Sample Question Paper : Diploma in Cyber Law

+ Ask Question / Post resume
Results 1 to 5 of 5
  1. Post Count Number #1
    Site Admin
    Join Date
    April 17th, 2008
    Location
    Europe
    Posts
    11,588

    Sample Question Paper : Diploma in Cyber Law

    Sample Question Paper
    Diploma in Cyber Law

    Duration:
    3 hrs
    Max Marks:
    100
    Instructions:

    1. This is an 'open book' examination. You are allowed to refer to notes or texts
    brought by you
    into the examination hall. You will not be permitted to
    “borrow” notes from any other student.
    2. Cheating or misconduct in exams (such as copying off another student's paper)
    is not allowed. Any student who indulges in such cheating or misconduct will
    be asked to leave the examination hall immediately. The said student will be
    awarded “zero” marks for the examination.
    3. Use of mobile phones, pagers and any form of Internet based communication
    during the examination is strictly prohibited.
    4. For questions in Part A, please tick only one option.
    Please leave this table blank

    Q.No 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Total
    Marks
    Please fill in the following in block letters

    Name in full:
    _______________________________________________________
    Roll number:
    ___________________________ Date: ______________________
    Exam Center
    (please circle the city where you are appearing for the exam):
    Pune / Mumbai
    2
    Part – A

    Questions in this part carry 5 marks each

    1. Neha, a desktop publishing professional has made several authentic

    looking certificates of major Indian and foreign universities and has sold

    these counterfeit certificates for large sums of money to at least 3 people

    in India. Neha had sent these certificates as email attachments to

    prospective customers. Select the most appropriate answer keeping the

    said facts in mind:

    a. Neha would be punished for forgery for forging a document under the
    Information Technology Act, 2000
    b. Neha would be punished for forgery for forging a document under the
    Indian Penal Code 1860
    c. Neha would be punished for forgery for forging an electronic record
    under the Indian Penal Code, 1860
    d. Neha would be punished for forgery for forging an electronic record
    under the Information Technology Act, 2000
    2. With regard to jurisprudence relating to pornography, tick the most

    appropriate answer:

    a) Most jurisdictions punish dissemination of pornography in some
    manner.
    b) All jurisdictions punish dissemination or publishing of child
    pornography.
    c) In some jurisdictions dissemination and possession of actual child
    pornography as well as dissemination of simulated computer animated
    images depicting child pornography is penalized.
    d) Some jurisdictions punish dissemination as well as possession of child
    pornography.
    3
    3. Rita is not sure how exactly a digital signature system works. Help her to

    understand the process by choosing the most appropriate statement.

    a) A digital signature is formed subsequent to a message digest.
    b) A digital signature is formed by signing a message digest with a
    private key.
    c) A digital signature is formed by making a message interact with a one
    way hash function and signing it with a private key, the public key of
    which has been certified by a Certifying Authority.
    d) A digital signature is verified by using hash function and public key.
    4. Select the most appropriate statement about a recognized foreign

    certifying authority (CA) in India

    a) A recognized foreign CA is recognized in India as a CA.
    b) A recognized foreign CA is a CA for the purposes of the IT Act.
    c) A foreign CA is a CA previously approved by the Central Government
    before being recognized by the Controller and is required to be notified
    in the Official Gazette.
    e) A recognized foreign CA is a CA recognized by the Controller of
    Certifying Authorities and previously approved by the Central
    Government.

    5. Digicert Ltd. is a licensed certifying authority in India. Digicert obtained

    its license from the Controller of Certifying Authorities in 2001. However,

    business has not picked up and the company has gone into losses. The

    management of Digicert wants to quit the business and wind up the

    company. Select the most appropriate statement from the following:

    a) Digicert can quit the business and wind up the company.
    b) Digicert has to notify the Controller before terminating operations as a
    certifying authority.
    c) Digicert should notify the Controller 90 days before terminating
    operations as a certifying authority.
    d) The certifying authority has to notify the Controller, advertise and give
    adequate compensation where required before ceasing to act as a
    certifying authority.
    6. Computer software can be

    a) copyrighted in India
    b) patented in India
    c) both copyrighted and patented in India
    d) both copyrighted and patented in the United States of America

