S
Q. Cracking digital identity of any individual or doing identity theft, comes under __________ of IT Act.
- Correct Answer - Option(B)
- Views: 1002
- Filed under category Information Cyber Security
No solution found for this question.
Add Solution and get +2 points.
You must be Logged in to update hint/solution
Be the first to start discuss.
Related Posts
Q. Which of the following are not security policies?
Q. Which one of the following algorithm is not used in asymmetric-key cryptography?
Q. In asymmetric key cryptography, the two keys e and d, have special relationship to
Q. What protocol is NOT used in the operation of a VPN?
Q. Accessing Wi-Fi dishonestly is a cyber-crime.
Q. A firewall protects which of the following attacks?
Q. _________ type of VPNs are used for home private and secure connectivity.
View All Posts
Question analytics

Discusssion
Login to discuss.