Go Back   2022-2023 StudyChaCha > StudyChaCha Discussion Forum > General Topics

  #2  
Old March 30th, 2014, 06:50 PM
Sashwat's Avatar
Super Moderator
 
Join Date: Jun 2011
Default Re: Cyber Law Diploma Entrance Exam Study Material

As you want to get some Study Material for Cyber Law Diploma Entrance Exam. So here I am providing sample paper of Cyber Law Diploma Exam:

Cyber Law Diploma Entrance Exam Sample Paper


Part – A
Questions in this part carry 5 marks each
1. Neha, a desktop publishing professional has made several authentic
looking certificates of major Indian and foreign universities and has sold
these counterfeit certificates for large sums of money to at least 3 people
in India. Neha had sent these certificates as email attachments to
prospective customers. Select the most appropriate answer keeping the
said facts in mind:
a. Neha would be punished for forgery for forging a document under the
Information Technology Act, 2000
b. Neha would be punished for forgery for forging a document under the
Indian Penal Code 1860
c. Neha would be punished for forgery for forging an electronic record
under the Indian Penal Code, 1860
d. Neha would be punished for forgery for forging an electronic record
under the Information Technology Act, 2000
2. With regard to jurisprudence relating to pornography, tick the most
appropriate answer:
a) Most jurisdictions punish dissemination of pornography in some
manner.
b) All jurisdictions punish dissemination or publishing of child
pornography.
c) In some jurisdictions dissemination and possession of actual child
pornography as well as dissemination of simulated computer animated
images depicting child pornography is penalized.
d) Some jurisdictions punish dissemination as well as possession of child
pornography.
3. Rita is not sure how exactly a digital signature system works. Help her to
understand the process by choosing the most appropriate statement.
a) A digital signature is formed subsequent to a message digest.
b) A digital signature is formed by signing a message digest with a
private key.
c) A digital signature is formed by making a message interact with a one
way hash function and signing it with a private key, the public key of
which has been certified by a Certifying Authority.
d) A digital signature is verified by using hash function and public key.
4. Select the most appropriate statement about a recognized foreign
certifying authority (CA) in India
a) A recognized foreign CA is recognized in India as a CA.
b) A recognized foreign CA is a CA for the purposes of the IT Act.
c) A foreign CA is a CA previously approved by the Central Government
before being recognized by the Controller and is required to be notified
in the Official Gazette.
e) A recognized foreign CA is a CA recognized by the Controller of
Certifying Authorities and previously approved by the Central
Government.
5. Digicert Ltd. is a licensed certifying authority in India. Digicert obtained
its license from the Controller of Certifying Authorities in 2001. However,
business has not picked up and the company has gone into losses. The
management of Digicert wants to quit the business and wind up the
company. Select the most appropriate statement from the following:
a) Digicert can quit the business and wind up the company.
b) Digicert has to notify the Controller before terminating operations as a
certifying authority.
c) Digicert should notify the Controller 90 days before terminating
operations as a certifying authority.
d) The certifying authority has to notify the Controller, advertise and give
adequate compensation where required before ceasing to act as a
certifying authority.
6. Computer software can be
a) copyrighted in India
b) patented in India
c) both copyrighted and patented in India
d) both copyrighted and patented in the United States of America
5
7. ICANN’s UDRP requires a domain registrant to submit to mandatory
administrative proceedings in case
a) The registrant’s domain name is identical to a trademark in which a
complainant has rights.
b) The registrant has no rights to the domain and has registered the
domain in bad faith.
c) The registrant has a deceptively similar trademark, has no rights to the
domain and is using the domain in bad faith.
d) The registrant has registered the domain name for disrupting the
business of the competitor.
8. Infecting someone’s computer with a computer virus can make a person
liable to pay damages by way of compensation up to:
a) A crore of rupees
b) Two crore rupees
c) Three crore rupees
d) Four crore rupees
9. Rakesh has been accused by Megaprogram Corporation of reproducing
and distributing their software programs illegally. Rakesh is liable under:
a) Section 63B of the Indian Copyright Act 1957
b) Section 63 of the Indian Copyright Act 1957
c) Section 66 of the Information Technology Act 2000
d) Section 66 of the Information Technology Act 2000 and Section 63 of
the Copyright Act 1957
6
10. Hacking under the Information Technology Act 2000 means
a) Unauthorized access to another person’s computer system.
b) Deleting information stored in another person’s computer system.
c) Knowingly or intentionally deleting information stored in another
person’s computer system.
d) Knowingly or intentionally deleting valuable information stored in
another person’s computer system.
Part – B
01
A young lady named Ritika Adjania found her profile in an online community
named “1worldcom” on its website 1worldcom.net. Her surprise turned to horror
when she realized that the profile painted her as a person of dubious character
whose only interest was money. The profile also “boasted” of her achievements
which included defrauding a bank of Rs.10 lakh and getting away with it.
Ritika immediately informed “1worldcom” of the posting and requested them to
remove it. The posting was removed the next day but reappeared a week later. It
was again removed but reappeared two days later. Deeply hurt, Ritika filed a suit
for defamation against “1worldcom”. With reference to jurisprudence of
defamation cases, examine the liability of “1worldcom.”
[10 marks]
02
Rakesh had an appointment with Dr. Mina Lahoti at the Wockhardt Hospital,
Mumbai. While waiting for Dr. Lahoti, Rakesh remembered that he had to email a
document (that he was carrying in a floppy) to his office. As he looked around, he
realized that there was a computer at the reception desk, which was switched on.
However, the receptionist was nowhere to be seen.
Rakesh immediately inserted the floppy disk containing the document into the
floppy drive of the computer at the reception desk. Just then, the receptionist
entered and saw Rakesh at the computer. She immediately called the security
guards and intimated the manager about the incident. The manager wants to take
legal action against Rakesh for unauthorized access. Advise the manager.
[15 marks]
03
Pooja has been assigned a project on “Intellectual property rights associated with
semi – conductor technology”. She conducts a search on Google and comes across
many articles on the topic. She downloads the articles and uses them extensively
in her project without taking permission from the authors of the articles. Pooja
insists that since she is using the articles for private use, she is not liable for any
infringement. Is she right? Discuss. [15 marks]
04
Section 29 of the Information Technology Act 2000 confers power upon the
Controller of Certifying Authorities to investigate contraventions under the Act.
Section 78 confers power upon a police officer of the rank of a Deputy
Superintendent of Police or above to investigate any offence under the Act.
Rashmi suspects Rakesh of creating and publishing digital signature certificates for
fraudulent purposes. But she is confused about whom to approach for investigating
the suspected crime. Clear Rashmi’s confusion with detailed explanations.
[10 marls]
__________________
Answered By StudyChaCha Member
Reply With Quote
Reply


Reply to this Question / Ask Another Question
Your Username: Click here to log in

Message:
Options



All times are GMT +6. The time now is 07:22 AM.


Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2022, vBulletin Solutions Inc.
Search Engine Friendly URLs by vBSEO 3.6.0 PL2

1 2 3 4 5 6 7 8