Which of the following is not a type of peer-to-peer cyber crime?
A. Phishing
B. Injecting Trojans to a target victim
C. MiTM
D. Credit card details leak in deep web
Answer: Option D
Related Questions on Information Technology Act
Which chapter of Cyber Law provides the legal Recognition to Digital Signature
A. Chapter III
B. Chapter IV
C. Chapter IX
D. Chapter IX and X
A. High Court
B. Supreme Court
C. Central Administrative Tribunal
D. None of the above
. . . . . . . . is a person in whose name the Digital Signature Certificate is issued
A. Certified authority
B. Subscriber
C. Holder
D. Controller
Join The Discussion