The authentication to be affected by the use of asymmetric crypto system and hash function is known as:
A. Public key
B. Private key
C. Digital Signature
D. Electronic Governance
Answer: Option C
Related Questions on Information Technology Act
Which chapter of Cyber Law provides the legal Recognition to Digital Signature
A. Chapter III
B. Chapter IV
C. Chapter IX
D. Chapter IX and X
A. High Court
B. Supreme Court
C. Central Administrative Tribunal
D. None of the above
. . . . . . . . is a person in whose name the Digital Signature Certificate is issued
A. Certified authority
B. Subscriber
C. Holder
D. Controller
Join The Discussion