Offences and Penalties
Aadhaar Offences and Penalties Quiz
Test your knowledge about the offences and penalties associated with Aadhaar and related identity regulations. This quiz covers important laws and their implications on digital identity and security.
Prepare yourself with questions that include:
- Understanding specific offences
- Identifying punishments
- Recognizing responsible entities
Whoever, with the intention of causing harm or mischief to an Aadhaar number holder, or with the intention of appropriating the identity of an Aadhaar number holder changes or attempts to change any demographic information or biometric information of an Aadhaar number holder by impersonating or attempting to impersonate another person, dead or alive, real or imaginary, shall be punishable with imprisonment for a term which may extend to three years and shall also be liable to a fine which may extend to _____ rupees.
5,000
10,000
20,000
50,000
In the case of a company that is not authorised to collect identity information under the provisions of this Act, by words, conduct or demeanour pretends that it is authorised to do so, shall be punishable with a fine which may extend to ___ rupees.
10,000
50,000
1,00,000
2,00,000
Whoever, not being authorised by the Authority, intentionally accesses or secures access to the Central Identities Data Repository shall be punishable with imprisonment for a term which may extend to three years and shall also be liable to a fine which shall not be less than ____ rupees.
10,000
50,000
1,00,000
2,00,000
The meaning of “computer source code” shall have the meaning assigned to it in which of the following Acts?
Section 65 of the Information Technology Act, 2000
IPC Section 67
Section 43 of the Information Technology Act, 2000
Section 41 of Information Technology Act, 2000
The meanings of “computer contaminant”, “computer virus” and “damage” shall have the meaning assigned to it in which of the following Acts?
Section 65 of the Information Technology Act, 2000
IPC Section 67
Section 43 of the Information Technology Act, 2000
Section 41 of the Information Technology Act, 2000
Whoever, being an enrolling agency or a requesting entity, fails to comply with the requirements of sub-section (2) of Section 3 or sub-section (3) of Section 8, shall be punishable with imprisonment which may extend to ____ year(s).
1
2
3
4
Whoever commits an offence under Information Technology Act, 2000 any rules or regulations made thereunder for which no specific penalty is provided elsewhere than this section, shall be punishable with imprisonment for a term which may extend to one year or with a fine, which may extend to ______ rupees.
5,000
10,000
25,000
50,000
Whoever commits an offence under Information Technology Act, 2000 any rules or regulations made thereunder for which no specific penalty is provided elsewhere than this section, shall be punishable. Given here are some punishments:i. Imprisonment for a term which may extend to 1 yearii. Fine which may extend to Rs. 25,000iii. Imprisonment for a term which may extend to 2 yeariv. Fine which may extend to Rs. 15,000Identify the correct punishments.
I. Or ii.
I. Or iv.
Ii. Or iii.
Iii. Or iv.
Whoever, being a requesting entity, uses the identity information of an individual in contravention of sub-section (3) of Section 8, shall be punishable. Given here are some punishments.i. Imprisonment for a term which may extend to 1 yearii. Fine which may extend to Rs. 25,000iii. Imprisonment for a term which may extend to 3 yearsiv. Fine which may extend to Rs. 10,000Identify the correct option.
I. Or ii.
I. Or iv.
Ii. Or iii.
Iii. Or iv.
Given here are some courts.i. Chief Metropolitan Magistrateii. Chief Judicial Magistrateiii. Primary Courtiv. Judicial Service CommissionIdentify the courts that can try any offence punishable under Information Technology Act, 2000.
I. Or ii.
I. Or iv.
Ii. Or iii.
Iii. Or iv.
Given here are some police ranks.i. Sub-Inspector of Policeii. Assistant Sub-Inspector of Policeiii. Inspector of Policeiv. Assistant Inspector of PoliceIdentify the police rank that can investigate any offence under Information Technology Act, 2000.
I. Or ii.
I. Or iv.
Iii.
Iii. Or iv.
An error was uncovered where enrolment with fake PoI/PoA was done by tampering UIDAI software.Given here are some people.i. Operatorii. Supervisoriii. Registrariv. IntroducerWhich of these people will be punishable for this offence?
I. Or ii.
I. Or iv.
Iii.
Iii. Or iv.
During verification, it is discovered that a Photo of Photo (PoP) was used in the Aadhaar registration. Given here are some people:i. Operatorii. Supervisoriii. Registrariv. IntroducerWhich of these people will be punishable for this offence?
I. Or ii.
I. Or iv.
Iii.
Iii. Or iv.
