Information Technology Act MCQ Quiz - Objective Question with Answer for Information Technology Act - Download Free PDF
Last updated on Jun 4, 2025
Latest Information Technology Act MCQ Objective Questions
Information Technology Act Question 1:
As per Section 77B of the Information Technology Act, which offence is bailable?
Answer (Detailed Solution Below)
Information Technology Act Question 1 Detailed Solution
The correct answer is 'Offence punishable with less than 3 years' imprisonment'
Key Points
- Section 77B of the Information Technology Act:
- Section 77B of the IT Act specifically addresses the classification of offences as bailable or non-bailable.
- According to this section, offences punishable with imprisonment for a term of less than three years are classified as bailable offences.
- In a bailable offence, the accused has the legal right to be granted bail, which ensures that they are not detained unnecessarily during the trial process.
- This provision ensures that minor offences under the IT Act, which carry lighter penalties, are treated with leniency while balancing the need for justice.
- Incorrect Options:
- Offence punishable with 7 years’ imprisonment:
- Offences carrying a punishment of 7 years are considered more severe and are generally non-bailable under the IT Act.
- Such cases often involve serious crimes such as cyber terrorism or breaches of national security.
- Offence punishable with life imprisonment:
- Offences punishable with life imprisonment are the most severe and are non-bailable under the IT Act.
- These offences typically involve highly aggravated crimes that pose a significant threat to public safety or national interests.
- Offence punishable with exactly 3 years’ imprisonment:
- While offences with less than three years’ imprisonment are bailable, those punishable with exactly three years may be treated differently based on judicial interpretation and the nature of the crime.
- Such offences may fall into a grey area and might not always qualify as bailable under Section 77B.
- Offence punishable with 7 years’ imprisonment:
- Importance of Section 77B:
- This section provides clarity on the legal categorization of offences and their corresponding treatment during judicial proceedings.
- It ensures proportionality in the handling of crimes under the IT Act, distinguishing between minor and serious offences.
Information Technology Act Question 2:
Under Section 78 of the Information Technology Act, who is authorized to investigate offences under the Act?
Answer (Detailed Solution Below)
Information Technology Act Question 2 Detailed Solution
The correct answer is 'Police officer not below the rank of Inspector'
Key Points
- Section 78 of the Information Technology (IT) Act, 2000:
- This section specifies the authority responsible for investigating offences under the IT Act.
- It mandates that only a police officer not below the rank of Inspector is authorized to investigate offences under this Act.
- This provision ensures that investigations are handled by experienced and capable officers with adequate training and knowledge of the law, especially given the technical nature of cybercrimes.
- The rank requirement minimizes the risk of misuse of authority and ensures proper procedural compliance during the investigation.
- Explanation of Incorrect Options:
- Any head constable:
- A head constable is a lower-ranked police officer and is not authorized under Section 78 to investigate offences under the IT Act.
- The complexity of cybercrimes and the legal framework requires officers of higher ranks with specialized training.
- Magistrate only:
- While magistrates play a crucial role in judicial proceedings, they do not conduct investigations. Their role is to oversee and ensure the legality of the investigation process and to deliver judgments based on evidence presented.
- CID officer only:
- CID (Criminal Investigation Department) officers do investigate crimes, but Section 78 does not specifically limit the authority to CID officers. The Act only specifies that the officer must be of the rank of Inspector or above, regardless of the department.
- Any head constable:
- Importance of Section 78:
- This section helps ensure that cybercrime investigations are conducted by officers with sufficient rank, experience, and accountability.
- It also reinforces the seriousness of cybercrimes and the need for skilled personnel to handle such offences.
Information Technology Act Question 3:
What is a valid defence under Sections 67, 67A, and 67B of the Information Technology Act?
Answer (Detailed Solution Below)
Information Technology Act Question 3 Detailed Solution
The correct answer is 'The content was published in interest of art or science'
Key Points
- Sections 67, 67A, and 67B of the Information Technology Act:
- These sections deal with the publication, transmission, or sharing of obscene, sexually explicit content, or child pornography through electronic means.
- Section 67 specifically prohibits publishing or transmitting obscene material in electronic form.
- Section 67A addresses material that is sexually explicit, while Section 67B pertains to material depicting children in sexually explicit acts.
- Violating these provisions can lead to stringent penalties, including imprisonment and fines.
- Defence under these sections:
- A valid defence under these sections is when the content is published or transmitted in the interest of art, science, literature, or learning, or for other purposes such as research or education.
