Statements A, B and D accurately reflect the scope and evolution of cyber law under the IT Act, while C is clearly false. The Act grants legal status to e-records and digital signatures, covers several cyber offences and is periodically updated. Organisational security policies remain essential even with cyber law in place, so legal provisions do not replace internal information security practices. Thus, the correct combination consists of A, B and D only.
Option A:
Option A is incomplete because it includes only A and B and omits D. While recognition of e-records and coverage of cyber offences are true, excluding the possibility of amendments ignores the dynamic nature of cyber law. Therefore, this option fails to list all the correct statements.
Option B:
Option B is incomplete because it lists B and D only and leaves out A. Without acknowledging that the IT Act gives legal recognition to electronic records, the legal foundation of cyber law is not fully captured. Hence, this combination does not represent the complete set of true statements.
Option C:
Option C is correct because it gathers the three true statements and explicitly excludes C, which wrongly suggests that cyber law can replace organisational security measures. It presents a balanced view where law and institutional policies complement each other in managing cyber risks.
Option D:
Option D is incorrect because it assumes that all four statements are correct and thereby accepts C. Since C dismisses the continuing need for security policies, this combination conflicts with the layered approach to information security.
Comment Your Answer
Please login to comment your answer.
Sign In
Sign Up
Answers commented by others
No answers commented yet. Be the first to comment!