Whoever, not being authorised by the Authority, intentionally downloads, copies or extracts any data from the Central Identities Data Repository or stored in any removable storage medium shall be punishable.Given here are some punishments:i. Imprisonment for a term which may extend to 3 yearsii. Shall be liable to a fine which shall not be less than Rs. 1,00,000iii. Imprisonment for a term which may extend to 2 yearsiv. Shall be liable to a fine which shall not be less than Rs. 30,000Identify the correct option.
I. And ii.
Iii. And iv.
Ii. And iv.
I. And iv.
Whoever, not being authorised by the Authority, intentionally steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used by the Authority with an intention to cause damage, shall be punishable.Given here are some punishments:i. Imprisonment for a term which may extend to 3 yearsii. Shall be liable to a fine which shall not be less than Rs. 1,00,000iii. Imprisonment for a term which may extend to 2 yearsiv. Shall be liable to a fine which shall not be less than Rs. 30,000Identify the correct punishments.i. And ii.iii. And iv.ii. And iv.i. And iv.
I. And ii.
Iii. And iv.
Ii. And iv.
I. And iv.
Whoever, being an enrolling agency or a requesting entity, fails to comply with the requirements of sub-section (2) of Section 3 or sub-section (3) of Section 8, shall be punishable.Given here are some punishments:i. Imprisonment for a term which may extend to 1 yearii. Fine which may extend to Rs. 25,000iii. Imprisonment for a term which may extend to 3 yeariv. Fine which may extend to Rs. 10,000Identify the correct punishments.
I. Or ii.
I. Or iv.
Ii. Or iii.
Iii. Or iv.
Whoever, not being authorised by the Authority, intentionally denies or causes a denial of access to any person who is authorised to access the Central Identities Data Repository shall be punishable:i. Imprisonment for a term which may extend to 3 yearsii. Shall be liable to a fine which shall not be less than Rs. 1,00,000iii. Imprisonment for a term which may extend to 2 yearsiv. Shall be liable to a fine which shall not be less than Rs. 30,000Identify the correct punishments
I. And ii.
Iii. And iv.
Ii. And iv.
I. And iv.
Given here are some offences. I. A person or company not being authorised by the Authority disrupts or causes disruption to the access to the Central Identities Data Repositoryii. A person or company damages or causes to be damaged the data in the Central Identities Data Repositoryiii. A person or company introduces or causes to be introduced any virus or other computer contaminant in the Central Identities Data Repositoryiv. A person or company intentionally discloses, transmits, copies or otherwise disseminates any identity information collectedYou need to find the offences that result in imprisonment for a term which may extend to three years and shall also be liable to a fine which shall not be less than ten lakh rupees.
I. ii. iii. And iv.
I., ii. And iv.
I., ii. And iii.
I. And iv.
Given here are some offences. I. A person or company destroys, deletes or alters any information stored in any removable storage media or in the Central Identities Data Repository or diminishes its value or utility or affects it injuriously by any meansii. A person or company steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used by the Authority with an intention to cause damageiii. A person or company impersonates or attempts to impersonate another person, whether dead or alive, real or imaginary, by providing any false demographic informationiv. A person or company reveals any information in contravention of sub-section (5) of Section 28, or shares, uses or displays information in contravention of Section 29 or assists any person in any of the aforementioned ActsYou need to find the offences that result in imprisonment for a term which
I. ii. iii. And iv.
I., ii. And iv.
I., ii. And iii.
I. And iv.
Given here are some offences. I. A person or company not being authorised to collect identity information under the provisions of this Act, by words, conduct or demeanour pretends that he is authorised to do soii. A person or company steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used by the Authority with an intention to cause damageiii. A person or company impersonates or attempts to impersonate another person, whether dead or alive, real or imaginary, by providing any false demographic informationiv. A person or company reveals any information in contravention of sub-section (5) of section 28, or shares, uses or displays information in contravention of section 29 or assists any person in any of the aforementioned ActsYou need to find the offences that result in imprisonment for a term which may extend to three years or with a fine
I. ii. iii. And iv.
I., ii. And iv.
I., ii. And iii.
I. And iii.
{"name":"Offences and Penalties", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge about the offences and penalties associated with Aadhaar and related identity regulations. This quiz covers important laws and their implications on digital identity and security.Prepare yourself with questions that include:Understanding specific offencesIdentifying punishmentsRecognizing responsible entities","img":"https:/images/course7.png"}
More Quizzes
Quiz 23 -Security & Privacy, Aadhaar Act
105128
Offences and Penalties
2010223
Thycotic - PAM
14749
Privacy Awareness Training
9447
Data Privacy
15810
Information assurance 1
10531
Malware
1050
Practice questions PAM-DEF
90450
Cyber
15822
AWS Security & Identity
1586
Cyber Security Analyst Knowledge (Level 1)
1476
Monthly SecOPS quiz
1168