- This defence recognizes that certain forms of content, though sensitive in nature, may serve a legitimate purpose in these fields and are not intended to cause harm or exploitative behavior.
- The burden of proving that the content was shared for such purposes lies with the accused.
- Other options explained:
- The act was committed from a foreign location: This is not a valid defence. The IT Act has extraterritorial jurisdiction under Section 75, meaning it applies to offences committed outside India if the computer system or network involved is located in India.
- The accused was unaware of the content: Mere lack of awareness is not a valid defence. The prosecution must prove intent, but the accused cannot claim ignorance without sufficient evidence to support it.
- The material was kept in personal storage: While personal storage might indicate the material was not intended for public transmission, it does not automatically provide immunity from the provisions of these sections.
Information Technology Act Question 4:
What is the maximum punishment under Section 72 of the Information Technology Act for breach of privacy?
Answer (Detailed Solution Below)
Information Technology Act Question 4 Detailed Solution
The correct answer is '2 years and ₹1 lakh fine'
Key Points
- Overview of Section 72 of the Information Technology Act:
- Section 72 of the Information Technology Act, 2000 deals with the breach of privacy and confidentiality of information.
- It applies to any person who, while exercising powers under the IT Act, gains unauthorized access to electronic records, documents, or personal data and discloses this information without consent.
- The provision aims to protect individuals' privacy in the digital era where sensitive information can be easily accessed and misused.
- Maximum Punishment under Section 72:
- The maximum punishment for a breach of privacy under this section is imprisonment for up to 2 years or a fine of up to ₹1 lakh, or both.
- This penalty is meant to deter individuals or organizations from misusing personal data or confidential information.
- Analysis of Incorrect Options:
- Option 1 (3 years and ₹2 lakh fine): This is incorrect because Section 72 prescribes a maximum punishment of 2 years, not 3 years, and a fine of ₹1 lakh, not ₹2 lakh.
- Option 3 (5 years and ₹5 lakh fine): This is also incorrect as such a severe penalty applies to different provisions of the IT Act, such as hacking under Section 66, but not under Section 72.
- Option 4 (Only civil penalty): This is incorrect because Section 72 includes both criminal punishment (imprisonment) and a monetary fine, not just a civil penalty.
- Option 5 (Blank): This is not a valid option and does not provide any relevant information.
- Other Relevant Provisions:
- Section 72A of the IT Act deals with the disclosure of information in breach of a lawful contract, which also provides penalties for misuse of personal data but is distinct from Section 72.
- To address concerns about data privacy, India has also introduced the Digital Personal Data Protection Act, 2023, which provides a comprehensive framework for safeguarding personal data.
Information Technology Act Question 5:
Which section of the Information Technology Act penalizes breach of confidentiality and privacy?
Answer (Detailed Solution Below)
Information Technology Act Question 5 Detailed Solution
The correct answer is 'Section 72'
Key Points
- Section 72 of the Information Technology (IT) Act, 2000:
- Section 72 specifically deals with the penalty for a breach of confidentiality and privacy under the IT Act, 2000.
- It penalizes individuals who, without the consent of the person concerned, disclose information obtained while providing services under the IT Act.
- The punishment under this section includes imprisonment for up to two years, or a fine of up to ₹1 lakh, or both.
- This provision plays a critical role in safeguarding the confidentiality of sensitive personal information in a digital ecosystem.
Additional Information
- Section 67:
- This section penalizes the publishing or transmission of obscene material in electronic form.
- It is unrelated to confidentiality or privacy breaches and is aimed at curbing obscenity in cyberspace.
- Section 67A:
- Section 67A deals with the publication or transmission of material containing sexually explicit acts in electronic form.
- It is an extension of Section 67 but focuses on sexually explicit content rather than general obscenity or privacy breaches.
- Section 78:
- Section 78 authorizes police officers, not below the rank of Inspector, to investigate offenses under the IT Act.
- It is procedural and does not deal with confidentiality or privacy breaches.
Top Information Technology Act MCQ Objective Questions
Under which section of Information Technology Act of 2000, updated in 2008, stealing any digital asset or information is considered as cyber crime?
Answer (Detailed Solution Below)
Information Technology Act Question 6 Detailed Solution
Download Solution PDFSection 65 of the Information Technology Act of 2000, updated in 2008, stealing any digital asset or information is considered as cyber crime
Section 65:
Tampering with computer source documents: Whoever knowingly or intentionally conceals, destroys or alters or intentionally or knowingly causes another to conceal, destroy, or alter any computer source code used for a computer, computer programme, computer system, or computer network, when the computer source code is required to be kept or maintained by law for the time being in force, shall be punishable with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both.
