Cracking digital identity of any individual or doing identity theft, comes under __________ of IT Act.
A) section 65
B) section 66
C) section 68
D) section 70
Correct Answer:
Verified
Q10: Application level gateway firewalls are also used
Q11: Packet filtering firewalls are also called _
A)first
Q12: Application layer firewalls are also called _
A)first
Q13: Cyber-crime can be categorized into _ types.
A)4
B)3
C)2
D)6
Q14: Accessing computer without prior authorization is a
Q16: Accessing Wi-Fi dishonestly is a cyber-crime.
Q17: Download copy, extract data from an open
Q18: Any cyber-crime that comes under section 66
Q19: How many years of imprisonment can an
Q20: Any digital content which any individual creates
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents