Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

In an E-trade agreement, signature is based exclusively on asymmetric methods or techniques. It has been described as a special door, which can be opened

In an E-trade agreement, signature is based exclusively on asymmetric methods or techniques. It has been described as a special door, which can be opened with a four-key lock.

The two keys are on every side of the door, and each of these two keys belong to a single party. Both the parties stand respectively on each side of the door and both of them have different keys. One of them is coincidental with the key possessed by the other party, since they have agreed on the shape and notches in the key (public key). However, the other party is not, and none of the parties knows exactly, what kind of notches the other key will have.

The only thing is sure that the door can only be opened when the four keys are in it. Once both the parties have locked the keys into the door it is possible to open it and for the parties to be sure that they can negotiate through that open door safely without being afraid that an outsider might interfere in their business.

Answer the follow questions considering the above facts:

1. What is the name concept discussed above can be found in Information Technology Act, 2000?

a. Electronic Signature

b. Scanned Signature

c. Digital Signature

d. Mirrored Signature

2. Which of the following is outside the scope of IT Act, 2000?

a. Electronic gift

b. Power of attorney with digital signature

c. Electronic Message

d. Electronic Evidence

3. The authentication to be affected by the use of asymmetric crypto and hash function is known as

a. Public Key

b. Private Key

c. Digital Signature

d. E-Governance

4. Which Act in India focuses on data privacy and information technology?

a. Information Technology Act

b. Banking Regulation Act

c. Indian Penal Code

d. None

5. Which of the following is not done by the cyber criminals?

a. Unauthorised account access

b. Mass attack using trojan as botnets

c. Email Spoofing and Spamming

d. Report vulnerability in any system

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Contemporary Management

Authors: Gareth Jones, Jennifer George

9th Edition

0077718372, 978-0077718374

Students also viewed these Law questions