50+ AIBE MCQs on Cyber Law with Answers, Best Books for Preparation

2 minute read

Souvik

Souvik

Update on Aug 30 2025, 04:57 PM IST

50+ AIBE MCQs on Cyber Law: The All India Bar Examination (AIBE) XX (20) 2025 will assess your understanding of important legal topics, including Cyber Law, which has become increasingly vital in today’s digital world. Due to the rise in cybercrimes and data breaches, it is essential for lawyers to have a strong grasp of cyber legal principles. This article serves as a detailed guide covering the AIBE 20 Cyber Law syllabus, recommended books for preparation, key cyber law cases, and over 50 multiple-choice questions to help you prepare effectively.

 

Cyber Law is considered one of the high-scoring subjects in AIBE XX (20) 2025. By following a well-planned study approach using the official Cyber Law syllabus for AIBE 20, consulting the best reference books, and reviewing important cyber law case studies, you can build expertise in this area. Additionally, practicing the 50+ Cyber Law MCQs will enhance your readiness for the AIBE exam.

 

Table of Contents
  1. AIBE 20 Cyber Law Syllabus
  2. 50+ AIBE MCQs on Cyber Law
  3. Best Books for AIBE 20 Cyber Law Exam Preparation

 

AIBE 20 Cyber Law Syllabus

Candidates who wish to participate in AIBE 20 exam can check the important topics covered in the exam below.

  • Information Technology Act, 2000 (with amendments)
  • Definitions under IT Act – Computer, Data, Information, Intermediary, etc.
  • Cyber Crimes – Hacking, Phishing, Identity Theft, Cyberstalking, Cyber Terrorism
  • Electronic Evidence & Admissibility (under Indian Evidence Act & IT Act)
  • Digital Signature and E-Governance
  • Data Protection and Privacy Laws in India
  • Role and liability of Intermediaries
  • Jurisdiction in Cyber Offences
  • Recent amendments to IT Rules (including 2021 Intermediary Guidelines)
  • International Frameworks on Cyber Law

Check AIBE 20 Syllabus

 

50+ AIBE MCQs on Cyber Law

Candidates can check the MCQs on Cyber Law below.

 

1. Which of the following sections of IT Act defines “Hacking”?

 

a) Section 43

 

b) Section 66

 

c) Section 72

 

d) Section 70

 

Ans: b) Section 66

 

2. The IT Act, 2000 came into force on:

 

a) 17 October 2000

 

b) 15 August 2000

 

c) 26 January 2001

 

d) 1 December 2000

 

Ans: a) 17 October 2000

 

3. Which authority adjudicates over cyber contraventions under IT Act?

 

a) High Court

 

b) Cyber Tribunal

 

c) Adjudicating Officer

 

d) Magistrate

 

Ans: c) Adjudicating Officer

 

4. Which section deals with sending offensive messages through communication service?

 

a) Section 65

 

b) Section 66A

 

c) Section 67

 

d) Section 69

 

Ans: b) Section 66A (struck down in Shreya Singhal case)

 

5. Who is an “intermediary” under the IT Act?

 

a) Content creator

 

b) Cyber café

 

c) Network service provider

 

d) Both b and c

 

Ans: d) Both b and c

 

6. Digital signature is defined under which section?

 

a) Section 2(p)

 

b) Section 3

 

c) Section 4

 

d) Section 10A

 

Ans: b) Section 3

 

7. The maximum penalty for damage to computer system under Section 43 is:

 

a) INR 10 lakhs

 

b) INR 1 crore

 

c) INR 5 crore

 

d) No upper limit

 

Ans: b) ₹1 crore

 

8. Which section empowers interception of data by government?

 

a) Section 66

 

b) Section 67

 

c) Section 69

 

d) Section 70

 

Ans: c) Section 69

 

9. Phishing primarily involves:

 

a) Data encryption

 

b) Email spoofing

 

c) Data recovery

 

d) Server hijacking

 

Ans: b) Email spoofing

 

9. Which court has jurisdiction over cybercrimes?

 

a) District Court

 

b) Special Cyber Court

 

c) Sessions Court

 

d) Both a and c

 

