Challenger App

No.1 PSC Learning App

1M+ Downloads

What role do digital signatures play in e-governance authentication?

  1. They are the primary method for verifying a user's identity online.
  2. They require minimal infrastructure and no updates.
  3. They are a cost-effective solution for authentication.
  4. They help in providing security by confirming a user's identity.

    Aഒന്ന്

    Bഒന്നും നാലും

    Cനാല്

    Dനാല് മാത്രം

    Answer:

    B. ഒന്നും നാലും

    Read Explanation:

    Digital signatures are a cryptographic mechanism used to verify the authenticity and integrity of digital documents and communications. In e-governance, they serve as a robust tool for authentication, assuring that the user accessing a service or signing a document is indeed the legitimate owner of the associated digital key. This provides a high level of security and trust in online interactions. However, the implementation and maintenance of robust digital signature infrastructure can be expensive due to the need for constant technological advancements and security updates.

    Related Questions:

    What is the primary aim of Mission Mode Projects (MMPs)?
    In how many equal installments is the annual amount disbursed?

    Identify the incorrect statement concerning the Central MMPs.

    1. MCA21 was the first MMP launched by the Government of India to automate corporate governance.
    2. The Passport Seva project aims to reduce paperwork and expedite passport issuance.
    3. The Pension MMP focuses on simplifying the process of filing income tax returns for pensioners.
    4. IVFRT enhances border security by creating an integrated and secure immigration system.

      Which of the following describe potential security threats to e-governance systems?

      1. Denial of Service (DoS) attacks can render e-governance services inaccessible.
      2. Spoofing allows attackers to gain unauthorized access by pretending to be someone else.
      3. Privilege escalation enables attackers to perform actions reserved for high-level users.
      4. Unauthorized Data Manipulation involves the lawful modification of confidential information.
        Which of the following platforms enables citizens to directly engage with the Prime Minister of India?