112.
The police suspects Rana of aiding terrorists by arranging safe house and finance. The Police has realized that Rana has several e-mail accounts and operates those e-mail accounts using aliases. The police wants to access the e-mail messages being sent and received by Rana to confirm its suspicion. Select the most appropriate method which may be used by the police to access Rana's e-mail account:-

115.
Section 1(2) of the Information Technology Act, 2000 states that

116.
What is meaning of "Cyber Security"?

118.
Which one of the following offences is considered as cognizable under the provisions of the Information Technology Act, 2000?

119.
Sunil is suspected of publishing false digital signature certificates. Sunil is very clever. He creates the false digital signatures certificate using his home computer but sends the certificate using a public computer from a cyber cafe. Suggest the most appropriate method which the law enforcement officials may adopt to arrest Sunil:-

120.
'Subscriber', according to Section 2(ZG) of the Information Technology Act, 2000, means a person:

Read More Section(Information Technology Act)

Each Section contains maximum 100 MCQs question on Information Technology Act. To get more questions visit other sections.