Ans: d) Both a and c

 

10. What is the full form of IT Act?

 

a) Indian Telecommunication Act

 

b) Information Technology Act

 

c) Internet Technology Act

 

d) Information Transfer Act

 

Ans: b) Information Technology Act

 

11. The Information Technology Act was enacted in which year?

 

a) 1999

 

b) 2000

 

c) 2001

 

d) 2005

 

Ans: b) 2000

 

12. Section 66C of IT Act deals with:

 

a) Hacking

 

b) Identity theft

 

c) Cyber terrorism

 

d) Child pornography

 

Ans: b) Identity theft

 

13. “Electronic Record” is defined under which section of IT Act, 2000?

 

a) Section 2(1)(t)

 

b) Section 3

 

c) Section 4

 

d) Section 2(1)(d)

 

Ans: a) Section 2(1)(t)

 

14. Which section talks about legal recognition of electronic records?

 

a) Section 3

 

b) Section 4

 

c) Section 5

 

d) Section 6

 

Ans: b) Section 4

 

15. Digital Signature is defined in which section?

 

a) Section 2(p)

 

b) Section 3

 

c) Section 4

 

d) Section 5

 

Ans: b) Section 3

 

16. Which case declared Section 66A of the IT Act unconstitutional?

 

a) Avnish Bajaj v. State

 

b) Shreya Singhal v. Union of India

 

c) Anvar P.V. v. P.K. Basheer

 

d) Syed Asifuddin v. State of AP

 

Ans: b) Shreya Singhal v. Union of India

 

17. “Cyber terrorism” is covered under which section of IT Act?

 

a) Section 66F

 

b) Section 66C

 

c) Section 67

 

d) Section 70

 

Ans: a) Section 66F

 

18. Which section of IT Act deals with punishment for hacking?

 

a) Section 65

 

b) Section 66

 

c) Section 67A

 

d) Section 72

 

Ans: b) Section 66

 

19. Which of the following is NOT a cybercrime under IT Act?

 

a) Phishing

 

b) Online defamation

 

c) Theft

 

d) Identity theft

 

Ans: c) Theft

 

20. What is the punishment for cyber terrorism under IT Act?

 

a) 2 years

 

b) 5 years

 

c) 10 years

 

d) Life imprisonment

 

Ans: d) Life imprisonment

 

21. Intermediary liability was discussed in which major case?

 

a) Google v. Visaka Industries

 

b) Anwar P.V. v. P.K. Basheer

 

c) Shreya Singhal v. UOI

 

d) Avnish Bajaj v. State

 

Ans: d) Avnish Bajaj v. State

 

22. Under IT Act, who appoints the Controller of Certifying Authorities (CCA)?

 

a) Supreme Court

 

b) President of India

 

c) Central Government

 

d) Prime Minister

 

Ans: c) Central Government

 

23. Electronic signature has been legally recognized in:

 

a) Section 3A

 

b) Section 4

 

c) Section 2(x)

 

d) Section 7

 

Ans: a) Section 3A

 

24. Cyber Appellate Tribunal was merged with:

 

a) Supreme Court

 

b) Telecom Disputes Settlement and Appellate Tribunal (TDSAT)

 

c) NCLT

 

d) High Courts

 

Ans: b) TDSAT

 

25. Which section deals with pornography and sexually explicit content online?

 

a) Section 66A

 

b) Section 66E

 

c) Section 67

 

d) Section 70

 

Ans: c) Section 67

 

26. Data protection is primarily governed under which section?

 

a) Section 43A

 

b) Section 67A

 

c) Section 66D

 

d) Section 69A

 

Ans: a) Section 43A

 

27. Sending offensive messages through communication service was under:

 

a) Section 66A

 

b) Section 66F

 

c) Section 72

 

d) Section 67

 

Ans: a) Section 66A (Now struck down)

 

28. A person using someone else’s password commits offence under:

 

a) Section 65

 

b) Section 66C

 

c) Section 66D

 

d) Section 67

 

Ans: b) Section 66C

 

29. The punishment for publishing child pornography is in:

 

a) Section 67

 

b) Section 67A

 

c) Section 67B

 

d) Section 66E

 

