Other Laws MCQ Quiz - Objective Question with Answer for Other Laws - Download Free PDF

Last updated on Jun 2, 2025

Latest Other Laws MCQ Objective Questions

Other Laws Question 1:

The punishment for Cyber Terrorism in Information Technology Act is ________. 

  1. 1 crore rupees penalty
  2. 6 year imprisonment 
  3. Life Imprisonment
  4. 10 year imprisonment
  5. None of the above

Answer (Detailed Solution Below)

Option 3 : Life Imprisonment

Other Laws Question 1 Detailed Solution

The correct answer is Life Imprisonment.

Key Points

  • In the Information Technology Act, the penalty for Cyber Terrorism is life imprisonment.
  • Anyone who commits or conspires to commit cyber terrorism will face prison time, which could last a lifetime.

Additional Information

  • Section 66 F of the Indian Information Technology Amendment Act of 2008
    • It includes a provision addressing cyber terrorism.
    • It addresses 'denial of access, unauthorized access, introduction of computer contaminant causing harm to persons, property, critical infrastructure, and supply disruption.
    • This is a non-bailable offense.
  • The term "cyber-crimes" is not defined in any statute or rulebook.
  • The word "cyber" is slang for anything relating to computers, information technology, the internet, and virtual reality.
  • Therefore, it stands to reason that "cyber-crimes" are offenses relating to computers, information technology, the internet, and virtual reality.

Other Laws Question 2:

What does "PIL" stands for in the context of judicial activism?

  1. Priority Interest Litigation
  2. Public Investigation Litigation
  3. Public Interest Litigation
  4. Personal Interest Litigation

Answer (Detailed Solution Below)

Option 3 : Public Interest Litigation

Other Laws Question 2 Detailed Solution

The correct answer is Public Interest Litigation.

Key Points

  • Public Interest Litigation (PIL) is a legal mechanism that allows individuals or groups to approach courts to seek justice for matters of public concern or social welfare.
  • The concept of PIL originated in the United States but was institutionalized in India during the 1980s by the Supreme Court.
  • PIL is primarily used to address issues like environmental protection, human rights violations, corruption, and other social injustices.
  • It is a tool to provide access to justice to marginalized and underprivileged sections of society who may otherwise lack the resources or means to approach the judiciary.
  • Indian judiciary, particularly the Supreme Court and High Courts, have actively encouraged PILs to address systemic issues and ensure accountability in governance.

Additional Information

  • Origin of PIL in India:
    • Justice P.N. Bhagwati and Justice V.R. Krishna Iyer were key figures in introducing PIL in India during the early 1980s.
    • The landmark case of Hussainara Khatoon vs. State of Bihar (1979) is considered one of the first instances of PIL in India.
  • Key Features of PIL:
    • PIL can be filed by any individual or organization, even if they are not directly affected by the issue.
    • It is aimed at addressing issues of collective societal importance rather than personal grievances.
    • The judiciary has relaxed procedural norms for filing PILs to promote accessibility and inclusivity.
  • Scope of PIL:
    • Issues related to environmental degradation, exploitation of workers, gender equality, and protection of cultural heritage can be addressed through PIL.
    • Courts have used PILs to enforce fundamental rights guaranteed under the Indian Constitution.
  • Criticism of PIL:
    • PILs are sometimes misused for publicity or as a tool for personal vendettas.
    • Courts have emphasized the need for genuine public interest in cases brought under PIL to avoid misuse.

Other Laws Question 3:

In the Indian Judicial system, PIL stands for ______.

  1. Public Interest Litigation  
  2. Periodic Individual Litigation 
  3. Private Interest License 
  4. Periodic Interest Litigation 

Answer (Detailed Solution Below)

Option 1 : Public Interest Litigation  

Other Laws Question 3 Detailed Solution

The correct answer is Public Interest Litigation.Key Points

  • PIL stands for Public Interest Litigation.
  • It is a legal action initiated in a court of law for the enforcement of public interest or general interest in which the public or a class of the community has a pecuniary interest or some interest by which their legal rights or liabilities are affected.
  • PIL is a way for the common man to approach the courts directly in cases of gross violation of fundamental rights of any person or a group of persons, especially those who are poor, ignorant or socially disadvantaged.
  • PIL is an important tool for ensuring social and economic justice, and it has been used to bring about significant social reforms in India.

