adplus-dvertising
frame-decoration

Question

Sending offensive message to someone comes under _____________ of the Indian IT Act ______

a.

section 66-A, 2000

b.

section 66-B, 2008

c.

section 67, 2000

d.

section 66-A, 2008

Posted under Cyber Security

Answer: (d).section 66-A, 2008

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Sending offensive message to someone comes under _____________ of the Indian IT Act ______

Similar Questions

Discover Related MCQs

Q. Stealing of digital files comes under __________ of the Indian IT Act.

Q. Section 79 of the Indian IT Act declares that any 3rd party information or personal data leakage in corporate firms or organizations will be a punishable offense.

Q. Which of the following attach is not used by LC4 to recover Windows password?

Q. ____________ is the world’s most popular vulnerability scanner used in companies for checking vulnerabilities in the network.

Q. _____________ is a tool which can detect registry issues in an operating system.

Q. Network Stumbler is a Windows Wi-Fi monitoring tool.

Q. ToneLoc is abbreviated as __________

Q. __________ is a debugger and exploration tool.

Q. __________ is a popular command-line packet analyser.

Q. ________________ is a platform that essentially keeps the log of data from networks, devices as well as applications in a single location.

Q. ______________ is competent to restore corrupted Exchange Server Database files as well as recovering unapproachable mails in mailboxes.

Q. ________________ helps in protecting businesses against data breaches that may make threats to cloud.

Q. __________ is a popular corporate security tool that is used to detect the attack on email with cloud only services.

Q. _____________ helps in protecting corporate data, communications and other assets.

Q. _________ framework made cracking of vulnerabilities easy like point and click.

Q. Nmap is abbreviated as Network Mapper.

Q. __________ is a popular tool used for discovering networks as well as in security auditing.

Q. Which of this Nmap do not check?

Q. Which of the following deals with network intrusion detection and real-time traffic analysis?

Q. Wireshark is a ____________ tool.