Cyber Law - Rashmi Suspects Rakesh of Creating and Publishing Digital Signature Certificates for Fraudulent Purpose, but She Is Confused About Whom to Approach for Investigating the Suspected Crime

Submitted by: Submitted by

Views: 10

Words: 1188

Pages: 5

Category: Other Topics

Date Submitted: 10/05/2016 03:28 AM

Report This Essay

Need Answer Sheet of this Question paper

Contact us at

answersheethelp@gmail.com

M: 7019944355

CYBER LAW

1. Neha, a desktop publishing professional has made several authentic looking certificates

Of major indian and foreign universities and has sold these counterfeit for large sums of money to at least 3 people in india. Neha had sent these certificates as email attachments to prospective customers. Select the most appropriate answer keeping the said facts in mind:

a. neha would be punished for forgery for forging a document under the information technology act,2000

b. neha would be punished for forgery for forging a document under the indian the penal code,1860

c. neha would be punished for forgery for forging an electronic record under the indian penal code,1860

d. neha would be punished for forgery for forging an electronic record under the information Act,2000

2.With regard to jurisprudence relating to pornography, tick the most appropriate answer:

a. most jurisdictions punish dissemination of pornography, in some manner

b. all jurisdictions punish dissemination of Publishing of child pornography,

c. in some jurisdictions dissemination and possession of actual child pornography as well as dissemination of simulated computer animated images depicting child pornography is penalized.

d. some jurisdictions punish dissemination as well as possession of child pornography

3. Rita is not sure how exactly a digital signature system works. Help her to understand the process by chossing the most appropriate statement.

a. A digital signature is formed subsequent to a message digest.

b. A digital signature is formed by signing a message digest with a private key

c. A digital signature is formed by making a message interact with a one way hash been certified by a certifying authority.

d. A digital signature is verified by ausing hash function and public key

4.Select the most appropriate statement about...