Wednesday, 23 April 2014

13.15.1(CAININC PRACTICAL EXPERIENCE)

Self-Test Questions

            1. Describe the objectives of the IT Act, 2000

            2. Enumerate the instruments, documents or transactions to which IT Act is not applicable.
            3.  Define the following terms: (i) Certifying Authority; (ii) Computer Resource; (iii) Digital Signature; (iv) Key Pair (v) private Key; (vi) public key; (vii) Asymmetric Crypto System; (viii) Data.

            4. Who may authenticate an electronic record? How is it effected?

            5. Write short notes on: (i) Legal recognition of electronic records, (ii) Legal recognition of digital signatures, (iii) Retentions of electronic records.

            6. Describe the provisions as regards attribution, acknowledgement and despatch of electronic records.

            7. Describe the provisions as regards secure electronic records and secure digital signatures.

            8. Describe the provisions as regards appointment of the controller of Certifying Authorities.

            9. Discuss the functions of the controller.

            10. Who can grant a licence to issue Digital Signature Certificates? Give the requirements a person must complete for getting the licence.

            11. In which cases the licence to issue Digital signature Certificates can be’ suspended or revoked?

            12. Who is authorised to issue a Digital signature Certificate? What type of representations are made by the Certifying Authority at the time of issue of a Digital Signature Certificate?

            13. Explain the duties of the subscriber.

            14. What penalty is provided for damage to computer, computer system or Computer network?

            15. Enumerate the power of the Adjudicating officer.

            16. Give provisions relating to establishment and composition and functions of the Cyber Appellate Tribunal.

            17. Write explanatory notes on the following: (i) Tampering with computer source documents; (ii) Hacking with computer system; (iii) Protected system; (iv) Breach of confidentiality and privacy; (v) Offences by companies

No comments:

Post a Comment