Additional Information

  • The concept of PIL was introduced in India by Justice P.N. Bhagwati in 1976 in the case of Mumbai Kamgar Sabha v. Abdul Thai.
  • PIL is a very powerful tool as it allows any citizen or group of citizens to approach the court directly without the requirement of a personal interest in the case.  
  • PIL has been used to bring about significant reforms in areas such as environmental protection, consumer rights, human rights, and the rights of marginalized sections of society.

Other Laws Question 4:

The punishment for Cyber Terrorism in Information Technology Act is ________. 

  1. 1 crore rupees penalty
  2. 6 year imprisonment 
  3. Life Imprisonment
  4. 10 year imprisonment

Answer (Detailed Solution Below)

Option 3 : Life Imprisonment

Other Laws Question 4 Detailed Solution

The correct answer is Life Imprisonment.

Key Points

  • In the Information Technology Act, the penalty for Cyber Terrorism is life imprisonment.
  • Anyone who commits or conspires to commit cyber terrorism will face prison time, which could last a lifetime.

Additional Information

  • Section 66 F of the Indian Information Technology Amendment Act of 2008
    • It includes a provision addressing cyber terrorism.
    • It addresses 'denial of access, unauthorized access, introduction of computer contaminant causing harm to persons, property, critical infrastructure, and supply disruption.
    • This is a non-bailable offense.
  • The term "cyber-crimes" is not defined in any statute or rulebook.
  • The word "cyber" is slang for anything relating to computers, information technology, the internet, and virtual reality.
  • Therefore, it stands to reason that "cyber-crimes" are offenses relating to computers, information technology, the internet, and virtual reality.

Other Laws Question 5:

Which of the following have to be fulfilled to identify hacking as 'ethical hacking'?

A) Must cause damage

B) Shall not cause physical, mental or emotional damage

C) Perceived as safe by the people affected by it. 

  1. B and A
  2. C and A
  3. B and C
  4. A,B and C

Answer (Detailed Solution Below)

Option 3 : B and C

Other Laws Question 5 Detailed Solution

The correct answer is B and C.

Key Points:

  • Testing and analyzing computer systems, networks, and settings to find security flaws is known as ethical hacking.
  • The procedure includes system hacking, enumeration, scanning, and penetration testing.
  • This data is used by ethical hackers to suggest security upgrades.
  • Instead of damaging a system or stealing data as a criminal hacker would, ethical hackers examine a system, network, or application's security.
  • The same tools and methods used by malevolent hackers, such as port scanning, password cracking, and social engineering, are also employed by ethical hackers.
  • However, they do this to make vulnerabilities known so they can be repaired before malicious individuals use them to their advantage.

Additional Information:

  • The following are some of the most typical vulnerabilities that ethical hackers have found:
    • Attacks by injection.
    • Authentication problems.
    • Misconfigurations of security.
    • Use of components known to be vulnerable.
    • Exposed sensitive data.

Top Other Laws MCQ Objective Questions

In the Indian Judicial system, PIL stands for ______.

  1. Public Interest Litigation  
  2. Periodic Individual Litigation 
  3. Private Interest License 
  4. Periodic Interest Litigation 

Answer (Detailed Solution Below)

Option 1 : Public Interest Litigation  

Other Laws Question 6 Detailed Solution

Download Solution PDF

The correct answer is Public Interest Litigation.Key Points

  • PIL stands for Public Interest Litigation.
  • It is a legal action initiated in a court of law for the enforcement of public interest or general interest in which the public or a class of the community has a pecuniary interest or some interest by which their legal rights or liabilities are affected.
  • PIL is a way for the common man to approach the courts directly in cases of gross violation of fundamental rights of any person or a group of persons, especially those who are poor, ignorant or socially disadvantaged.
  • PIL is an important tool for ensuring social and economic justice, and it has been used to bring about significant social reforms in India.