    7. ICANN’s UDRP requires a domain registrant to submit to mandatory

    administrative proceedings in case

    a) The registrant’s domain name is identical to a trademark in which a
    complainant has rights.
    b) The registrant has no rights to the domain and has registered the
    domain in bad faith.
    c) The registrant has a deceptively similar trademark, has no rights to the
    domain and is using the domain in bad faith.
    d) The registrant has registered the domain name for disrupting the
    business of the competitor.
    8. Infecting someone’s computer with a computer virus can make a person

    liable to pay damages by way of compensation up to:

    a) A crore of rupees
    b) Two crore rupees
    c) Three crore rupees
    d) Four crore rupees
    9. Rakesh has been accused by Megaprogram Corporation of reproducing

    and distributing their software programs illegally. Rakesh is liable under:

    a) Section 63B of the Indian Copyright Act 1957
    b) Section 63 of the Indian Copyright Act 1957
    c) Section 66 of the Information Technology Act 2000
    d) Section 66 of the Information Technology Act 2000 and Section 63 of
    the Copyright Act 1957

    10. Hacking under the Information Technology Act 2000 means

    a) Unauthorized access to another person’s computer system.
    b) Deleting information stored in another person’s computer system.
    c) Knowingly or intentionally deleting information stored in another
    person’s computer system.
    d) Knowingly or intentionally deleting valuable information stored in
    another person’s computer system.

    Part – B

    01

    A young lady named Ritika Adjania found her profile in an online community
    named “1worldcom” on its website 1worldcom.net. Her surprise turned to horror
    when she realized that the profile painted her as a person of dubious character
    whose only interest was money. The profile also “boasted” of her achievements
    which included defrauding a bank of Rs.10 lakh and getting away with it.
    Ritika immediately informed “1worldcom” of the posting and requested them to
    remove it. The posting was removed the next day but reappeared a week later. It
    was again removed but reappeared two days later. Deeply hurt, Ritika filed a suit
    for defamation against “1worldcom”. With reference to jurisprudence of
    defamation cases, examine the liability of “1worldcom.”
    [10 marks]

    02

    Rakesh had an appointment with Dr. Mina Lahoti at the Wockhardt Hospital,
    Mumbai. While waiting for Dr. Lahoti, Rakesh remembered that he had to email a
    document (that he was carrying in a floppy) to his office. As he looked around, he
    realized that there was a computer at the reception desk, which was switched on.
    However, the receptionist was nowhere to be seen.
    Rakesh immediately inserted the floppy disk containing the document into the
    floppy drive of the computer at the reception desk. Just then, the receptionist
    entered and saw Rakesh at the computer. She immediately called the security
    guards and intimated the manager about the incident. The manager wants to take
    legal action against Rakesh for unauthorized access. Advise the manager.
    [15 marks]

    03

    Pooja has been assigned a project on “Intellectual property rights associated with
    semi – conductor technology”. She conducts a search on Google and comes across
    many articles on the topic. She downloads the articles and uses them extensively
    in her project without taking permission from the authors of the articles. Pooja
    insists that since she is using the articles for private use, she is not liable for any
    infringement. Is she right? Discuss. [15 marks]
    04
    Section 29 of the Information Technology Act 2000 confers power upon the
    Controller of Certifying Authorities to investigate contraventions under the Act.
    Section 78 confers power upon a police officer of the rank of a Deputy
    Superintendent of Police or above to investigate any offence under the Act.
    Rashmi suspects Rakesh of creating and publishing digital signature certificates for
    fraudulent purposes. But she is confused about whom to approach for investigating
    the suspected crime. Clear Rashmi’s confusion with detailed explanations.
    [10 marls]

  2. Post Count Number #2
    Guest Poster
    Join Date
    August 14th, 2008
    Location
    Your Heart, Delhi
    Posts
    76,213

    Re: Sample Question Paper : Diploma in Cyber Law

    what is minimum educational qulification for cource

  3. Post Count Number #3
    Guest Poster
    Join Date
    August 14th, 2008
    Location
    Your Heart, Delhi
    Posts
    76,213

    ANSWER to the Question of Deploma in cyber Law

    Please provide me with the answers to the question that have been given in your this site.
    my email add is : swapankumargarg AT yahoo.co.in
    Model questions to the Deploma in Cyber Law by ASCL.

  4. Post Count Number #4
    Guest Poster
    Join Date
    August 14th, 2008
    Location
    Your Heart, Delhi
    Posts
    76,213

    Please answer me all the above questions.
    Answers are no more available

  5. Post Count Number #5
    Unregistered
    Guest

    Please provide answers to these last 5 questions. My email Id is naveenun AT gmail.com