Challenger App

No.1 PSC Learning App

1M+ Downloads
The cyber terrorism comes under:

ASection 67 B

BSection 66 F

CSection 67 A

DSection 72 F

Answer:

B. Section 66 F


Related Questions:

What protocol is used between e-mail servers?
IP stand for
What is meant by the concept of WYSIWYG in MS Word ?
ബ്ലോഗ് എന്ന പദം ആദ്യമായി ഉപയോഗിച്ചത് ആരാണ് ?
Which email security measure involves encrypting outgoing messages to protect sensitive information ?