111. What is the proposed punishment for Cyber Terrorism in Information Technology Act?
112. The police suspects Rana of aiding terrorists by arranging safe house and finance. The Police has realized that Rana has several e-mail accounts and operates those e-mail accounts using aliases. The police wants to access the e-mail messages being sent and received by Rana to confirm its suspicion. Select the most appropriate method which may be used by the police to access Rana's e-mail account:-
113. What are statutes to combat cyber crime?
114. Under which section of Information Technology Act, stealing any digital asset or information is written a cyber-crime.
115. Section 1(2) of the Information Technology Act, 2000 states that
116. What is meaning of "Cyber Security"?
117. As per Information Technology Act 2000, Those who Fail to furnish documents will be penalized upto
118. Which one of the following offences is considered as cognizable under the provisions of the Information Technology Act, 2000?
119. Sunil is suspected of publishing false digital signature certificates. Sunil is very clever. He creates the false digital signatures certificate using his home computer but sends the certificate using a public computer from a cyber cafe. Suggest the most appropriate method which the law enforcement officials may adopt to arrest Sunil:-
120. 'Subscriber', according to Section 2(ZG) of the Information Technology Act, 2000, means a person:
Read More Section(Information Technology Act)
Each Section contains maximum 100 MCQs question on Information Technology Act. To get more questions visit other sections.