Mar 19, 2020

SBI SO Law Officers Old Question Papers Solved Download PDF

SBI SO Law Officers Old Question - The SBI Previous Papers will contain the Objective type questions from various disciplines. SBI Law Specialist Officers Previous Years Papers is the most important materials for exam preparation. Aspirants can refer the State Bank of India Law Specialist Officers Exam Old Papers to get an idea about the Test structure, subjects, scheme of examination. 
SBI SO Law Officers Old Question
The State Bank of India Previous Papers links are enclosed at the bottom of this page. On this page, you will also check the Syllabus & Exam Pattern of Law Specialist Officers full recruitment details such as Admit Cards release date, SBI SO Law Exam Dates, and so on. We will update more previous papers of State Bank of India Recruitment Exams soon. Until then, the candidates can use the enclosed papers as a reference for the Written Test preparation. The SBI has given the Exam Syllabus on its official site. The applied candidates can check the State Bank of India Syllabus & Exam Pattern of Jobs recruitment tests from the enclosed link. Here, we are providing a brief info on the syllabus.


1. Punishment for violation of privacy is given in:
(a) Sec. 66A of the Information Technology Act
(b) Sec. 66B of the Information Technology Act
(c) Sec. 66D of the Information Technology Act
(d) Sec. 66E of the Information Technology Act

2. Which of the following is not considered good practise for password security?
(a) Changing the password on a regular basis
(b) Using a combination of upper and lower-case characters, a number, and a special character in the password
(c) Use the same password for more than one account
(d) None of these

3. When someone forcefully takes control of a website (by cracking the password and later changing it, it is called:
(a) Web Jacking
(b) Logic bombs
(c) Cyber terrorism
(d) None of these

4. To protect e-mail, which of the following activity/activities is/are necessary?
(a) Do not open untrusted/unknown emails (spam)
(b) Do not keep your computer unattended to avoid misuse
(c) Always lock/shutdown the computer when not in use
(d) All of these

5. Spoofing means:
(a) Capable of sending data by attacker with the illusion that it is coming from a different source.
(b) Changing the password on a regular basis
(c) Using a combination of upper and lower-case characters, a number, and a special character in the password
(d) None of these

6. National Cyber Security Policy has been issued in:
(a) 2011
(b) 2012
(c) 2013
(d) 2014

7. If a person denies access to an authorised personnel to a computer resource, accesses a protected system or introduces contaminant into a system, with the intention of threatening the unity, integrity, sovereignty or security of India, then he commits cyber terrorism. For this act he can be penalised for:
(a) life imprisonment
(b) ten years imprisonment
(c) fifteen years imprisonment
(d) None of these

8. How many Schedules are there in Information Technology Act, 2000?
(a) One
(b) Two
(c) Three
(d) Four

9. Which Section of Information Technology Act, 2000, grants powers to the Central Government to issue directions for blocking of public access to any information through any computer resource?
(a) Section 69
(b) Section 69A
(c) Section 70
(d) None of these

10. Gaining of unauthorized access to data stored in a computer system is called
(a) Defacement
(b) Phising
(c) Hacking
(d) None of these

11. What is the limitation period in a suit by a landlord to recover possession from a tenant after the date the tenancy is determined?
(a) One year
(b) Two years
(c) Six years
(d) Twelve years

12. The object of the Limitation Act is to:
(a) Prevent disturbance or deprivation of what may have been acquired in equity and justice by long enjoyment
(b) Prevent disturbance of what have been lost by party’s own inaction, negligence or laches
(c) Both (a) & (b)
(d) None of these

13. In computing the period of limitation for any suit, appeal or application, the day from which such period is to be reckoned
(a) shall be excluded
(b) shall be included
(c) both (a) & (b)
(d) none of these

14. Acquisition of easement by prescription takes place:
(a) Where the access and use of light or air to and for any building have been peaceably enjoyed therewith as an easement, and as of right, without interruption, and for twenty years
(b) Where the access and use of light or air to and for any building have been peaceably enjoyed therewith as an easement, and as of right, without interruption, and for twenty five years,
(c) Where the access and use of light or air to and for any building have been peaceably enjoyed therewith as an easement, and as of right, without interruption, and for thirty years
(d) None of these

15. Limitation Act, 1983 does not apply to:
(a) Suit
(b) Appeal
(c) Certain applications including petition
(d) Writ petition

16. Provision of legal disability has been mentioned under______of the Limitation Act, 1963.
(a) Section 5
(b) Section 6
(c) Section 7
(d) Section 8

17. Limitation runs from the
(a) Date the plaint is returned
(b) Date of the order by which plaint is directed to be returned
(c) Depends
(d) None of these

18. Section 17 of the Limitation Act deals with:
(a) Fraud
(b) Mistake
(c) Concealment
(d) All of these

19. Where the writing containing the acknowledgement is undated:
(a) Oral evidence may be given of the time when it was signed
(b) Oral evidence may be given of its contents
(c) Both (a) & (b)
(d) None of these

20. The period of limitation for setting aside a sale on execution of decree is :
(a) 120 days
(b) 90 days
(c) 60 days
(d) 30 days

No comments: