adplus-dvertising
frame-decoration

Question

Accessing computer without prior authorization is a cyber-crimes that come under _______

a.

Section 65

b.

Section 66

c.

Section 68

d.

Section 70

Answer: (b).Section 66

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Accessing computer without prior authorization is a cyber-crimes that come under _______

Similar Questions

Discover Related MCQs

Q. Cracking digital identity of any individual or doing identity theft, comes under __________ of IT Act.

Q. Accessing Wi-Fi dishonestly is a cyber-crime.

Q. Download copy, extract data from an open system done fraudulently is treated as _________

Q. Any cyber-crime that comes under section 66 of IT Act, the accused person gets fined of around Rs ________

Q. How many years of imprisonment can an accused person face, if he/she comes under any cyber-crime listed in section 66 of the Indian IT Act, 2000?

Q. Any digital content which any individual creates and is not acceptable to the society, it’s a cyber-crime that comes under _________ of IT Act.

Q. IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a legitimate amount of fine.

Q. If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of _________ years.

Q. Using spy cameras in malls and shops to capture private parts of any person comes under _______ of IT Act, 2008.

Q. Using spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with a fine of Rs. 5 Lacs.

Q. Using of spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, 2008 and is punished with imprisonment of ___________

Q. Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act.

Q. Sending offensive message to someone comes under _____________ of the Indian IT Act ______

Q. Stealing of digital files comes under __________ of the Indian IT Act.

Q. Section 79 of the Indian IT Act declares that any 3rd party information or personal data leakage in corporate firms or organizations will be a punishable offense.

Q. Which of the following attach is not used by LC4 to recover Windows password?

Q. ____________ is the world’s most popular vulnerability scanner used in companies for checking vulnerabilities in the network.

Q. _____________ is a tool which can detect registry issues in an operating system.

Q. Network Stumbler is a Windows Wi-Fi monitoring tool.

Q. ToneLoc is abbreviated as __________