Additional Information

  • The concept of PIL was introduced in India by Justice P.N. Bhagwati in 1976 in the case of Mumbai Kamgar Sabha v. Abdul Thai.
  • PIL is a very powerful tool as it allows any citizen or group of citizens to approach the court directly without the requirement of a personal interest in the case.  
  • PIL has been used to bring about significant reforms in areas such as environmental protection, consumer rights, human rights, and the rights of marginalized sections of society.

What does "PIL" stands for in the context of judicial activism?

  1. Priority Interest Litigation
  2. Public Investigation Litigation
  3. Public Interest Litigation
  4. Personal Interest Litigation

Answer (Detailed Solution Below)

Option 3 : Public Interest Litigation

Other Laws Question 7 Detailed Solution

Download Solution PDF

The correct answer is Public Interest Litigation.

Key Points

  • Public Interest Litigation (PIL) is a legal mechanism that allows individuals or groups to approach courts to seek justice for matters of public concern or social welfare.
  • The concept of PIL originated in the United States but was institutionalized in India during the 1980s by the Supreme Court.
  • PIL is primarily used to address issues like environmental protection, human rights violations, corruption, and other social injustices.
  • It is a tool to provide access to justice to marginalized and underprivileged sections of society who may otherwise lack the resources or means to approach the judiciary.
  • Indian judiciary, particularly the Supreme Court and High Courts, have actively encouraged PILs to address systemic issues and ensure accountability in governance.

Additional Information

  • Origin of PIL in India:
    • Justice P.N. Bhagwati and Justice V.R. Krishna Iyer were key figures in introducing PIL in India during the early 1980s.
    • The landmark case of Hussainara Khatoon vs. State of Bihar (1979) is considered one of the first instances of PIL in India.
  • Key Features of PIL:
    • PIL can be filed by any individual or organization, even if they are not directly affected by the issue.
    • It is aimed at addressing issues of collective societal importance rather than personal grievances.
    • The judiciary has relaxed procedural norms for filing PILs to promote accessibility and inclusivity.
  • Scope of PIL:
    • Issues related to environmental degradation, exploitation of workers, gender equality, and protection of cultural heritage can be addressed through PIL.
    • Courts have used PILs to enforce fundamental rights guaranteed under the Indian Constitution.
  • Criticism of PIL:
    • PILs are sometimes misused for publicity or as a tool for personal vendettas.
    • Courts have emphasized the need for genuine public interest in cases brought under PIL to avoid misuse.

The Supreme Court banned the sale and registration of motor vehicles conforming to the emission standard Bharat Stage-IV in the entire country from ________.

  1. 2019
  2. 2020
  3. 2021
  4. 2022
  5. 2023

Answer (Detailed Solution Below)

Option 2 : 2020

Other Laws Question 8 Detailed Solution

Download Solution PDF
  • The Supreme Court banned the sale and registration of motor vehicles conforming to the emission standard Bharat Stage-IV in the entire country from April 1, 2020.
  • Bharat stage (BS) emission norms are standards instituted by the government to regulate output of air pollutants from motor vehicles.
  • The BS IV norms have been enforced across the country since April 2017.

Other Laws Question 9:

Which of the following is correct about the "judgement"?

  1. In case of acquittal need not direct the accused to be set free
  2. It should not contain the name of the victim in case of sexual offences
  3. Includes an order of discharge
  4. Must be written in the all 22 languages.

Answer (Detailed Solution Below)

Option 2 : It should not contain the name of the victim in case of sexual offences

Other Laws Question 9 Detailed Solution

The correct answer is It should not contain the name of the victim in case of sexual offences.

  • Judgement should not contain the name of the victim in case of sexual offences.
  • A judgment is valid and of legal effect only if the court that issued it had the competence to decide the questions of law presented by the case, as well as jurisdiction over the persons or things involved.
  • No person can print or publish in print, electronic, social media, etc the name of the victim.
  • The police officials should keep all the documents in which the name of the victim is disclosed, as far as possible, in a sealed cover.

