Smart card is better protected than other card using
a) Encryption
b) Firewall
c) Hub
d) All of the above

1 Answer

Answer :

a) Encryption

Related questions

Description : Smart card is better protected than other cards using a. Encryption b. Firewall c. Hub d. All the above

Last Answer : a. Encryption

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryption b. Decryption c. firewall d. all the above

Last Answer : d. all the above

Description : What are plastic cards the size of a credit card that contains an embedded chief on which digital information can be stored? a) Customer relationship management system cards b) E-government identity cards c) FEDI cards d) Smart cards

Last Answer : d) Smart cards

Description : What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? a. Customer relationship management systems cards b. E-government identity cards c. FEDI cards d. Smart cards

Last Answer : d. Smart cards

Description : What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? a. Customer relationship management systems cards b. E-government identity cards c. FEDI cards d. Smart cards

Last Answer : d. Smart cards

Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above

Last Answer : b. Cryptography

Description : Which one is a threat for E‐commerce a. Trojan horse b. firewall c. encryption d. None

Last Answer : a. Trojan horse

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. encryption b. decryption c. firewall d. all the above

Last Answer : d. all the above

Description : Does a Network Hub have a hardware firewall?

Last Answer : Some network hubs have them installed for protection

Description : A __________ is a device that forwards packets between networks by processing the routing information included in the packet. a) bridge b) firewall c) router d) hub

Last Answer : c) router

Description : A _____ is a computer, appliance, or router that sits between the trusted and untrusted systems. (1) bridge (2) switch (3) firewall (4) hub

Last Answer : firewall

Description : A USB communication device that supports data encryption for secure wireless communication for notebook users is called a a) USB wireless network adapter b) wireless switch c) wireless hub d) router e) None of these

Last Answer : a) USB wireless network adapter

Description : Who protects system from external threat? a) EDI b) ERP c) Firewall d) Script kiddies

Last Answer : c) Firewall

Description : Which will not harm computer resources? a) Virus b) Trojan horse c) Firewall d) None of the above

Last Answer : c) Firewall

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryptionb. Decryption c. firewall d. all the above

Last Answer : d. all the above

Description : A combination of software and information designed to provide security and information for payment is called - a. digital wallet b. pop up ad c shopping cart d. encryption

Last Answer : d. encryption

Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. Pop up ad c. Shopping cart d. Encryption

Last Answer : a. digital wallet

Description : Encryption can be done A. only on textual data B. only on ASCII coded data C. on any bit string D. only on mnemonic data

Last Answer : C. on any bit string

Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens

Last Answer : d)It is used to ensure data corruption does not happens

Description : Encoding or scrambling data for transmission across a network is khown as a)Protection b) Detection c) Encryption d) Decryption

Last Answer : c) Encryption

Description : When two companies are linked together by computers and they send business transactions through these computer, they are probably using- a. Digital wallets b. Electronic data interchange c. B2C d. Smart cards

Last Answer : b. Electronic data interchange

Description : Multiple calculations can be made in a single formula using...... a. Standard Formula b. Array Formula c. Complex Formulas d. Smart Formula

Last Answer : b. Array Formula

Description : Multiple calculations can be made in a single formula using…… a. Standard Formula b. Array Formula c. Complex Formulas d. Smart Formula

Last Answer : b. Array Formula

Description : What is the myth of protection? [A] It characterizes men as protective and women as protected [B] It is used to justify and shape material security policies [C] It has been challenged by changing gender role in contemporary warfare [D] All of the above

Last Answer : [D] All of the above

Description : When two companies are linked together by computers and they send business transactions through these computer, they are probably usinga. Digital wallets b. Electronic data interchange c. B2C d. Smart cards

Last Answer : b. Electronic data interchange

Description : E-marketers working in emerging economics should know and understand _____. a) How many credit cards are in circulation b) Consumer attitude towards credit card purchase c) All of the above d) None of the above

Last Answer : c) All of the above

Description : Which one is not online payment mode? a) Cash on delivery b) Debit card c) Credit card d) E-cheque

Last Answer : d) E-cheque

Description : Which one is also known as plastic money? a) Credit card b) Debit card c) Paper cash d) All of the above

Last Answer : a) Credit card

Description : Which one is not an E-payment method used in India a) Debit card b) Credit card c) E-cheque d) None of the above

Last Answer : d) None of the above

Description : What is the name of the card which can be used by the buyers during he time of purchase and in which the amount will be immediately debited from the buyers account? a. E-Distributor b. Debit Card c. Credit Card d. Power Card

Last Answer : b. Debit Card

Description : In computer terminology, OCR stands for a) Optical Character Reader b) Optical Card Reader c) Office Cash Receiver d) Online Computer Retrieva

Last Answer : a) Optical Character Reader

Description : Which device is required for the Internet Connection? a) Joystic b) Modem c) CD Drive d) NIC Card

Last Answer : b) Modem

Description : What is a better encryption?

