Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. encryption b. decryption c. firewall d. all the above
Last Answer : d. all the above
Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryptionb. Decryption c. firewall d. all the above
Description : Which of the following is not related to security mechanism a. encryption b. decryption c. e‐cash d. all the above
Last Answer : c. e‐cash
Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above
Last Answer : b. Cryptography
Description : Encoding or scrambling data for transmission across a network is khown as a)Protection b) Detection c) Encryption d) Decryption
Last Answer : c) Encryption
Description : Smart card is better protected than other card using a) Encryption b) Firewall c) Hub d) All of the above
Last Answer : a) Encryption
Description : When the information is reverted back into a useful form it is called: a) Standard encryption b) Plain text encryption c) Decryption d) None of These
Last Answer : c) Decryption
Description : When information is transformed from a useful form of understanding to an opaque form of understanding, this is called: a) Encryption b) Decryption c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : What scrambles the contents of a file so you can't read it without having the right decryption key? a. Encryption b. Intrusion‐detection software c. Security‐auditing software d. All of the above
Last Answer : a. Encryption
Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.
Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.
Description : A combination of software and information designed to provide security and information for payment is called - a. digital wallet b. pop up ad c shopping cart d. encryption
Last Answer : d. encryption
Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. Pop up ad c. Shopping cart d. Encryption
Last Answer : a. digital wallet
Description : Explain encryption and decryption. -Technology
Last Answer : A process to convert a plain text into cipher text is called encryption. Whereas, a process to convert a cipher text into plain text is called decryption.
Description : Encryption and decryption are functions of which layer? a. transport b. session c. application d. presentation
Last Answer : d. presentation
Description : NAT limits the use of ………………….. and ……………… A. encryption, authentication. B. encryption, decryption C. encapsulation, translation D. authentication, verification
Last Answer : A. encryption, authentication.
Description : Transmission media are usually categorized as . a. Guided or Unguided b. Determinate or Indeterminate c. Fixed or Unfixed d. Encryption or Decryption
Last Answer : a. Guided or Unguided
Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These
Description : Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to ... the _____ key. a. encryption, decryption b. private, public c. encryption, public d. public, private
Last Answer : d. public, private
Description : By symmetric key encryption we mean a. one private key is used for both encryption and decryption b. private and public key used are symmetric c. only public keys are used for encryption d. only symmetric key is used for encryption
Last Answer : D
Description : Encoding or scrambling data for transmission across a network is known as: (A) Decryption (B) Protection (C) Detection (D) Encryption
Last Answer : (D) Encryption
Description : Encryption and Decryption is the responsibility of ............... Layer. (A) Physical (B) Network (C) Application (D) Datalink
Last Answer : (C) Application
Description : If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be: (A) N (B) (N-1) (C) N(N-1)/2 (D) N(N+1)/2
Last Answer : (C) N(N-1)/2
Description : Which one is not used as a security mechanism? a. Encryption b. Cryptography c. Wallets d. Digital signature
Last Answer : c. Wallets
Description : Which one is a threat for E‐commerce a. Trojan horse b. firewall c. encryption d. None
Last Answer : a. Trojan horse
Description : Smart card is better protected than other cards using a. Encryption b. Firewall c. Hub d. All the above
Description : Who protects system from external threat? a) EDI b) ERP c) Firewall d) Script kiddies
Last Answer : c) Firewall
Description : Which will not harm computer resources? a) Virus b) Trojan horse c) Firewall d) None of the above
Description : Encryption can be done A. only on textual data B. only on ASCII coded data C. on any bit string D. only on mnemonic data
Last Answer : C. on any bit string
Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens
Last Answer : d)It is used to ensure data corruption does not happens
Description : The strategy of applying different price vleves for different customers or situation is known as ______. a) Dynamic pricing b) Online bidding c) Direct marketing d) Agent e-business model
Last Answer : a) Dynamic pricing
Description : The________is a blueprint that links the firms e- business strategy with technologty driven marketing strategies. a) E-marketing plan b) Business model c) Situation analysis d) Strategic plan
Last Answer : a) E-marketing plan
Description : ________is the subset of e-commerce focused on transaction. a) E-business b) E-marketing c) Digital technology d) Environment, strategy, performance(ESP)
Last Answer : d) Environment, strategy, performance(ESP)
Description : Considering non personal communication channels, social networking sites, email and company websites are considered as a) Broadcast media b) Display media c) Online media d) Print media
Last Answer : c) Online media
Description : Which is the best encryption mechanism?
Last Answer : Tripple DES is a bit outdated. (DES itself has been around since the sixties). A modern laptop probably has the computational power to break it. A better choice would be AES but I tend to use twofish because I like the name. Don’t know enough about the other to make a recomendation. Sorry.
Description : When a company strives to appeal to multiple well defined market segments with a strategy tailored to each segment, it is applying a. undifferentiated marketing b. differentiated marketing c. concentrated marketing d. the majority fallacy
Last Answer : b. differentiated marketing
Description : The strategy of offering a different product charging a different price and using different promotion and distribution process is called a) Market segmentation b) Market Penetration c) Market Developmentd) None of these
Last Answer : a) Market segmentation
Description : World Bank launched ‘Gender mainstreaming strategy’ in [A] 2000 [B] 2010 [C] 2001 [D] 2002
Last Answer : [C] 2001
Description : Communication is a: A. Strategy B. Theory C. Process D. None of these
Last Answer : C. Process
Description : Data encryption techniquesare particularly useful for A. reducingstorage space requirements B. improving data integrity C. protecting data indata communication systems D. All of theabove E. None of the above
Last Answer : protecting data indata communication systems
Description : The establishment of the overall audit strategy involves a. Determining the characteristics of the engagement that defines its scope. b. Ascertaining the reporting objectives of the engagement to plan the timing ... will determine the focus of the engagement team's efforts. d. All of the answers
Last Answer : All of the answers
Description : The establishment of an overall audit strategy involves I. Determining the characteristics of the engagement that define its scope. II. Ascertaining the reporting objectives of the engagement to plan the timing of the audit and the ... II only b. I and III only c. II and III only d. I, II, and III
Last Answer : I, II, and III
Description : Mr. Singh has decided to expand his store hours and offer discounted pricing on his existing line of pet supplies. Which strategy is he considering? A. Market penetration B. Diversification C. Product development D. Promotions
Last Answer : Market penetration
Description : Jenkins is a small retail chain in South Wales. When considering changes in its marketing strategy, the firm's management looks only at changes in shopper attitudes and spending patterns. With ... )passive and proactive B)aggressive and proactive C)dominant and proactive D)passive and reactive
Last Answer : D)passive and reactive
Description : Experienced PC security enthusiasts: What AV/Firewall/Spyware combo have you found to offer the best protection?
Last Answer : I use PCTools Firewall and AntiVirus, as well as ThreatFire and Ad-Aware. So far so good. I’ve been through dozens of FW and AV programs, and I could easily tell you which ones DON’T work. Anything made/sold/offered by Symantec
Description : I found this in the Package Rules menu:
Last Answer : answer:
Description : A firewall is a network security system ______based that controls incoming and outgoing network traffic based on a set of rules: a) Hardware b) Software c) Both hardware or software d) None of These
Last Answer : c) Both hardware or software