App Logo

No.1 PSC Learning App

1M+ Downloads
Any electronic signature or electronic authentication technique shall be considered reliable :

AIf the signature creation data or the authentication data are, within the context in which they are used, linked to the signatory or, as the case may be, the authenticator and of no other person

BIf the signature creation data or the authentication data were, at the time of signing, under the control of the signatory or, as the case may be, the authenticator and of no other person

CIf any alteration to the information made after its authentication by electronic signature is detectable

DAll the above

Answer:

D. All the above


Related Questions:

What is the main objective of the Crime and Criminal Tracking Network and Systems (CCTNS)?

Which of the following statements accurately describe the impact of e-governance on modern organizations?

  1. E-governance is implemented to ensure efficiency, accountability, and transparency in management.
  2. The shift in ownership structures towards public financial institutions necessitates e-governance for effective control.
  3. E-governance helps in preventing scams and corrupt practices by ensuring proper fund utilization.
  4. E-governance is not crucial for companies operating in a global market.

    Which of the following describe potential security threats to e-governance systems?

    1. Denial of Service (DoS) attacks can render e-governance services inaccessible.
    2. Spoofing allows attackers to gain unauthorized access by pretending to be someone else.
    3. Privilege escalation enables attackers to perform actions reserved for high-level users.
    4. Unauthorized Data Manipulation involves the lawful modification of confidential information.

      Which aspect of SMART Governance focuses on ethical values and anti-corruption efforts?

      1. Accountable
      2. Moral
      3. Responsive
      4. Transparent

        What is the main purpose of the Government-to-Government (G2G) model in e-governance?

        1. To facilitate secure electronic transactions between citizens and businesses.
        2. To improve communication, data usage, and information sharing within the government system.
        3. To provide e-learning opportunities for government employees.
        4. To offer digital platforms for businesses to interact with government agencies.