0% found this document useful (0 votes)
112 views6 pages

Questions Cyber Law

Uploaded by

Sitansi Mohanty
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
112 views6 pages

Questions Cyber Law

Uploaded by

Sitansi Mohanty
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

2023

Full Marks-80
Time -As in the Programme
marks.
Tne questions are of equal
AnswerALL Questions.
"Information.
1. What do you mean by
Technology" ? Explain the Aims and Objectives
of Information Technology Act 2000.
CR
Short notes :
(a) Asymmetric Crypto System.
(b) Digital Signature.
(c) Secure Electronic Signature.
(d) Computer Network.
2 What do you mean by Electronic Signature
Certificates. Explain the types and
implementations of Electronic Signature
Certificate.
R
Who are the Certifying authorities under ITAct
to regulate Electronic Signature Certificates and
explain the procedures. [Cont...

(TAA

|21
3 Discuss about Legal Recognition of E- Govemance
and its role.
CR
What is E-Commerce and explain modes and
pinstruments of E-Commeroe,
4. What is CyberAppellate Tribunal ? Explain its
jurisdiction and functions.
OR
Explain the procedures for investigation, search
and seizure and discuss how intermediaries not
to be liable in certain cases.
5. Explain Cyber Terrorism and provisions under
ITAt, 2000 and explain how Hacking is different
from cyber terrorism.
OR
Notes on:
(a) Obscenity
(b) Defamation
(c) Frauds on Internent
2019
Time : As in Programme
Full Marks 80

Answer all questions. The questions are of equal


value.

1. Define Digital signature and Secure Electronic


signature. Note down the elements ofa valid
signature. Describe how a Secure Digital
signature replaces a Hand written signature
with a proper illustration.
OR
What do you mean by 'Information
Technology' ? What are the objectives of the
Information Technology Act, 2000?
2. Who can issue Electronic signature
certificates? Note down the types and uses
of various Electronic signature certificates.
OR

BBS_14_(3) (Turn Over)

Scanned by TapScanne

(2 )
How a Digital signature certificate can be
revoked or suspended ? Note down the duties
of subscribers.

3 Note down the legal validity


provision of E
Contracts as per the IT Act, 2000. Describe
the legal provisions fon
acknowledgement and dispatch of attribution,
records.
electronic

OR

Define E-Commerce and


modes of E-Commerce. describe various
4
What do you mean by Cyber
How they differ from Cyber contraventions ?
crimesof?
Elaborate on the adjudication procedure
both.

OR

Classify different kind of Cyber offences


under the following heads:
(a) Computer as a target
(b) Computer as a weapon

BBS_14_3) (Continued)
40acoUTlEU'8

DXS-6yrBA.LLB(H)-PAI-HT LCBCS

2021
Time :As in Programme
Full Marks:80
marks.
The figures in the right-hand margin indicate
The Questions are of equal value.
Answer all questions.
16x5
Discuss the importance of Information Technology.
Also state the aims and objectives of Information
technology Ac.
OR
What is Electronic Signature? State the significance
of electronic signature in reference to the provisions
under IT Act.
12/Who is a Certifying Authority? Discuss the role of
Certifying Authority under ITAct.
OR
State the various duties of subscribers under ITAc in
brief.

(Tum Over)

e-govemance? Enumerate the


What do you mean by E-Govemance under T
salient provisions relating to
Act
OR
and modes of
Briefly discuss the various instruments
e-commerce.

YWhat is Cyber Crime? Discuss the provisions relating


to penalties, Compensation and adjudication of cyber
crime.
OR
State about the establishment and compocltion of
Cyber Appellate Tribunal. Also state the powers and
procedures of Cyber Appellate Tribunal.

Write short notes on:


Hacking
b Cyber Terrorism
OR
State the meaning and types of Internet Fraud. Briefly
state the various provisions under
ITAct to deal with Internet frauds.
2018
Tirme :As in Programme
Full Marks:80

The questions are of equal value.


Answer all questions.

1. Two friends, 'Sima' and 'Riya' wish to exchange


e-mails with each other over the intermet by using
"digital signature technology. Sima while
sending the message wants only to maintain
'Privacy' of the message. Whereas Riya when
replying to Sima's message want both 'Privacy
as well as 'Authenticity' of the message to 4/11
maintained. Explain the steps to be taken by bo.
of them intending to send messages to each
other.
OR

MN-29/3 (Tum over )

Scanned by TapScanner

the
"Digital signature technology is the one of
existing alternatives among the different
techniques to sign any document electronically.
Define the term 'digital signature' and elucidate
its legal status in India.
2. A 'subscriber is a persSon in whose name the
electronic signature certficate is issued. Dicuss,
in detail, the duties of a subscriber.
OR
Mr. Shyam is employed under Mr. Harsh
for which Mr. Shyam signs digitaly a contract of
employment with his employer. After two years,
Mr. Shyam loses his private key and on the
other hand Mr. Harsh gets an access to it.
Mr. Harsh, who is his employer, backdated the
new contract with an intention to reduce
the benefits given to him by signing with
his private key. Since, there is absence of
any physical record, it was not possible
to distinguish between the new and the old
contract. Mr. Shyam has also not registered
his keys with the certifying authority. M. Shyam
MN-29/3 (2) Contd.

Scanned by TapScann

contends that the employer is personally liable


for breach of trust but the employer denies to
such allegations. Please advise Mr. Shyam
whether he can hold Mr. Harsh liable for his
act or not

3. What do you mean by the concept of


e-governance and describe its various kinds ?
Also, discuss the legal sanction behind
egovemance in the Indian perspective.
OR
1Discuss the major problems faced by a
customer while going for e-commerce
transacions and suggest the possible solutions
towards it.

4. Write short notes on any twa of the following :

(o) Exemption from labililty of ntermediaries-M


b) Cyber adjudication as the justice delivery
ystem under the ITAc, 2000
(c) Penalty and compensation for damaging
computer and computer systems -H3-45

(3) (Tum over)


MN-29/3
5. Piyush installs a keylogger ona cyber cafe
Computer. The keylogger is such that it woukd
steal passwords of all the users of the cyber cafe
computers. Describe the type of cyber-crime it is
and cite a few suitable case laws as its

illustraions.
OR
What do you understand by the offence of 'cyber
terrorism'? Please answer elaborately.

You might also like