-
August 11th, 2010, 08:55 AM
Post Count Number #1
Sample Question Paper : Diploma in Cyber Law
Sample Question Paper
Diploma in Cyber Law
Duration: 3 hrs
Max Marks: 100
Instructions:
1. This is an 'open book' examination. You are allowed to refer to notes or texts
brought by you into the examination hall. You will not be permitted to
“borrow” notes from any other student.
2. Cheating or misconduct in exams (such as copying off another student's paper)
is not allowed. Any student who indulges in such cheating or misconduct will
be asked to leave the examination hall immediately. The said student will be
awarded “zero” marks for the examination.
3. Use of mobile phones, pagers and any form of Internet based communication
during the examination is strictly prohibited.
4. For questions in Part A, please tick only one option.
Please leave this table blank
Q.No 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Total
Marks
Please fill in the following in block letters
Name in full: _______________________________________________________
Roll number: ___________________________ Date: ______________________
Exam Center (please circle the city where you are appearing for the exam):
Pune / Mumbai
2
Part – A
Questions in this part carry 5 marks each
1. Neha, a desktop publishing professional has made several authentic
looking certificates of major Indian and foreign universities and has sold
these counterfeit certificates for large sums of money to at least 3 people
in India. Neha had sent these certificates as email attachments to
prospective customers. Select the most appropriate answer keeping the
said facts in mind:
a. Neha would be punished for forgery for forging a document under the
Information Technology Act, 2000
b. Neha would be punished for forgery for forging a document under the
Indian Penal Code 1860
c. Neha would be punished for forgery for forging an electronic record
under the Indian Penal Code, 1860
d. Neha would be punished for forgery for forging an electronic record
under the Information Technology Act, 2000
2. With regard to jurisprudence relating to pornography, tick the most
appropriate answer:
a) Most jurisdictions punish dissemination of pornography in some
manner.
b) All jurisdictions punish dissemination or publishing of child
pornography.
c) In some jurisdictions dissemination and possession of actual child
pornography as well as dissemination of simulated computer animated
images depicting child pornography is penalized.
d) Some jurisdictions punish dissemination as well as possession of child
pornography.
3
3. Rita is not sure how exactly a digital signature system works. Help her to
understand the process by choosing the most appropriate statement.
a) A digital signature is formed subsequent to a message digest.
b) A digital signature is formed by signing a message digest with a
private key.
c) A digital signature is formed by making a message interact with a one
way hash function and signing it with a private key, the public key of
which has been certified by a Certifying Authority.
d) A digital signature is verified by using hash function and public key.
4. Select the most appropriate statement about a recognized foreign
certifying authority (CA) in India
a) A recognized foreign CA is recognized in India as a CA.
b) A recognized foreign CA is a CA for the purposes of the IT Act.
c) A foreign CA is a CA previously approved by the Central Government
before being recognized by the Controller and is required to be notified
in the Official Gazette.
e) A recognized foreign CA is a CA recognized by the Controller of
Certifying Authorities and previously approved by the Central
Government.
5. Digicert Ltd. is a licensed certifying authority in India. Digicert obtained
its license from the Controller of Certifying Authorities in 2001. However,
business has not picked up and the company has gone into losses. The
management of Digicert wants to quit the business and wind up the
company. Select the most appropriate statement from the following:
a) Digicert can quit the business and wind up the company.
b) Digicert has to notify the Controller before terminating operations as a
certifying authority.
c) Digicert should notify the Controller 90 days before terminating
operations as a certifying authority.
d) The certifying authority has to notify the Controller, advertise and give
adequate compensation where required before ceasing to act as a
certifying authority.
6. Computer software can be
a) copyrighted in India
b) patented in India
c) both copyrighted and patented in India
d) both copyrighted and patented in the United States of America
7. ICANN’s UDRP requires a domain registrant to submit to mandatory
administrative proceedings in case
a) The registrant’s domain name is identical to a trademark in which a
complainant has rights.
b) The registrant has no rights to the domain and has registered the
domain in bad faith.
c) The registrant has a deceptively similar trademark, has no rights to the
domain and is using the domain in bad faith.
d) The registrant has registered the domain name for disrupting the
business of the competitor.
