Multiple Choice
Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act.
A) section 65
B) section 66
C) section 71
D) section 72
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q2: How many years of imprisonment can an
Q3: Circuit-level gateway firewalls are installed in _
Q4: Application layer firewalls are also called _<br>A)first
Q5: Download copy, extract data from an open
Q6: _ gateway firewalls are deployed in application-layer
Q7: Sending offensive message to someone comes under
Q8: Packet filtering firewalls are also called _<br>A)first
Q9: Which of these comes under the advantage
Q10: Accessing computer without prior authorization is a
Q11: Stealing of digital files comes under _