Cyber Laws Questions
Q. A challenge relating to Cyber-crimes is the collection of?
View SolutionQ. Which Layer 4 protocol is used for a Telnet connection between two routers?
View SolutionQ. “Data Protection Act”, the world’s first computer specific law was enacted in which year?
View SolutionQ. Which of the following is classified as cyber crime against persons?
View SolutionQ. Which is the first country in the world where Network neutrality is enforced by law in 2010?
View SolutionQ. Cyber defamation is also known as __.
View SolutionQ. Hackers are getting a hold of patient’s health information which contains sensitive information like patient’s address, credit card information through _.
View SolutionQ. The phrase __ describes viruses , worms, Trojen horse and attack scripts.
View SolutionQ. A hacker contacts through email and attempts to acquire valuable personal information is called __.
View SolutionQ. Which Section of the IT Act deals with data privacy?
View SolutionGet Question Bank
Strengthen Your Practice with our comprehensive question bank.