TILAK MAHARASHTRA VIDYAPEETH, PUNE
BACHELOR OF LAWS (LL.B.) (Three Years Semester Pattern)/
B.A. LL.B. (ACADEMIC LAW)
(FIVE YEARS SEMESTER PATTERN) CREDIT SYSTEM
EXAMINATION : NOVEMBER - 2018
THIRD/SEVENTH SEMESTER
Sub.: Cyber Law (LW -306/ LW-7006)
Date : 29/11/2018 Total Marks : 60 Time: 2.00 pm to 4.30 pm
Instructions: 1) All questions are compulsory.
2) Figures to the right indicate full marks.
Q. 1. Choose the correct option from the following. (10)
1) …………….is the Act which provides legal framework for e-Governance in India
(a) IT (amendment) Act 2008 (b) Indian Penal Code
( c) I.T Act 2000 (d) None of the above
2) Use of the Internet or other electronic means to stalk or harass an individual, a group of
individuals, or an organization.
(a) Email Bombing (b) Spamming
(c )Cyber Stalking (d) Phishing
3) Section 66F of IT Act deals with ……………
(a) Cyber stalking (b) email bombing
(c )Cyber Terrorism (d)Child pornography
4) A mathematical scheme for demonstrating the authenticity of a digital message or document is
called ………………
(a) Encryption (b) Decryption
(c ) Digital Signature (d) Cryptography
5) In cyber law terminology ‘DoS’ means …………….
(a) Disk operating System (b) Distant operator Service
(c ) Denial of Service (d) None of the above
6) The Indian Parliament passed the Information Technology Bill, which is regarded as the
mother legislation regulating the use of computers, computer systems and computer networks
as also data and information in the electronic format, in the year ……………
(a) 2000 (b) 2001
(c ) 2003 (d) 2008
7) Process of transforming plain text to unreadable scrambled text is called …………
(a) Decryption (b) Encryp[tion
(c ) Cryptography (d) None of the above
8) By hacking web server taking control on another persons website called as web ..........
(a) Spoofing (b)Hacking
(c ) Spamming (d) Hosting
9) Programs that multiply like viruses but spread from computer to computer are called
as ……………
(a) Virus (b) Boot
(c) Worms (d) None of the above
10) Which of the following is a cyber crime?
(a) Hacking (b) Spamming
(c) Virus attack (d) All the above
Cyber Law (LW – 306/7006) AHD/ II 1/2
BACHELOR OF LAWS (LL.B.) (Three Years Semester Pattern)/
B.A. LL.B. (ACADEMIC LAW)
(FIVE YEARS SEMESTER PATTERN) CREDIT SYSTEM
EXAMINATION : NOVEMBER - 2018
THIRD/SEVENTH SEMESTER
Sub.: Cyber Law (LW -306/ LW-7006)
Date : 29/11/2018 Total Marks : 60 Time: 2.00 pm to 4.30 pm
Instructions: 1) All questions are compulsory.
2) Figures to the right indicate full marks.
Q. 1. Choose the correct option from the following. (10)
1) …………….is the Act which provides legal framework for e-Governance in India
(a) IT (amendment) Act 2008 (b) Indian Penal Code
( c) I.T Act 2000 (d) None of the above
2) Use of the Internet or other electronic means to stalk or harass an individual, a group of
individuals, or an organization.
(a) Email Bombing (b) Spamming
(c )Cyber Stalking (d) Phishing
3) Section 66F of IT Act deals with ……………
(a) Cyber stalking (b) email bombing
(c )Cyber Terrorism (d)Child pornography
4) A mathematical scheme for demonstrating the authenticity of a digital message or document is
called ………………
(a) Encryption (b) Decryption
(c ) Digital Signature (d) Cryptography
5) In cyber law terminology ‘DoS’ means …………….
(a) Disk operating System (b) Distant operator Service
(c ) Denial of Service (d) None of the above
6) The Indian Parliament passed the Information Technology Bill, which is regarded as the
mother legislation regulating the use of computers, computer systems and computer networks
as also data and information in the electronic format, in the year ……………
(a) 2000 (b) 2001
(c ) 2003 (d) 2008
7) Process of transforming plain text to unreadable scrambled text is called …………
(a) Decryption (b) Encryp[tion
(c ) Cryptography (d) None of the above
8) By hacking web server taking control on another persons website called as web ..........
(a) Spoofing (b)Hacking
(c ) Spamming (d) Hosting
9) Programs that multiply like viruses but spread from computer to computer are called
as ……………
(a) Virus (b) Boot
(c) Worms (d) None of the above
10) Which of the following is a cyber crime?
(a) Hacking (b) Spamming
(c) Virus attack (d) All the above
Cyber Law (LW – 306/7006) AHD/ II 1/2