Important Points

In case of minor victims under POCSO

  • Disclosure of their identity can only be permitted by the special court if such disclosure is in the interest of the child.

Other Laws Question 10:

Which section of the Code of Criminal Procedure states that compensation payable to the victim under section 357-A will be in addition to the compensa­tion payable under section 326-A or 376-D of the IPC?

  1. Section 358
  2. Section 357-A
  3. Section 357-C
  4. Section 357-B

Answer (Detailed Solution Below)

Option 4 : Section 357-B

Other Laws Question 10 Detailed Solution

The correct answer is ​Section 357-B.

Section 357-B:

  • Section 357-B of the Code of Criminal Procedure states that compensation payable to the victim under section 357-A will be in addition to the compensa­tion payable under section 326-A or 376-D of the IPC.

Important Points

Section 357A:

  • Section 357A covers Victim compensation scheme.
  • Under Section 357A every State Government in coordination with the Central Government shall prepare a scheme for providing funds for the purpose of compensation to the victim or his dependents who have suffered loss or injury as a result of the crime and who, require rehabilitation.

Section 357C:

  • It covers Treatment of victims.
  • All hospitals, public or private, whether run by the Central Government, the State Government, local bodies or any other person, shall immediately, provide the first-aid or medical treatment, free of cost, to the victims of any offence covered under section 326A, 376, 376A, 376AB, 376B, 376C, 376D, 376DA, 376DB or section 376E of the Indian Penal Code. 

Section 358:

  • It covers compensation to persons groundlessly arrested.
  • The Magistrate may award such compensation, not exceeding Rs 1000, to be paid by the person so causing the arrest to the person so arrested, for his loss of time and expenses in the matter.

Other Laws Question 11:

For granting pardon under section 306 of the Code of Criminal Procedure, 1973-

  1. The witness must not be directly involved in the offence
  2. The offence should not be punishable with imprisonment exceeding 10 years
  3. The accused should have been given an opportunity to cross examine the person getting pardon
  4. The person getting pardon need not be in police custody

Answer (Detailed Solution Below)

Option 4 : The person getting pardon need not be in police custody

Other Laws Question 11 Detailed Solution

  • The correct answer is the person getting pardon need not be in police custody.

Section 306 of the Code of Criminal Procedure, 1973

  • It enables and in certain circumstances, imposes on the Court the duty of summoning witnesses who would not otherwise be brought before the court

Important Points 

This section applies to:

  • Any offence triable exclusively by the Court of Session or by the Court of a Special Judge appointed under the Criminal Law Amendment Act, 1952 (46 of 1952 ).
  • Any offence is punishable with imprisonment which may extend to seven years or with a more severe sentence.

Other Laws Question 12:

The punishment for Cyber Terrorism in Information Technology Act is ________. 

  1. 1 crore rupees penalty
  2. 6 year imprisonment 
  3. Life Imprisonment
  4. 10 year imprisonment

Answer (Detailed Solution Below)

Option 3 : Life Imprisonment

Other Laws Question 12 Detailed Solution

The correct answer is Life Imprisonment.

Key Points

  • In the Information Technology Act, the penalty for Cyber Terrorism is life imprisonment.
  • Anyone who commits or conspires to commit cyber terrorism will face prison time, which could last a lifetime.

Additional Information

  • Section 66 F of the Indian Information Technology Amendment Act of 2008
    • It includes a provision addressing cyber terrorism.
    • It addresses 'denial of access, unauthorized access, introduction of computer contaminant causing harm to persons, property, critical infrastructure, and supply disruption.
    • This is a non-bailable offense.
  • The term "cyber-crimes" is not defined in any statute or rulebook.
  • The word "cyber" is slang for anything relating to computers, information technology, the internet, and virtual reality.
  • Therefore, it stands to reason that "cyber-crimes" are offenses relating to computers, information technology, the internet, and virtual reality.