Who of the following on acting in good faith are protected from prosecution under Section 84 of the Information Technology Act, 2000?
Answer (Detailed Solution Below)
Information Technology Act Question 7 Detailed Solution
Download Solution PDFThe correct answer is Option 2.
Key PointsSection 84 in The Information Technology Act, 2000
- Protection of action taken in good faith.-
- No suit, prosecution or other legal proceeding shall lie against the Central Government, the State Government, the Controller or any person acting on behalf of him, the Presiding Officer, adjudicating officers and the staff of the Cyber Appellate Tribunal for anything which is in good faith done or intended to be done in pursuance of this Act or any rule, regulation or order made thereunder
Which of the following issues are addressed by the Information Technology Act. 2000?
(A) Legal recognition of electronic documents
(B) Redressal of grievances
(C) Offenses and contraventions
(D) Disputes settlements
(E) Justice dispensation system for cyber crimes
Choose the correct answer from the options given below:
Answer (Detailed Solution Below)
Information Technology Act Question 8 Detailed Solution
Download Solution PDFInformation Technology Act. 2000:
- With passing the Information Technology Act of 2000, India became the 12th nation to adopt cyber legislation.
- The Information Technology Act of 2000 gives transactions made via electronic data interchange, other electronic means of communication, or electronic commerce a legal status.
Important Points Section 4 - Legal recognition of electronic records:
Where any law provides that information or any other matter shall be in writing or in the typewritten or printed form, then, notwithstanding anything contained in such law, such requirement shall be deemed to have been satisfied if such information or matter is–
- rendered or made available in an electronic form; and
- accessible so as to be usable for a subsequent reference.
Chapter XI of Information Technology Act. 2000 - Offences
Cyber offences are illegal acts that are carried out in a highly technical manner, either using computers as a tool, a target, or both.
The offenses included in the IT Act 2000 are as follows:
- Tampering with the computer source documents. (Section 65)
- Hacking with computer system (Section 66)
- Publishing of information which is obscene in electronic form (Section 67)
- Power of Controller to give directions (Section 68)
- Directions of Controller to a subscriber to extend facilities to decrypt information (Section 69
- Protected system (Section 70)
- Penalty for misrepresentation (Section 71)
- Penalty for breach of confidentiality and privacy (Section 72)
- Penalty for publishing Digital Signature Certificate false in certain particulars (Section 73)
- Publication for fraudulent purpose (Section 74)
- Act to apply for offense or contravention committed outside India (Section 75)
- Confiscation (Section 76)
- Penalties or confiscation not to interfere with other punishments (Section 77)
- Power to investigate offenses (Section 78)
Chapter IX deals with Penalties, Compensation and Adjudication: This chapter describes the various penalties and compensations to be paid in context to various offenses.
Chapter X deals with Appellate Tribunal: This chapter describes the various powers, procedures and rights in connection with the Appellate Tribunal.
Both Chapter IX and X of IT Act 2000 covers Justice dispensation system for cyber-crimes.
Hence, (A), (C), (E) Only are true.
Arrange in proper sequence the following benefits available to Information System Auditor who uses CATT:
A. Check susceptibility to threat. Much of the accounting is done through cloud accounts or other online system.
B. Evaluating the system
C. Data security
D. Bolsters controls
E. Develop IT Governance
Choose the correct answer from the options given below:
Answer (Detailed Solution Below)
Information Technology Act Question 9 Detailed Solution
Download Solution PDFThe correct answer is A, B, C, D, E.
Key PointsThe correct sequence is:
A. Check susceptibility to threat. Much of the accounting is done through cloud accounts or other online systems.
Using CATT, auditors can assess the susceptibility of the accounting system to various threats, especially those related to online or cloud-based accounts. This step involves identifying potential risks and vulnerabilities in the system.
B. Evaluating the system
CATT helps auditors evaluate the information system by assessing its design, functionality, and effectiveness in achieving its objectives. This step involves examining the system's controls and processes.
C. Data security
CATT can be used to assess the security measures in place to protect sensitive data. It helps auditors identify any vulnerabilities or risks related to data security and provides recommendations for enhancing security measures.
D. Bolsters controls
CATT aids in strengthening internal controls by identifying weaknesses or gaps in the system. It allows auditors to test the effectiveness of controls and make recommendations for improving control mechanisms.
