in Education by
Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act. (a) section 65 (b) section 66 (c) section 71 (d) section 72 This question was addressed to me in an online interview. I want to ask this question from Cyber Laws and IT laws in chapter Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
The correct option is (d) section 72 To explain I would say: Cyber-criminals and black hat hackers do one common form of cyber-crime that is a misuse of digital signatures. The law for this fraudulent act comes under section 72 of the Indian IT Act.

Related questions

0 votes
    Cracking digital identity of any individual or doing identity theft, comes under __________ of IT Act. (a) Section 65 ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Stealing of digital files comes under __________ of the Indian IT Act. (a) section 66-A (b) section 66-B (c ... Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Under which section of IT Act, stealing any digital asset or information is written a cyber-crime. (a) 65 (b) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes sexually explicit digital content ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Any cyber-crime that comes under section 66 of IT Act, the accused person gets fined of around Rs ________ (a) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
0 votes
    Using of spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Sending offensive message to someone comes under _____________ of the Indian IT Act ______ (a) section 66-A, 2000 ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following do not comes under the three pillars of digital privacy? (a) Information privacy (b ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Which of the following do not comes under security measures for cloud in firms? (a) Firewall (b) Antivirus (c) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following do not comes under hurdles of passive online attack for hackers? (a) Hard to ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
...