Other Laws Question 13:

In the Indian Judicial system, PIL stands for ______.

  1. Public Interest Litigation  
  2. Periodic Individual Litigation 
  3. Private Interest License 
  4. Periodic Interest Litigation 

Answer (Detailed Solution Below)

Option 1 : Public Interest Litigation  

Other Laws Question 13 Detailed Solution

The correct answer is Public Interest Litigation.Key Points

  • PIL stands for Public Interest Litigation.
  • It is a legal action initiated in a court of law for the enforcement of public interest or general interest in which the public or a class of the community has a pecuniary interest or some interest by which their legal rights or liabilities are affected.
  • PIL is a way for the common man to approach the courts directly in cases of gross violation of fundamental rights of any person or a group of persons, especially those who are poor, ignorant or socially disadvantaged.
  • PIL is an important tool for ensuring social and economic justice, and it has been used to bring about significant social reforms in India.

Additional Information

  • The concept of PIL was introduced in India by Justice P.N. Bhagwati in 1976 in the case of Mumbai Kamgar Sabha v. Abdul Thai.
  • PIL is a very powerful tool as it allows any citizen or group of citizens to approach the court directly without the requirement of a personal interest in the case.  
  • PIL has been used to bring about significant reforms in areas such as environmental protection, consumer rights, human rights, and the rights of marginalized sections of society.

Other Laws Question 14:

Which of the following have to be fulfilled to identify hacking as 'ethical hacking'?

A) Must cause damage

B) Shall not cause physical, mental or emotional damage

C) Perceived as safe by the people affected by it. 

  1. B and A
  2. C and A
  3. B and C
  4. A,B and C

Answer (Detailed Solution Below)

Option 3 : B and C

Other Laws Question 14 Detailed Solution

The correct answer is B and C.

Key Points:

  • Testing and analyzing computer systems, networks, and settings to find security flaws is known as ethical hacking.
  • The procedure includes system hacking, enumeration, scanning, and penetration testing.
  • This data is used by ethical hackers to suggest security upgrades.
  • Instead of damaging a system or stealing data as a criminal hacker would, ethical hackers examine a system, network, or application's security.
  • The same tools and methods used by malevolent hackers, such as port scanning, password cracking, and social engineering, are also employed by ethical hackers.
  • However, they do this to make vulnerabilities known so they can be repaired before malicious individuals use them to their advantage.

Additional Information:

  • The following are some of the most typical vulnerabilities that ethical hackers have found:
    • Attacks by injection.
    • Authentication problems.
    • Misconfigurations of security.
    • Use of components known to be vulnerable.
    • Exposed sensitive data.

Other Laws Question 15:

The punishment for Cyber Terrorism in Information Technology Act is ________. 

  1. 1 crore rupees penalty
  2. 6 year imprisonment 
  3. Life Imprisonment
  4. 10 year imprisonment
  5. None of the above

Answer (Detailed Solution Below)

Option 3 : Life Imprisonment

Other Laws Question 15 Detailed Solution

The correct answer is Life Imprisonment.

Key Points

  • In the Information Technology Act, the penalty for Cyber Terrorism is life imprisonment.
  • Anyone who commits or conspires to commit cyber terrorism will face prison time, which could last a lifetime.

Additional Information

  • Section 66 F of the Indian Information Technology Amendment Act of 2008
    • It includes a provision addressing cyber terrorism.
    • It addresses 'denial of access, unauthorized access, introduction of computer contaminant causing harm to persons, property, critical infrastructure, and supply disruption.
    • This is a non-bailable offense.
  • The term "cyber-crimes" is not defined in any statute or rulebook.
  • The word "cyber" is slang for anything relating to computers, information technology, the internet, and virtual reality.
  • Therefore, it stands to reason that "cyber-crimes" are offenses relating to computers, information technology, the internet, and virtual reality.
Get Free Access Now
Hot Links: teen patti neta teen patti wink teen patti club apk teen patti download apk