Last Answer : The Blowfish cipher is far more secure, but it depends what you’re wanting to do with it. What are you encrypting? How secure does it need to be? Is the time taken to decrypt the data a matter of concern? Cryptography is about finding a balance between security and convenience.

Description : Could someone give me a step by step guide for using my windows firewall (or something that will do the job) to block certain programs from transferring and receiving data across the web?

Last Answer : Download and install comodo internet security After installation, open it, go to the “firewall” tab, click “define new blocked application”, select -> browse, then select the executable file you want to block, -> click “apply” -> done

Description : What is value of using access control database transaction and firewall log files?

Last Answer : Need answer

Description : What are some of the benefits of using a firewall for your LAN? 1) Increased access to Instant Messaging 2) Stricter access control to critical resources 3) Greater security to your LAN 4) Both 2 and 3

Last Answer : 4) Both 2 and 3

Description : Which of the following systems run an application layer firewall using proxy software? 1) Proxy NAT 2) Proxy client 3) Client 32 4) Proxy server

Last Answer : 4) Proxy server

Description : What are some of the benefits of using a firewall for your LAN? 1 Increased access to Instant Messaging 2 Stricter access control to critical resources 3 Greater security to your LAN 4 Both 2 and 3

Last Answer : 4 Both 2 and 3

Description : Which of the following systems run an application layer firewall using proxy software? 1 Proxy NAT 2 Proxy client 3 Client 32 4 Proxy server

Last Answer : 4 Proxy server

Description : Main function of proxy application gateway firewall is a. to allow corporate users to use efficiently all internet services b. to allow intranet users to securely use specified internet services ... to use all internet services d. to prevent corporate users from using internet services

Last Answer : b. to allow intranet users to securely use specified internet services 

Description : Encryption of data is important to ensure its privacy. It is most commonly achieved by using a ____. A. public-key encryption B. private-key encryption C. password-key encryption D. character set encryption

Last Answer : A. public-key encryption

Description : While sending a signed message, a sender a. sends message key using public key encryption using DES and hashed message using public key encryption b. sends message using public key encryption ... and hashed message using DES d. sends both message and hashed message using public key encryption

Last Answer : a. sends message key using public key encryption using DES and hashed message using public key encryption  

Description : In public key encryption system if A encrypts a message using his private key and sends it to B a. if B knows it is from A he can decrypt it using A's public key b. Even if B knows who sent the ... be decrypted at all as no one knows A's private key d. A should send his public key with the message

Last Answer : a. if B knows it is from A he can decrypt it using A’s public key 

Description : In public key encryption if A wants to send an encrypted message a. A encrypts message using his private key b. A encrypts message using B’s private key c. A encrypts message using B’s public key d. A encrypts message using his public key  

Last Answer : c. A encrypts message using B’s public key 

Description : If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be: (A) N (B) (N-1) (C) N(N-1)/2 (D) N(N+1)/2

Last Answer : (C) N(N-1)/2 

Description : Define what are the advantages of Using Git Hub For Selenium?

Last Answer : The advantages of Using Git Hub for Selenium are Multiple people when they work on the same project they can update project details and inform other team members simultaneously. Jenkins can help you ... the project from the remote repository regularly. This helps you to keep track of failed builds.

Description : Which type of products is lesser purchased using E-commerce? a) Automobile b) Books c) Software d) None of the above

Last Answer : a) Automobile

Description : The strategy of offering a different product charging a different price and using different promotion and distribution process is called a) Market segmentation b) Market Penetration c) Market Developmentd) None of these

Last Answer : a) Market segmentation

Description : How the transactions occur in e-commerce? a. Using e-medias b. Using computers only c. Using mobile phones only d. None of the above

Last Answer : a. Using e-medias

Description : Which of the following marketing techniques are most likely to pay you? a. Pay per click advertising b. Using social media marketing strategies c. posting press release d. article marketing

Last Answer : d. article marketing