TILAK MAHARASHTRA VIDYAPEETH, PUNE
BACHELOR OF LAWS (Three Years Semester Pattern) CREDIT SYSTEM
B.A. LL.B. (ACADEMIC LAW) (FIVE YEARS SEMESTER PATTERN)
EXAMINATION: NOVEMBER – 2017
THIRD/SEVENTH SEMESTER
Sub.: Cyber Law (LW - 306/7006)
Date : 28/11/2017 Total Marks : 60 Time: 2.00 pm to 4.30 pm
Instructions: 1) All questions are compulsory.
2) Figures to the right indicate full marks.
Q. 1. Choose the correct option from the following. (10)
1) Information Technology Act was amended in the year …………
a) 2000 b) 2004
c) 2008 d) 2010
2) Malware derives its name from …………..
a) Malicious Software b) Malevolent Software
c) Malicious Hardware d) Malevolent Hardware
3) Virus stands for ……………..
a) Very Intelligent result until source b) Very Intelligent resource under search
c) Very Information Resource under Sledge d) Viral important record user searched
4) …………… are attempts by individuals to obtain confidential information from you to
falsifying their identity.
a) Computer Viruses b) Phishing Scam
c) Phishing Trips d) Spyware Scams
5) When a logic bomb is activated by a time related event it is known as …………
a) Virus b) Trojan horse
c) Time related bomb sequence d) Time bomb
6) E-commerce involves the application of ……………….
a) Knowledge management system b) Product management system
c) Service management system d) All the above
7) Public key encryption uses multiple keys one key is used to decrypt data, while another is used to
encrypt data is called the …………. Key while the key used to decrypt data is called the ……….. key.
a) Encryption, Decryption b) Encryption, Public
c) Private, Public d) Public, Private
8) What is the name for direct computer-to-computer transfer of transaction information
contained in standard business document?
a) Internet commerce b) Transaction transfer
c) E-commerce d) Electronic data interchange
9) In cyber law terminology DOS stands for …………..
a) Denial of service b) Disk operating system
c) Distant operating system d) All the above
10) Identity theft is a type of crime in which personal information is stolen to commit fraudulent
activity.
a) True b) False
c) Partly true partly false d) None of the above
Q. 2. Answer the following in short. (Up to 30 words) (10)
1) What is cyber terrorism?
2) What is intermediary?
3) What is data?
4) What is cyber cafe?
5) What is Cryptography?
Cyber Law (LW – 306/7006) AFD/ I 1/2
BACHELOR OF LAWS (Three Years Semester Pattern) CREDIT SYSTEM
B.A. LL.B. (ACADEMIC LAW) (FIVE YEARS SEMESTER PATTERN)
EXAMINATION: NOVEMBER – 2017
THIRD/SEVENTH SEMESTER
Sub.: Cyber Law (LW - 306/7006)
Date : 28/11/2017 Total Marks : 60 Time: 2.00 pm to 4.30 pm
Instructions: 1) All questions are compulsory.
2) Figures to the right indicate full marks.
Q. 1. Choose the correct option from the following. (10)
1) Information Technology Act was amended in the year …………
a) 2000 b) 2004
c) 2008 d) 2010
2) Malware derives its name from …………..
a) Malicious Software b) Malevolent Software
c) Malicious Hardware d) Malevolent Hardware
3) Virus stands for ……………..
a) Very Intelligent result until source b) Very Intelligent resource under search
c) Very Information Resource under Sledge d) Viral important record user searched
4) …………… are attempts by individuals to obtain confidential information from you to
falsifying their identity.
a) Computer Viruses b) Phishing Scam
c) Phishing Trips d) Spyware Scams
5) When a logic bomb is activated by a time related event it is known as …………
a) Virus b) Trojan horse
c) Time related bomb sequence d) Time bomb
6) E-commerce involves the application of ……………….
a) Knowledge management system b) Product management system
c) Service management system d) All the above
7) Public key encryption uses multiple keys one key is used to decrypt data, while another is used to
encrypt data is called the …………. Key while the key used to decrypt data is called the ……….. key.
a) Encryption, Decryption b) Encryption, Public
c) Private, Public d) Public, Private
8) What is the name for direct computer-to-computer transfer of transaction information
contained in standard business document?
a) Internet commerce b) Transaction transfer
c) E-commerce d) Electronic data interchange
9) In cyber law terminology DOS stands for …………..
a) Denial of service b) Disk operating system
c) Distant operating system d) All the above
10) Identity theft is a type of crime in which personal information is stolen to commit fraudulent
activity.
a) True b) False
c) Partly true partly false d) None of the above
Q. 2. Answer the following in short. (Up to 30 words) (10)
1) What is cyber terrorism?
2) What is intermediary?
3) What is data?
4) What is cyber cafe?
5) What is Cryptography?
Cyber Law (LW – 306/7006) AFD/ I 1/2