying domain names to resell at a profit

Q.22 Two-factor authentication primarily enhances:

Website design
Digital marketing
Data security
Software development
Explanation - Two-factor authentication adds an extra layer of security for digital accounts.
Correct answer is: Data security

Q.23 What does 'DoS attack' stand for in IT law?

Data over Security
Denial of Service
Digital online Security
Domain of Systems
Explanation - A DoS attack disrupts a network or service, making it unavailable to legitimate users.
Correct answer is: Denial of Service

Q.24 Which of these is a lawful use of personal data?

Selling data without consent
Using data with user consent for service improvement
Publishing private data online
Hacking data for research
Explanation - Data laws require explicit consent before personal data can be used for any purpose.
Correct answer is: Using data with user consent for service improvement