Q.1 What is the primary objective of cyber law?
To regulate social media usage only
To protect electronic data, systems, and users online
To promote internet marketing
To restrict software development
Explanation - Cyber law is designed to safeguard digital information, ensure privacy, and regulate online activities.
Correct answer is: To protect electronic data, systems, and users online
Q.2 Which of the following acts primarily deals with electronic contracts and digital signatures in India?
Indian Penal Code
Information Technology Act, 2000
Companies Act, 2013
Consumer Protection Act, 2019
Explanation - The IT Act, 2000 provides legal recognition to electronic records and digital signatures.
Correct answer is: Information Technology Act, 2000
Q.3 Which term refers to malicious software designed to damage or disrupt computer systems?
Malware
Firewall
Cookie
Algorithm
Explanation - Malware includes viruses, worms, trojans, and ransomware that compromise computer security.
Correct answer is: Malware
Q.4 What is phishing?
A method to improve web performance
A fraudulent attempt to obtain sensitive information
A technique for software development
A method of encrypting data
Explanation - Phishing is a cybercrime where attackers trick users into revealing confidential information like passwords or credit card numbers.
Correct answer is: A fraudulent attempt to obtain sensitive information
Q.5 Which of the following is NOT considered personal data under most cyber laws?
Name
IP address
Bank account number
Software code
Explanation - Personal data refers to information that can identify an individual. Software code is not personal data.
Correct answer is: Software code
Q.6 The right to be forgotten in cyber law primarily allows:
Users to delete irrelevant personal information online
Websites to block access to all users
Governments to track all online activity
Companies to store personal data indefinitely
Explanation - The 'right to be forgotten' ensures individuals can request removal of outdated or irrelevant personal information from the internet.
Correct answer is: Users to delete irrelevant personal information online
Q.7 Which cybercrime involves unauthorized access to computer systems to steal information?
Hacking
Phishing
Spamming
Trojan
Explanation - Hacking is the act of breaching computer security systems to access data without permission.
Correct answer is: Hacking
Q.8 Digital signature in cyber law is used to:
Sign physical documents
Authenticate electronic documents
Track user location
Encrypt network traffic
Explanation - Digital signatures provide authenticity, integrity, and non-repudiation to electronic documents.
Correct answer is: Authenticate electronic documents
Q.9 Which act prohibits unauthorized downloading or distribution of copyrighted software in India?
Copyright Act, 1957
Information Technology Act, 2000
Patents Act, 1970
Trademarks Act, 1999
Explanation - The Copyright Act protects software as intellectual property and prevents piracy.
Correct answer is: Copyright Act, 1957
Q.10 What is ransomware?
Software that improves network speed
Malware that locks data and demands payment
A web browser extension
A type of firewall
Explanation - Ransomware encrypts files on a computer and asks for money to restore access.
Correct answer is: Malware that locks data and demands payment
Q.11 Which of the following is considered a cyber tort?
Defamation through social media
Murder
Tax evasion
Forgery of physical documents
Explanation - Cyber torts involve civil wrongs committed online, such as defamation or invasion of privacy.
Correct answer is: Defamation through social media
Q.12 Which is an example of identity theft online?
Using someone else's personal info to open accounts
Writing code for an app
Sending spam emails
Creating a new email ID
Explanation - Identity theft involves fraudulently using another person's information to commit crimes or gain benefits.
Correct answer is: Using someone else's personal info to open accounts
Q.13 In cyber law, encryption primarily serves to:
Make software open source
Secure communication and data
Improve computer graphics
Create digital signatures
Explanation - Encryption converts data into a secure format that unauthorized users cannot read.
Correct answer is: Secure communication and data
Q.14 Which term describes unsolicited bulk messages sent over the internet?
Spam
Malware
Phishing
Trojan
Explanation - Spam refers to unwanted emails or messages sent to multiple recipients, often for advertising or phishing.
Correct answer is: Spam
Q.15 The concept of cyber sovereignty refers to:
Global internet with no borders
State control over its own cyberspace
Ownership of all online content
Free sharing of software internationally
Explanation - Cyber sovereignty means a nation can govern the internet within its borders, enforcing laws and regulations.
Correct answer is: State control over its own cyberspace
Q.16 Which of the following is true about data privacy laws?
They require consent before collecting personal data
They allow unlimited sharing of personal data
They only apply to government institutions
They have no penalties for violations
Explanation - Data privacy laws mandate transparency, consent, and protection of individuals' personal information.
Correct answer is: They require consent before collecting personal data
Q.17 Which is an example of cyberstalking?
Repeatedly sending threatening messages online
Developing a website
Downloading music legally
Writing software documentation
Explanation - Cyberstalking involves using the internet to harass or threaten someone persistently.
Correct answer is: Repeatedly sending threatening messages online
Q.18 Which is the main authority to address IT-related cybercrime in India?
Central Bureau of Investigation (CBI)
Cyber Crime Cells under Police Departments
Income Tax Department
RBI
Explanation - Specialized cybercrime units investigate online offenses, including hacking, fraud, and identity theft.
Correct answer is: Cyber Crime Cells under Police Departments
Q.19 Which of the following is an offense under the IT Act, 2000?
Tampering with computer source code
Driving without a license
Shoplifting
Tax evasion
Explanation - IT Act penalizes acts such as hacking, data theft, identity fraud, and tampering with source code.
Correct answer is: Tampering with computer source code
Q.20 What is a firewall in cybersecurity?
A physical wall to prevent fire
A security system that controls incoming and outgoing network traffic
Software that creates digital signatures
A type of malware
Explanation - Firewalls act as a barrier between trusted and untrusted networks, preventing unauthorized access.
Correct answer is: A security system that controls incoming and outgoing network traffic
Q.21 Which of the following is NOT a type of cybercrime?
Hacking
Phishing
Robbery of physical cash
Cyberbullying
Explanation - Cybercrime involves illegal online activities, whereas physical cash robbery is a traditional crime.
Correct answer is: Robbery of physical cash
Q.22 Which act governs protection of sensitive personal data in India?
Information Technology Act, 2000
Consumer Protection Act, 2019
Companies Act, 2013
Patents Act, 1970
Explanation - Section 43A of the IT Act mandates protection of sensitive personal data and reasonable security practices.
Correct answer is: Information Technology Act, 2000
Q.23 Which of the following refers to software designed to monitor user activity without consent?
Spyware
Firewall
Ransomware
Antivirus
Explanation - Spyware secretly collects user information, often violating privacy laws.
Correct answer is: Spyware
Q.24 Which legal concept ensures that online contracts are valid and enforceable?
Digital signature and electronic records
Physical signatures only
Telemarketing consent
Copyright registration
Explanation - Electronic contracts are valid under cyber law if they are authenticated using digital signatures and follow IT Act provisions.
Correct answer is: Digital signature and electronic records
Q.25 Which of the following is a preventive measure against cyber attacks?
Regular software updates and strong passwords
Sharing passwords openly
Disabling antivirus software
Ignoring system alerts
Explanation - Keeping systems updated and using strong passwords reduces vulnerabilities to cyber attacks.
Correct answer is: Regular software updates and strong passwords
