admissions@cyberlawacademy.com | +91-XXXXXXXXXX
Module Assessment

Cross-Examination of Specific Witnesses

Test your mastery of witness-specific cross-examination techniques with 10 scenario-based questions. Score 70% to pass.

10 Questions ~15 minutes Pass: 70%

Instructions

  • Questions cover all 5 parts: Complainants, Police Officers, Experts, Medical Witnesses, Digital Experts
  • Each question presents a realistic courtroom scenario
  • Select the best answer for each situation
  • After submission, detailed explanations will be provided
Question 0 of 10 answered
Q1 Part 1: Complainant
Scenario
The complainant in a cheating case filed the FIR 6 months after the alleged transaction. They claim they were "gathering evidence" during this delay.
What is the most effective cross-examination approach?
Explanation
The most effective approach is systematic questioning about the delay explanation. Get specifics: What evidence? From whom? When? If the explanation falls apart under scrutiny, the delay becomes significant. Direct accusations (A) are easily denied, and ignoring the delay (D) wastes a valuable attack point.
Q2 Part 2: Police/IO
Scenario
The Investigation Officer admits that 3 witnesses named by the accused were not examined because "they were not traceable."
What should you establish through cross-examination?
Explanation
Establish the investigation lacuna systematically. What specific efforts were made? How many times? When? This creates a record of inadequate investigation. Personal attacks on the IO (A, C) are easily deflected. The goal is to show the investigation was incomplete, not that the IO was personally malicious.
Q3 Part 3: Expert Witness
When cross-examining an expert witness, the FIRST area of attack should generally be:
Explanation
Under Section 45 BSA, only "persons specially skilled" can give expert opinions. If you can establish the witness lacks proper qualifications in the specific subject matter, their entire opinion becomes questionable. This is a foundational attack - if successful, all their conclusions are undermined.
Q4 Part 3: Expert Witness
Scenario
A handwriting expert has opined that a signature is forged. You have established that the expert only examined photocopies, not the original document.
How do you leverage this in cross-examination?
Explanation
Attack the data basis of the expert opinion. Photocopies lose crucial details - pen pressure variations, pen lifts, stroke hesitation, ink deposits - that are essential for forgery detection. The expert's opinion is only as good as the data examined. Get the expert to admit these limitations.
Q5 Part 4: Medical Witness
Scenario
The MLR author examined the complainant 8 hours after the alleged assault. The injuries are described as "fresh contusions."
What is the key vulnerability to exploit?
Explanation
Medical science cannot give precise injury timing. "Fresh" is a vague term that could cover a wide range. If the prosecution's timeline says 6 PM assault and 2 AM examination, establish that the injuries could equally have been caused at 10 PM, 11 PM, or even midnight - supporting an alibi or alternative narrative.
Q6 Part 4: Medical Witness
Scenario
The autopsy surgeon has opined that death was caused by "stab wound to the chest" and the weapon was "a sharp-edged weapon like a knife."
What concession should you seek through cross-examination?
Explanation
Medical witnesses can identify class characteristics (sharp-edged weapon) but cannot make individual identification (this specific knife). If the prosecution relies on a recovered knife, establish that any similar knife - or even broken glass - could have caused the same wound. This weakens the link between the accused and the weapon.
Q7 Part 5: Digital Expert
A Section 63 BSA certificate for electronic evidence must be signed by:
Explanation
Section 63(4) BSA requires the certificate from a person "occupying a responsible official position in relation to the operation of the relevant device or the management of the relevant activities." This means someone with actual control over the computer system, not just any employee or legal representative.
Q8 Part 5: Digital Expert
Scenario
The prosecution relies on WhatsApp messages from the accused's phone. The phone was seized on 1st January but sent to FSL only on 20th January.
What is the primary chain of custody concern?
Explanation
Digital devices require immediate isolation from wireless networks using Faraday bags. Without this protection, the phone can be remotely accessed - messages can be sent, deleted, or modified through WhatsApp Web or remote access tools. A 19-day gap without proper isolation compromises the integrity of all data on the device.
Q9 Part 5: Digital Expert
Hash values in digital forensics are used to:
Explanation
Hash values are digital fingerprints. If even one bit of data changes, the hash value changes completely. By comparing the hash at seizure with the hash at analysis, investigators can prove the data was not modified. If hashes do not match, the integrity of the evidence is compromised.
Q10 Part 4: Medical Witness
Scenario
You are cross-examining a medical witness in a sexual assault case. You want to challenge the prosecution's timeline.
Which approach is both legally permissible and effective?
Explanation
Options A, B, and C are legally prohibited. Section 146 BSA proviso prohibits questions about the victim's character or sexual history. The law specifically states that absence of injuries does not imply consent. The permissible approach is to focus on procedural aspects - examination delay, evidence handling, and timeline inconsistencies - without attacking the victim's character.
🏆
Your Score
0/10
0%
Loading...
Correct
0
Incorrect
0
Pass Threshold
70%