Ans: c) Section 67B

 

30. The IT Act gives legal recognition to:

 

a) Printed signatures only

 

b) Electronic records

 

c) Oral contracts

 

d) Handwritten agreements

 

Ans: b) Electronic records

 

31. Adjudicating officer is usually a:

 

a) Magistrate

 

b) District Collector

 

c) Joint Secretary

 

d) Senior Police Officer

 

Ans: c) Joint Secretary

 

32. Section 69 of the IT Act deals with:

 

a) Data protection

 

b) Penalty for hacking

 

c) Power to intercept and monitor

 

d) Regulation of intermediaries

 

Ans: c) Power to intercept and monitor

 

33. Which section talks about the penalty for breach of confidentiality?

 

a) Section 65

 

b) Section 70

 

c) Section 72

 

d) Section 67A

 

Ans: c) Section 72

 

34. Which Indian court admitted an SMS as valid evidence for the first time?

 

a) Madras HC

 

b) Bombay HC

 

c) Delhi HC

 

d) Supreme Court

 

Ans: b) Bombay HC

 

35. A person who assists in cyber terrorism is punished under:

 

a) Section 66C

 

b) Section 66F

 

c) Section 67

 

d) Section 69A

 

Ans: b) Section 66F

 

36. In Anvar P.V. v. P.K. Basheer, the court held that electronic evidence must:

 

a) Be printed out

 

b) Be accompanied with a certificate under Section 65B

 

c) Be converted to physical form

 

d) Not be admitted

 

Ans: b) Be accompanied with a certificate under Section 65B

 

37. Which of the following is not a feature of cyber law?

 

a) Borderless jurisdiction

 

b) Time-sensitive trials

 

c) Non-repudiation

 

d) Anonymity

 

Ans: b) Time-sensitive trials

 

38. Who issues digital signature certificates in India?

 

a) Certifying Authority (CA)

 

b) Controller of CA

 

c) CBI

 

d) RBI

 

Ans: a) Certifying Authority (CA)

 

39. Which law applies in cyber defamation cases in India?

 

a) Indian Penal Code

 

b) IT Act

 

c) Civil Procedure Code

 

d) Both a and b

 

Ans: d) Both a and b

 

40. Section 79 provides:

 

a) Protection to hackers

 

b) Exemption from liability of intermediaries

 

c) Digital signature verification

 

d) Punishment for cyber extortion

 

Ans: b) Exemption from liability of intermediaries

 

41. Intermediary guidelines were amended in which year?

 

a) 2011

 

b) 2020

 

c) 2021

 

d) 2015

 

Ans: c) 2021

 

42. Online stalking is considered under which section?

 

a) Section 66E

 

b) Section 354D IPC

 

c) Section 67

 

d) Section 43A

 

Ans: b) Section 354D IPC

 

43. Which Act was amended to include digital documents as evidence?

 

a) CrPC

 

b) IPC

 

c) Indian Evidence Act

 

d) Constitution

 

Ans: c) Indian Evidence Act

 

44. Which section provides for the appointment of an adjudicating officer?

 

a) Section 46

 

b) Section 66A

 

c) Section 43

 

d) Section 72

 

Ans: a) Section 46

 

45. Who is the final appellate authority under the IT Act before 2017 reforms?

 

a) Supreme Court

 

b) Cyber Appellate Tribunal

 

c) TDSAT

 

d) High Court

 

Ans: b) Cyber Appellate Tribunal

 

46. What is the primary purpose of Section 43A of the IT Act?

 

a) Punishment for cyber terrorism

 

b) Liability for failure to protect data

 

c) Regulation of e-commerce

 

d) Digital signature penalties

 

Ans: b) Liability for failure to protect data

 

47. A person who sends a fake job email asking for money commits:

 

a) Hacking

 

b) Cyber fraud

 

c) Cyber terrorism

 

d) Cyber bullying

 

Ans: b) Cyber fraud

 

48. The term “computer network” is defined under:

 

a) Section 2(i)

 

b) Section 2(k)

 

c) Section 2(j)

 

d) Section 2(l)

 

Ans: c) Section 2(j)

 

49. Section 66D of the IT Act deals with:

 

a) Hacking

 

b) Cheating by personation using computer resources

 

c) Intermediary liability

 

d) Breach of confidentiality

 

Ans: b) Cheating by personation using computer resources

 

50. The power to block public access to any information is given under:

 

a) Section 67A

 

b) Section 70

 

c) Section 69A

 

d) Section 72

 

Ans: c) Section 69A

 

51. In which case did the Supreme Court discuss free speech on social media in the context of cyber law?

 

a) Vishaka v. State of Rajasthan

 

b) Puttaswamy v. Union of India

 

c) Shreya Singhal v. Union of India

 

d) Maneka Gandhi v. Union of India

 

Ans: c) Shreya Singhal v. Union of India

 

52. Section 66E penalises:

 

a) Electronic fraud

 

b) Cyber terrorism

 

c) Violation of privacy

 

d) Phishing

 

Ans: c) Violation of privacy

 

53. The term “critical information infrastructure” is used under:

 

a) Section 70

 

b) Section 66F

 

c) Section 69

 

d) Section 43A

 

Ans: a) Section 70

 

54. Electronic evidence under Section 65B must be:

 

a) Oral testimony

 

b) Certified with a 65B certificate

 

c) Typed copy only

 

d) Photographed

 

Ans: b) Certified with a 65B certificate

 

55. “Denial of Service” (DoS) attack affects:

 

a) Access to data

 

b) Intermediary’s liability

 

c) Criminal defamation

 

d) Data protection laws

 

Ans: a) Access to data

 

56. Jurisdiction in cybercrime cases lies where:

 

a) Offence was committed

 

b) Victim resides

 

c) Data server is located

 

d) Any of the above

 

Ans: d) Any of the above

 

57. Under IT Act, “computer source code” is protected under:

 

a) Section 65

 

b) Section 43A

 

c) Section 72

 

d) Section 66

 

Ans: a) Section 65

 

58. Who is an “intermediary” under the IT Act?

 

a) Facebook

 

b) WhatsApp

 

c) Internet Service Provider

 

d) All of the above

 

Ans: d) All of the above

 

59. Which section discusses punishment for publishing obscene material in electronic form?

 

a) Section 66C

 

b) Section 66E

 

c) Section 67

 

d) Section 70

 

Ans: c) Section 67

 

60. The objective of the IT Act includes:

 

a) Promoting software exports

 

b) Providing legal recognition to e-commerce

 

c) Establishing consumer tribunals

 

d) Protecting women online

 

Ans: b) Providing legal recognition to e-commerce

 

61. Which of the following is NOT punishable under the IT Act?

 

a) Sending spam

 

b) Cyber terrorism

 

c) Creating malware

 

d) Theft of physical hardware

 

Ans: d) Theft of physical hardware

 

62. Which international treaty influenced India’s IT Act, 2000?

 

a) Berne Convention

 

b) Budapest Convention

 

c) WTO TRIPS

 

d) UNCITRAL Model Law

 

Ans: d) UNCITRAL Model Law

 

63. What is the penalty for failure to protect sensitive personal data under Section 43A?

 

a) INR 1 lakh

 

b) INR 5 lakh

 

c) Compensation up to INR 5 crore

 

d) Unlimited compensation as decided by the adjudicating officer

 

Ans: d) Unlimited compensation as decided by the adjudicating officer

 

Check AIBE 20 Question Papers

 

Best Books for AIBE 20 Cyber Law Exam Preparation

Candidates preparing for AIBE 20 exam can refer to the books mentioned below for AIBE 20 exam.

Book Title

Author

Cyber Law: Indian and International Perspectives on Key Topics

Dr. Justice Yatindra Singh

Cyber Law & Information Technology

Talat Fatima

Information Technology Law in India

Vakul Sharma

Bare Act of Information Technology Act, 2000

-

Universal’s Guide to Cyber Law for AIBE

Lexis Nexis Editorial Board

Students learning mobile

Your opinion matters to us!

Rate your experience using this page so far.

Get Started!

What You Are Waiting For?

Discover Your Education Journey With Us

college reviewcollege review
Dell Advertisement