E. Develop IT Governance
Using CATT, auditors can evaluate the organization's IT governance framework. This step involves assessing the alignment of IT strategies and objectives with overall business goals and providing insights into improving IT governance practices.
Therefore, the correct sequence is:
A. Check susceptibility to threat. Much of the accounting is done through cloud accounts or other online systems.
B. Evaluating the system
C. Data security
D. Bolsters controls
E. Develop IT Governance
Which section of the Information Technology Act, 2000 deals with the appointment of Controller of Certifying Authorities?
Answer (Detailed Solution Below)
Information Technology Act Question 10 Detailed Solution
Download Solution PDFThe correct answer is Section 17.
Key Points
- Section 17 of the Information Technology Act, 2000, deals specifically with the appointment of the Controller of Certifying Authorities.
- The Controller of Certifying Authorities (CCA) is responsible for regulating the working of Certifying Authorities, ensuring compliance with the Act.
- The CCA is appointed by the Central Government to oversee the issuance and management of digital certificates in India.
- The Controller plays a vital role in maintaining the integrity and reliability of digital signatures and secure electronic transactions.
- The appointment under Section 17 ensures trust and authenticity in digital communication as mandated by the IT Act.
Additional Information
- Certifying Authority (CA):
- A Certifying Authority is an entity authorized by the Controller to issue digital certificates.
- These certificates are used to verify the identity of entities engaging in secure online communication.
- Digital Signature:
- A digital signature is a secure electronic signature used to authenticate the identity of the sender and ensure the integrity of the message.
- It is legally recognized under the IT Act, 2000, for digital transactions.
- Information Technology Act, 2000:
- This Act provides the legal framework for e-commerce, electronic governance, and cybercrime prevention in India.
- It emphasizes the use of digital signatures and secure electronic records for transactions.
- Role of Controller of Certifying Authorities:
- Oversees compliance with security protocols for digital certificates.
- Manages licensing and regulation of Certifying Authorities in India.
The "key pair" contemplated under the Information Technology Act, 2000 envisages an asymmetric crypto system involving a private key and ______.
Answer (Detailed Solution Below)
Information Technology Act Question 11 Detailed Solution
Download Solution PDFThe correct answer is 'its mathematically'
Key Points
- Key Pair Concept under the Information Technology Act, 2000:
- The concept of a "key pair" is a fundamental element of Public Key Infrastructure (PKI), which is widely used in secure communications and digital signatures.
- Under the Information Technology Act, 2000, a key pair refers to the combination of a private key and a public key, which are mathematically related but function in an asymmetric cryptographic system.
- Asymmetric cryptography ensures that messages encrypted with a public key can only be decrypted with its corresponding private key, and vice versa, enabling secure communication and authentication.
- The mathematical relationship between the public and private keys is based on complex algorithms such as RSA, ECC, or DSA, ensuring that the keys are computationally infeasible to derive from each other.
Additional Information
- Why the other options are incorrect:
- Option 1 - Its geographically: The term "geographically" refers to physical or spatial relationships, which are irrelevant in the context of key pairs. Key pairs are not dependent on geographical aspects but on mathematical principles.
- Option 2 - Its geometrically: While "geometrically" pertains to shapes, sizes, and relative positions in space, it does not apply to the cryptographic relationship of key pairs. The relationship between keys is mathematical, not geometric.
- Option 3 - Its enigmatically: "Enigmatically" means mysterious or puzzling. While cryptography may seem enigmatic to some, the relationship between the keys is not based on mystery but on precise mathematical algorithms.
- Importance of the Mathematical Foundation:
- The mathematical foundation ensures the security and reliability of the cryptographic system, making it practically impossible to derive the private key from the public key.
- This mathematical relationship is the basis for digital signatures, encryption, and other secure communication protocols under the IT Act.
Which section of Information Technology Act, 2000 punishes publication or transmission of obscene content in electronic form?
Answer (Detailed Solution Below)
Information Technology Act Question 12 Detailed Solution
Download Solution PDFThe correct answer is 'Section 67 of the Information Technology Act, 2000'
Key Points
- Section 67 of the Information Technology Act, 2000:
- Section 67 specifically deals with the punishment for publishing or transmitting obscene content in electronic form.
- This section makes it illegal to publish, share, or transmit any material that is deemed lascivious or appeals to prurient interests, or if its effect is such that it tends to deprave and corrupt persons likely to read, see, or hear the content.
- Under this provision, individuals found guilty of violating it can face imprisonment for up to three years and a fine of up to five lakh rupees for the first conviction. Subsequent convictions may lead to harsher penalties, including imprisonment for up to five years and a fine of up to ten lakh rupees.
