IndianStudentsExam.Com | Online Free Mock Test | Exams 2025

Choose Your Language

Information Technology Act Law 100 MCQ With Free Exam SET:-1

Q11. Which Section of the Information Technology (Amendment) Act, 2008 deals with the validity of contracts formed through electronic means:

(A) Section 12
(B) Section 10A
(C) Section 11
(D) Section 13

Q12. Under the Information Technology Act:

1. Intermediary is not liable for any third party information if its function is limited to providing access to a communication system.

2. Intermediary is not liable if it does not initiate the transmission, does not select receiver and does not select information.

3. Intermediary is not liable if he aids or induces the third party to commit unlawful act.

Which of the statements given above is/are correct ?

(A) 1 and 2 only
(B) 1 only
(C) 2 and 3 only
(D) 1, 2 and 3

Q13. Under the provisions of the Information Technology Act, 2000 the responsibility of intermediary regarding objectionable content being used to commit the unlawful act extends to:

1. immediately take down the content as soon as intermediaries receive information.

2. taking it down after receiving Court order asking intermediary to expeditiously remove or disable access to certain material.

3. taking it down after receiving Government order asking intermediary to expeditiously remove or disable access to certain material.

Which of the statements given above is/are correct ?

Q14. Controller of Certifying Authorities (CCA) work under ?

(A) Prime Minister Office
(B) Reserve Bank of India
(C) Ministry of Communication and Information Technology
(D) Autonomous body

Q15. What is/are component of Information Technology Act 2000 ?

(A) Legal Recognition to Digital Signatures
(B) Regulation of Certification Authorities
(C) Digital Certificates
(D) All the above

Daily IQ Quiz Click Now

Q16. What is the name of the IT (Information Technology) law that India is having in the Indian legislature ?

(A) India’s Technology (IT) Act, 2000
(B) India’s Digital Information Technology (DIT) Act, 2000
(C) India’s Information Technology (IT) Act, 2000
(D) The Technology Act, 2008

Q17. According to the provisions of the Prevention of Corruption Act 1988, which one of the following is NOT correct ?

(A) A Sub-Inspector of Delhi Special Police Establishment, is authorized to investigate a matter generally without order of the Metropolitan Magistrate/Magistrate of the first class
(B) In Ahmedabad, an Assistant Commissioner of Police is authorized to investigate a matter generally without order of the Metropolitan Magistrate/Magistrate of the first class
(C) In Kanpur, a Deputy Superintendent of Police is authorized to investigate a matter generally without order of the Metropolitan Magistrate /Magistrate of the first class
(D) In Mumbai, an Assistant Commissioner of Police is authorized to investigate a matter generally without order of the Metropolitan Magistrate/Magistrate of the first class

Q18. The Information Technology Act, 2000 applies to offences committed

(A) Any where in India only
(B) Anywhere in India except in the state of Jammu and Kashmir
(C) In India and outside India by any person
(D) In India and outside India only If the offender is an Indian national

Q19. Cyber security’ according to the Information Technology Act, 2000 means

(A) A device and collection of devices, including input and output support devices and excluding calculations which are not programmable and capable of being used
(B) Any electronic, magnetic, optical or other high speed data processing device or system which performs logical, arithmetic and memory functions by manipulation of electronic, magnetic or optical impulse
(C) Protecting information, equipment, devices, computer, computer, computer resource, communication device and information stored therein from unauthorised access, use, disclosure, disruption, modification or destruction
(D) Affixing with its grammatical variations and cognate expressions means adoption of any methodology or procedure by a person for the purpose of authenticating an electronic record

Q20. Mona is confused about ‘asymmetric encryption’ Clarify her doubts by choosing the most appropriate statement:

(A) A message encrypted with a public key can only be decrypted with a private key
(B) A message encrypted with a private key can only be decrypted with a public key
(C) A message encrypted with a symmetric key can only be decrypted with the same encrypting key
(D) A message encrypted with a public key can only be decrypted with the corresponding private key

Scroll to Top