📝 Module 4 Assessment

Cyber Crime Investigation & FIR Drafting

50 Questions • 60 Minutes • 70% Passing Score

Questions
50
Time
60 min
Passing
70%
Parts
5

Part 4.1 — Police Machinery & Jurisdiction

1NCRP portal (cybercrime.gov.in) is operated by:
I4C (Indian Cyber Crime Coordination Centre) under Ministry of Home Affairs operates the NCRP portal.
21930 helpline is most critical for:
1930 helpline is critical for financial frauds — can coordinate immediate fund freeze within hours.
3Lalita Kumari v. State of U.P. mandates:
Lalita Kumari: FIR registration mandatory when information discloses cognizable offence.
4Zero FIR means:
Zero FIR: Registered at any police station regardless of jurisdiction, given "0", transferred to appropriate PS.
5CBI investigation requires:
CBI needs state government consent or High Court/Supreme Court order to investigate.
6CERT-In is the nodal agency for:
CERT-In handles cyber security incidents and mandatory breach reporting — under MeitY.
7If police refuses FIR, complainant should:
Magistrate complaint under S.200/223 BNSS can compel FIR registration.
8Cyber crime jurisdiction exists at:
Multiple jurisdictions available — strategic forum selection possible.
9Multiple FIRs on same cause of action (Arnab Goswami):
Arnab Goswami: Identical allegations — subsequent FIRs liable to be quashed.
10NCRP complaint is:
NCRP complaint is not FIR — separate FIR needed for court proceedings.

Part 4.2 — FIR & Complaint Drafting

11FIR under BNSS S.173 is for:
FIR under S.173 BNSS is for cognizable offences.
12Online defamation (BNS S.356) requires:
Defamation (S.356 BNS) is non-cognizable — private complaint required.
13Phishing attack FIR should include:
Phishing: IT Act + BNS combination required.
14Most critical detail for financial fraud FIR:
Phone numbers, UPI IDs, transaction IDs are investigation starting points.
15Section 66C IT Act covers:
S.66C: Fraudulent use of electronic signature, password, or identification.
167 essential FIR elements are:
7 elements: Complainant, accused, incident, loss, sections, evidence, prayer.
17Common FIR drafting mistake:
Vague FIRs without specific details leave no investigation starting point.
18Ransomware on critical infrastructure attracts:
Critical infrastructure ransomware: S.66F (cyber terrorism), S.66, BNS S.308 (extortion).
19Before filing FIR for financial fraud:
Call 1930 first for immediate fund freeze.
20S.66D IT Act covers:
S.66D: Cheating by personation using computer resource.

Part 4.3 — Evidence Preservation

21Telecom CDR retention period:
TRAI mandates telecom companies retain CDR for approximately 2 years.
22S.91 BNSS notice can be issued by:
S.91 BNSS: Courts or police officers can summon documents.
23Golden hour for financial fraud:
First 24-48 hours critical for fund freeze.
24Social media IP logs typically retained:
Most platforms retain IP logs for approximately 90 days.
25Self-captured screenshot requires:
Self-captured evidence requires S.63 certificate.
26CCTV footage auto-overwrites within:
Most CCTV systems auto-overwrite every 30-60 days.
27Best self-preservation practice:
Full screenshots with URL, timestamp, and hash preserve authenticity.
28Bank records retention (RBI):
RBI mandates banks retain records for 10 years.
29Failure to preserve evidence after notice:
Intentionally destroying evidence after notice attracts S.201 BNS.
30Independent evidence preservation uses:
Wayback Machine provides independent third-party preservation.

Part 4.4 — Interim Reliefs

31Fastest route for account freezing:
1930 helpline triggers immediate inter-bank coordination.
32S.79 IT Act safe harbor lost when:
Safe harbor conditional on expeditious removal after actual knowledge.
33S.69A website blocking by:
S.69A: Only Central Government can direct blocking.
34Three-fold injunction test:
Courts apply: prima facie case, balance of convenience, irreparable injury.
35John Doe orders are for:
John Doe: Ex-parte blocking orders against unknown operators.
36IT Rules grievance acknowledgment:
Platforms must acknowledge within 24 hours, resolve within 15 days.
37Shreya Singhal on S.69A:
Shreya Singhal: S.69A valid with procedural safeguards.
38Ex-parte injunctions granted:
Ex-parte: Without hearing other side for extreme urgency.
39Suppression in ex-parte application:
Courts vacate ex-parte orders obtained by suppression.
40Best route for defamation takedown:
Court injunction combined with platform grievance is most effective.

Part 4.5 — Defence & Corporate Response

41Sushila Aggarwal on anticipatory bail:
Sushila Aggarwal: No time limit — continues even after charge sheet.
42Bhajan Lal provides grounds for:
Bhajan Lal: 7 categories for FIR quashing under inherent powers.
43CERT-In reporting timeline:
CERT-In Directions (2022): 6 hours for prescribed incidents.
44NOT a ground for anticipatory bail:
If bailable, anticipatory bail not needed.
45To maintain privilege over investigation:
Investigation under external counsel maintains privilege.
46Upjohn warnings given to:
Upjohn: Inform employees lawyer represents company, not them.
47Common incident response mistake:
Wiping before forensic imaging loses evidence.
48Quashing typically avoided in:
Courts hesitant to quash serious offences like S.66F and POCSO.
49RBI cyber incident reporting for banks:
RBI: Banks report within 2-6 hours.
50First step in corporate incident response:
First contain breach and preserve evidence.
0%
Calculating...
Part 4.1
0/10
Part 4.2
0/10
Part 4.3
0/10
Part 4.4
0/10
Part 4.5
0/10