TILAK MAHARASHTRA VIDYAPEETH, PUNE
B.A. LL. B. (ACADEMIC LAW) (FIVE YEARS SEMESTER PATTERN)
BACHELOR OF LAWS (LL.B.) (Three Years Semester Pattern) CREDIT SYSETEM
EXAMINATION:NOVEMBER - 2016
THIRD/SEVENTH SEMESTER
Sub.: Cyber Law (LW – 306/LW-7006)
Date : 29/11/2016 Total Marks : 60 Time: 2.00 pm to 4.30 pm
Instructions: 1) All questions are compulsory.
2) Figures to the right indicate full marks.
Q. 1. Choose the correct option from the following. (10)
1) Use of internet or other electronic means to stalk or harass an individual, a group of
individual, or an organization.
a) Email bombing b) Spamming
c) Cyber stalking d) Phishing
2) Which section of I.T Act covers most of the common crimes arising out of
“Unauthorized Access”
a) Sec. 65 b) Sec. 67
c) Sec.73 d) Sec.74
3) Section 66F of I.T Act deals with …………
a) Cyber stalking b) Email Bombing
c) Child Pornography d) Cyber Terrorism
4) A mathematical scheme for demonstrating the authenticity of a digital message or document is
………….
a) Encryption b) Decryption
c) Cryptography d) Digital Signature
5) Programs that multiply like viruses but spread from computer to computer are called
as ………..
a) Worms b) Virus
c) Boot d) None of these
6) Process of transforming plain text to unreadable scrambled text means ……….
a) Encryption b) Decryption
c) Cryptograph d) Ergonomics
7) Use of electronic messaging systems to send unsolicited bulk a message is called …………..
a) Email bombing b) Cyber stalking
c) Spamming d) Phishing
8) Act of attempting to acquire information such as username, password and credit card details
by masquerading as trustworthy entity is called …………
a) Email Bombing b) Phishing
c) Cyber stalking d) None of these
Cyber Law (LW – 306/LW-7006) AFD/ II 1/2
B.A. LL. B. (ACADEMIC LAW) (FIVE YEARS SEMESTER PATTERN)
BACHELOR OF LAWS (LL.B.) (Three Years Semester Pattern) CREDIT SYSETEM
EXAMINATION:NOVEMBER - 2016
THIRD/SEVENTH SEMESTER
Sub.: Cyber Law (LW – 306/LW-7006)
Date : 29/11/2016 Total Marks : 60 Time: 2.00 pm to 4.30 pm
Instructions: 1) All questions are compulsory.
2) Figures to the right indicate full marks.
Q. 1. Choose the correct option from the following. (10)
1) Use of internet or other electronic means to stalk or harass an individual, a group of
individual, or an organization.
a) Email bombing b) Spamming
c) Cyber stalking d) Phishing
2) Which section of I.T Act covers most of the common crimes arising out of
“Unauthorized Access”
a) Sec. 65 b) Sec. 67
c) Sec.73 d) Sec.74
3) Section 66F of I.T Act deals with …………
a) Cyber stalking b) Email Bombing
c) Child Pornography d) Cyber Terrorism
4) A mathematical scheme for demonstrating the authenticity of a digital message or document is
………….
a) Encryption b) Decryption
c) Cryptography d) Digital Signature
5) Programs that multiply like viruses but spread from computer to computer are called
as ………..
a) Worms b) Virus
c) Boot d) None of these
6) Process of transforming plain text to unreadable scrambled text means ……….
a) Encryption b) Decryption
c) Cryptograph d) Ergonomics
7) Use of electronic messaging systems to send unsolicited bulk a message is called …………..
a) Email bombing b) Cyber stalking
c) Spamming d) Phishing
8) Act of attempting to acquire information such as username, password and credit card details
by masquerading as trustworthy entity is called …………
a) Email Bombing b) Phishing
c) Cyber stalking d) None of these
Cyber Law (LW – 306/LW-7006) AFD/ II 1/2