Computer security, cybersecurity or information technology security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide
326. |
Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act. |
A. | section 65 |
B. | section 66 |
C. | section 71 |
D. | section 72 |
Answer» D. section 72 |
327. |
Sending offensive message to someone comes under _____________ of the Indian IT Act ______ |
A. | section 66-a, 2000 |
B. | section 66-b, 2008 |
C. | section 67, 2000 |
D. | section 66-a, 2008 |
Answer» D. section 66-a, 2008 |
328. |
Stealing of digital files comes under __________ of the Indian IT Act. |
A. | section 66-a |
B. | section 66-b |
C. | section 66-c |
D. | section 66-d |
Answer» C. section 66-c |
329. |
Section 79 of the Indian IT Act declares that any 3rd party information or personal data leakage in corporate firms or organizations will be a punishable offense. |
A. | true |
B. | false |
Answer» A. true |