8. Infecting someone’s computer with a computer virus can make a person
liable to pay damages by way of compensation up to:
a) A crore of rupees
b) Two crore rupees
c) Three crore rupees
d) Four crore rupees
9. Rakesh has been accused by Megaprogram Corporation of reproducing
and distributing their software programs illegally. Rakesh is liable under:
a) Section 63B of the Indian Copyright Act 1957
b) Section 63 of the Indian Copyright Act 1957
c) Section 66 of the Information Technology Act 2000
d) Section 66 of the Information Technology Act 2000 and Section 63 of
the Copyright Act 1957
10. Hacking under the Information Technology Act 2000 means
a) Unauthorized access to another person’s computer system.
b) Deleting information stored in another person’s computer system.
c) Knowingly or intentionally deleting information stored in another
person’s computer system.
d) Knowingly or intentionally deleting valuable information stored in
another person’s computer system.
Part – B
01
A young lady named Ritika Adjania found her profile in an online community
named “1worldcom” on its website 1worldcom.net. Her surprise turned to horror
when she realized that the profile painted her as a person of dubious character
whose only interest was money. The profile also “boasted” of her achievements
which included defrauding a bank of Rs.10 lakh and getting away with it.
Ritika immediately informed “1worldcom” of the posting and requested them to
remove it. The posting was removed the next day but reappeared a week later. It
was again removed but reappeared two days later. Deeply hurt, Ritika filed a suit
for defamation against “1worldcom”. With reference to jurisprudence of
defamation cases, examine the liability of “1worldcom.”
[10 marks]
02
Rakesh had an appointment with Dr. Mina Lahoti at the Wockhardt Hospital,
Mumbai. While waiting for Dr. Lahoti, Rakesh remembered that he had to email a
document (that he was carrying in a floppy) to his office. As he looked around, he
realized that there was a computer at the reception desk, which was switched on.
However, the receptionist was nowhere to be seen.
Rakesh immediately inserted the floppy disk containing the document into the
floppy drive of the computer at the reception desk. Just then, the receptionist
entered and saw Rakesh at the computer. She immediately called the security
guards and intimated the manager about the incident. The manager wants to take
legal action against Rakesh for unauthorized access. Advise the manager.
[15 marks]
03
Pooja has been assigned a project on “Intellectual property rights associated with
semi – conductor technology”. She conducts a search on Google and comes across
many articles on the topic. She downloads the articles and uses them extensively
in her project without taking permission from the authors of the articles. Pooja
insists that since she is using the articles for private use, she is not liable for any
infringement. Is she right? Discuss. [15 marks]
04
Section 29 of the Information Technology Act 2000 confers power upon the
Controller of Certifying Authorities to investigate contraventions under the Act.
Section 78 confers power upon a police officer of the rank of a Deputy
Superintendent of Police or above to investigate any offence under the Act.
Rashmi suspects Rakesh of creating and publishing digital signature certificates for
fraudulent purposes. But she is confused about whom to approach for investigating
the suspected crime. Clear Rashmi’s confusion with detailed explanations.
[10 marls]
-
September 9th, 2010, 08:07 PM
Post Count Number #2
Re: Sample Question Paper : Diploma in Cyber Law
what is minimum educational qulification for cource
-
July 7th, 2011, 01:47 PM
Post Count Number #3
ANSWER to the Question of Deploma in cyber Law
Please provide me with the answers to the question that have been given in your this site.
my email add is : swapankumargarg AT yahoo.co.in
Model questions to the Deploma in Cyber Law by ASCL.
-
January 9th, 2013, 10:30 PM
Post Count Number #4
Please answer me all the above questions.
Answers are no more available
-
July 31st, 2013, 02:20 AM
Post Count Number #5
Please provide answers to these last 5 questions. My email Id is naveenun AT gmail.com