Question: Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act.

Options

A : section 65

B : section 66

C : section 71

D : section 72

Click to view Correct Answer

Previous || Next

Cyber Security Quiz more questions

The unwanted buildup of material on a surface is called?

What doesn’t constitute to the seminal plasma?

Conventional cryptography is also known as _____________ or symmetric-key encryption.

Accessing computer without prior authorization is a cyber-crimes that come....

Cracking digital identity of any individual or doing identity theft,....

Any digital content which any individual creates and is not....

Using spy cameras in malls and shops to capture private....

Stealing of digital files comes under __________ of the Indian....

Sending offensive message to someone comes under _____________ of the....

IT Act 2008 make cyber-crime details more precise where it....

Chemical Engineering Basics - Part 1 more Online Exam Quiz

Cyber Security Password Cracking Security Measures 1

Cyber Security Popular Tools Security 1

Cyber Security Ports Types 1

Cyber Security Question Papers

Cyber Security Questions Bank

Cyber Security Reverse Engineering 1

Cyber Security Scanning Phase Security 1

Cyber Security Security Protocols 1

Cyber Security Session Hijacking

Cyber Security Sniffing