- The objective of Section 67 is to regulate the misuse of electronic platforms for sharing obscene content and protect users from harmful or unethical digital practices.
Additional Information
- Explanation of other sections (incorrect options):
- Section 69:
- This section grants the central or state government the authority to issue directions for the interception, monitoring, or decryption of information through any computer resource in the interest of national security, public order, or prevention of offenses.
- It does not deal with the publication or transmission of obscene content.
- Section 70:
- This section designates certain computer systems as "protected systems" and lays down provisions for securing them against unauthorized access.
- It is unrelated to the regulation of obscene content in electronic form.
- Section 68:
- This section deals with the authority of the Controller of Certifying Authorities to issue directions to subscribers and other entities for ensuring compliance with the provisions of the IT Act.
- It does not address the issue of obscene content.
- Section 69:
___________ over the internet gives the cyber stalker suitable shield from the charge of the offence committed.
Answer (Detailed Solution Below)
Information Technology Act Question 13 Detailed Solution
Download Solution PDFThe correct answer is 'Anonymity'
Key Points
- Anonymity over the internet:
- Anonymity refers to the ability to hide one’s identity while using the internet.
- This feature can be exploited by cyber stalkers to avoid being identified or traced, thus providing them a shield from legal consequences.
- Cyber stalkers often use techniques such as masking IP addresses, using Virtual Private Networks (VPNs), or employing anonymous browsing tools to maintain their anonymity.
- The lack of proper identification mechanisms on certain online platforms allows malicious actors to commit offenses without fear of immediate detection.
- Anonymity is a double-edged sword—it protects privacy but also enables misuse, making it a central concern in cybercrime investigations.
Additional Information
- Explanation of other options:
- Connectivity:
- Connectivity refers to the ability to access and connect to the internet or other networks.
- While connectivity facilitates communication and access to information, it does not shield cyber stalkers from legal consequences.
- IP address:
- An IP address is a unique identifier for devices connected to a network.
- Instead of shielding cyber stalkers, IP addresses are often used by law enforcement to trace and identify offenders.
- Anti-virus:
- Anti-virus software is designed to protect devices from malware and other security threats.
- It plays no role in shielding cyber stalkers, as it is a defensive tool for users to safeguard their systems.
- Connectivity:
A digital signature process requires the _____ to be shared with the recipient.
Answer (Detailed Solution Below)
Information Technology Act Question 14 Detailed Solution
Download Solution PDFThe correct answer is 'Public Key'
Key Points
In the digital signature process:
- The sender signs the data using their private key.
- The recipient uses the sender's public key to verify the signature.
- The public key must be shared with the recipient so they can:
- Verify the authenticity of the sender.
- Ensure the integrity of the message (i.e., that it wasn't altered).
In which year India's I.T. Act came into existence?
Answer (Detailed Solution Below)
Information Technology Act Question 15 Detailed Solution
Download Solution PDFThe correct answer is 2000.
Key Points
- The Information Technology Act, 2000, was enacted by the Parliament of India to provide a legal framework for electronic governance.
- This Act is the primary law in India dealing with cybercrime and electronic commerce.
- The IT Act, 2000, was signed into law by then-President K.R. Narayanan on 9 June 2000 and came into force on 17 October 2000.
- It aims to facilitate electronic transactions and ensure security practices to protect data and privacy.
- The Act includes provisions for digital signatures, electronic records, and the legal recognition of electronic contracts.
Additional Information
- Cybercrime:
- Cybercrime refers to criminal activities conducted via the internet or other computer networks.
- Examples include hacking, identity theft, phishing, and spreading malware.
- The IT Act, 2000, addresses various forms of cybercrime and lays down the penalties for such offenses.
- Electronic Commerce:
- Electronic commerce, or e-commerce, involves buying and selling goods and services over the internet.
- The IT Act, 2000, provides legal recognition to electronic transactions and digital signatures.
- This has facilitated the growth of online businesses and digital marketplaces in India.
- Digital Signature:
- A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents.
- The IT Act, 2000, provides legal validity to digital signatures, making them equivalent to handwritten signatures.
- This ensures the integrity and authenticity of electronic documents.
- Data Protection:
- Data protection refers to safeguarding personal data from unauthorized access, disclosure, or misuse.
- The IT Act, 2000, includes provisions to protect sensitive personal data and to ensure data privacy.
- Organizations are required to implement security practices to protect data under this Act.