TILAK MAHARASHTRA VIDYAPEETH, PUNE
BACHELOR OF LAWS (LL.B.) (Three Years Semester Pattern)/
B.A. LL.B. (ACADEMIC LAW)
(FIVE YEARS SEMESTER PATTERN) CREDIT SYSTEM
EXAMINATION : APRIL-MAY - 2019
THIRD/SEVENTH SEMESTER
Sub.: Cyber Law (LW -306/ LW-7006)
Date : 26/04/2019 Total Marks : 60 Time: 2.00 pm to 4.30 pm
Instructions: 1) All questions are compulsory.
2) Figures to the right indicate full marks.
Q. 1. Choose the correct option from the following. (10)
1) Cyber Law is contained in..............
a) I.T act, 2000 b) Negotiable Instrument Act
c) Power of Attorney d) Code of ethics
2) Use of Internet or other electronic means to stalk or harass an individual, a group of
individuals or an organization is called ………………..
a) Email Bombing b) Spamming
c) Cyber stalking d) None of the Above
3) A mathematical scheme for demonstrating the authenticity of a digital message or
document is called ………………
a) Encryption b) Decryption
c) Cryptography d) Digital Signature
4) …………. is the type of crime which targets the computer
a) Money Laundering b) Denial of service
c) Theft of service d) Intellectual property violation
5) Firewalls are used to protect against --------
a) data driven attacks b) fire attacks
c) virus attacks d) unauthorised access
6) Section 66F of IT Act deals with …………
a) Cyber stalking b) email bombing
c) child pornography d) cyber terrorism
7) The practice of making a transmission appears to come from an authorized user
…………
a) hacking b) spoofing
c) spamming d) sneaking
8) I.T. Act came into force in the year ………………..
a) 2000 b) 2002
c) 2008 d) 2005
9) HTML is a …………
a) Web Browser b) Network Protocol
c) Scripting Language d) Programming Language
10) process of transforming plain text to unreadable scrambled text is called ………….
a) encryption b) ) Decryption
c) cryptography d) Ergonomics
Cyber Law (LW – 306/7006) AHM/ I 1/2
BACHELOR OF LAWS (LL.B.) (Three Years Semester Pattern)/
B.A. LL.B. (ACADEMIC LAW)
(FIVE YEARS SEMESTER PATTERN) CREDIT SYSTEM
EXAMINATION : APRIL-MAY - 2019
THIRD/SEVENTH SEMESTER
Sub.: Cyber Law (LW -306/ LW-7006)
Date : 26/04/2019 Total Marks : 60 Time: 2.00 pm to 4.30 pm
Instructions: 1) All questions are compulsory.
2) Figures to the right indicate full marks.
Q. 1. Choose the correct option from the following. (10)
1) Cyber Law is contained in..............
a) I.T act, 2000 b) Negotiable Instrument Act
c) Power of Attorney d) Code of ethics
2) Use of Internet or other electronic means to stalk or harass an individual, a group of
individuals or an organization is called ………………..
a) Email Bombing b) Spamming
c) Cyber stalking d) None of the Above
3) A mathematical scheme for demonstrating the authenticity of a digital message or
document is called ………………
a) Encryption b) Decryption
c) Cryptography d) Digital Signature
4) …………. is the type of crime which targets the computer
a) Money Laundering b) Denial of service
c) Theft of service d) Intellectual property violation
5) Firewalls are used to protect against --------
a) data driven attacks b) fire attacks
c) virus attacks d) unauthorised access
6) Section 66F of IT Act deals with …………
a) Cyber stalking b) email bombing
c) child pornography d) cyber terrorism
7) The practice of making a transmission appears to come from an authorized user
…………
a) hacking b) spoofing
c) spamming d) sneaking
8) I.T. Act came into force in the year ………………..
a) 2000 b) 2002
c) 2008 d) 2005
9) HTML is a …………
a) Web Browser b) Network Protocol
c) Scripting Language d) Programming Language
10) process of transforming plain text to unreadable scrambled text is called ………….
a) encryption b) ) Decryption
c) cryptography d) Ergonomics
Cyber Law (LW – 306/7006) AHM/ I 1/2