Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryption b. Decryption c. firewall d. all the above
Last Answer : d. all the above
Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. Encryptionb. Decryption c. firewall d. all the above
Description : Which of the following is not related to security mechanism a. encryption b. decryption c. e‐cash d. all the above
Last Answer : c. e‐cash
Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above
Last Answer : b. Cryptography
Description : What scrambles the contents of a file so you can't read it without having the right decryption key? a. Encryption b. Intrusion‐detection software c. Security‐auditing software d. All of the above
Last Answer : a. Encryption
Description : Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to ... the _____ key. a. encryption, decryption b. private, public c. encryption, public d. public, private
Last Answer : d. public, private
Description : Which one is not used as a security mechanism? a. Encryption b. Cryptography c. Wallets d. Digital signature
Last Answer : c. Wallets
Description : Which one is a threat for E‐commerce a. Trojan horse b. firewall c. encryption d. None
Last Answer : a. Trojan horse
Description : Smart card is better protected than other cards using a. Encryption b. Firewall c. Hub d. All the above
Description : What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? a. Client/server network b. Intranet c. Extranet d. Thin client
Last Answer : b. Intranet
Description : What checks out your computer or network for potential weaknesses? a. Encryption b. Public key encryption c. Security‐auditing software d. None of the above
Last Answer : c. Security‐auditing software
Description : What looks for people on the network who shouldn't be there or who are acting suspiciously? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software
Last Answer : c. Intrusion‐detection software
Description : What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software
Last Answer : b. Public key encryption
Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. pop up ad c. shopping cart d. encryption
Last Answer : a. digital wallet
Description : When the information is reverted back into a useful form it is called: a) Standard encryption b) Plain text encryption c) Decryption d) None of These
Last Answer : c) Decryption
Description : When information is transformed from a useful form of understanding to an opaque form of understanding, this is called: a) Encryption b) Decryption c) Both of Above d) None of These
Last Answer : a) Encryption
Last Answer : c) Both of Above
Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.
Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.
Description : Which of the following is a characteristic of a firewall? a. Examines each message as it seeks entrance to the network b. Blocks messages without the correct markings from entering the network c. Detects computers communicating with the Internet without approval d. All of the above
Last Answer : d. All of the above
Description : What is the use of physical characteristics — such as your fingerprint, the blood vessels in the retina of your eye, the sound of your voice, or perhaps even your breath — to provide identification? a. Backup b. Anti‐virus c. Firewall d. Biometrics
Last Answer : d. Biometrics
Description : What is hardware and/or software that protects computers from intruders? a. Backup b. Anti‐virus c. Firewall d. Biometrics
Last Answer : c. Firewall
Description : What software detects and removes or quarantines computer viruses? a. Backup b. Anti‐virus c. Firewall d. Biometrics
Last Answer : b. Anti‐virus
Description : What is the process of making a copy of the information stored on a computer? a. Backup b. Anti‐virus c. Firewall d. Biometrics
Last Answer : a. Backup
Description : Who protects system from external threats? a. firewall b. EDI c. ERP d. Script kiddies
Last Answer : a. firewall
Description : Which will not harm computer resources a. firewall b. Virus c. Trojan horse d. None of the above
Description : Which one is an encryption technique? a. RSA b. DES c. AES d. All of the above
Description : Which one is not an encryption technique? a. RSA b. DES c. AES d. FTP
Last Answer : d. FTP
Description : Which one is not a encryption technique a. RSA b. DES c. AES d. NONE OF THE ABOVE
Last Answer : d. NONE OF THE ABOVE
Description : The E‐payment mechanism widely used in B2B is a. Credit card b. Debit card c. Master card d. E‐cheque
Last Answer : d. E‐cheque
Description : Explain encryption and decryption. -Technology
Last Answer : A process to convert a plain text into cipher text is called encryption. Whereas, a process to convert a cipher text into plain text is called decryption.
Description : Encoding or scrambling data for transmission across a network is khown as a)Protection b) Detection c) Encryption d) Decryption
Last Answer : c) Encryption
Description : Encryption and decryption are functions of which layer? a. transport b. session c. application d. presentation
Last Answer : d. presentation
Description : NAT limits the use of ………………….. and ……………… A. encryption, authentication. B. encryption, decryption C. encapsulation, translation D. authentication, verification
Last Answer : A. encryption, authentication.
Description : Transmission media are usually categorized as . a. Guided or Unguided b. Determinate or Indeterminate c. Fixed or Unfixed d. Encryption or Decryption
Last Answer : a. Guided or Unguided
Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These
Description : By symmetric key encryption we mean a. one private key is used for both encryption and decryption b. private and public key used are symmetric c. only public keys are used for encryption d. only symmetric key is used for encryption
Last Answer : D
Description : Encoding or scrambling data for transmission across a network is known as: (A) Decryption (B) Protection (C) Detection (D) Encryption
Last Answer : (D) Encryption
Description : Encryption and Decryption is the responsibility of ............... Layer. (A) Physical (B) Network (C) Application (D) Datalink
Last Answer : (C) Application
Description : If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be: (A) N (B) (N-1) (C) N(N-1)/2 (D) N(N+1)/2
Last Answer : (C) N(N-1)/2
Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above
Last Answer : d. All the above
Description : Which one is a communication channel security protocol? a. SSL b. S‐HTTP c. SET d. ALL OF THE ABOVE
Last Answer : d. ALL OF THE ABOVE
Description : What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets? a. Risk management b. Risk assessment c. Security d. None of the above
Last Answer : b. Risk assessment
Description : What consists of the identification of risks or threats, the implementation of security measures, and the monitoring of those measures for effectiveness? a. Risk management b. Risk assessment c. Security d. None of the above
Last Answer : a. Risk management
Description : Smart card is better protected than other card using a) Encryption b) Firewall c) Hub d) All of the above
Description : What defines all of the steps or business rules, from beginning to end, required for a process to run correctly? a. Workflow b. EIP c. Workflow system d. SLA
Last Answer : a. Workflow
Description : What automates business processes? a. Workflow b. ASP c. Workflow system d. EIP
Last Answer : c. Workflow system
Description : What is a separate and fully equipped facility where the company can move immediately after the disaster and resume business? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve
Last Answer : b. Hot site
Description : What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents? a. internet commerce b. e‐commerce c. transaction information transfer d. electronic data interchange
Last Answer : d. electronic data interchange