Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above
Last Answer : d. All the above
Description : Which will not harm computer resources a. firewall b. Virus c. Trojan horse d. None of the above
Last Answer : a. firewall
Description : OTP stands for a. On Time Password b. On Time processing c. One time processor d. None
Last Answer : a. On Time Password
Description : The viruses spreads through‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Mails b. Pen drives and cds c. Websites d. All the above
Description : Which one is not a threat for E‐commerce a. Trojan horse b. Viruses c. Worm d. None
Last Answer : d. None
Description : Which one is a client level threat? a. Malicious code b. Viruses c. Active contents d. All the above
Description : What software detects and removes or quarantines computer viruses? a. Backup b. Anti‐virus c. Firewall d. Biometrics
Last Answer : b. Anti‐virus
Description : What are the most commonly used input devices today? a. Keyboard b. Mouse c. All of the above d. None of the above
Last Answer : c. All of the above
Description : What price should I charge someone to design an e-commerce website?
Last Answer : answer:Heh, If I was using Joomla I'd be charging a lot, since I don't like Joomla ;^P In seriousness, it's hard to know how much to charge. I have run into this problem ... charged is for that specific set of requirements and that any additions not covered by the requirements will cost extra.
Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above
Last Answer : c. Script virus
Description : The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Macro b. Trojan horse c. Script virus d. None of the above
Last Answer : a. Macro
Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above
Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above
Last Answer : b. Cryptography
Description : Which one is not a layer of E‐commerce infrastructure a. Physical layer b. Product layer c. Service layer d. None
Description : Which type deals with auction? a. B2B b. B2C c. C2B d. C2C
Last Answer : d. C2C
Description : What is an arrangement made between e‐commerce sites that direct users from one site to the other? a. Spam b. Viral marketing c. Affiliate programs d. None of the above
Last Answer : c. Affiliate programs
Description : Cyber slacking consists of what activities? a. Visiting “inappropriate” web sites b. Visiting news sites c. Chatting online with others about non‐work topics d. All of the above
Last Answer : d. All of the above
Description : What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents? a. Ethics b. Intellectual property c. Copyright d. Fair Use Doctrine
Last Answer : c. Copyright
Description : Public key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Private key b. Symmetric c. Asymmetric d. None
Last Answer : c. Asymmetric
Description : Private Key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Public key b. Symmetric c. Asymmetric d. None
Last Answer : b. Symmetric
Description : which one is not an E‐payment method used in India a. Debit card b. Credit card c. e‐cheque d. none
Last Answer : d. none
Description : Which one is an online payment mode? a. Cash on delivery b. Cash before delivery c. Demand drafts d. e‐cheque
Last Answer : d. e‐cheque
Description : Which one is not an online payment mode? a. Cash on delivery b. Debit card c. Credit card d. e‐cheque
Last Answer : a. Cash on delivery
Description : Which one is an offline payment mode? a. Cash on delivery b. Cash before delivery c. Credit card d. Both a and b
Last Answer : d. Both a and b
Description : Which one is not an offline payment mode? a. Cash on delivery b. Cash before delivery c. Demand drafts d. e‐cheque
Description : Secure communication means a. Protect transmission of credit card number b. Guarantee privacy of customer c. Unauthorized access of payment details d. All the above
Description : Which one is a threat for E‐commerce a. Trojan horse b. firewall c. encryption d. None
Last Answer : a. Trojan horse
Description : The basic elements of website is a. Home page b. Web pages c. Links and banners d. All the above
Description : Which one is a logical threat? a. Hacking b. Storm c. Phishing d. None of the above
Last Answer : a. Hacking
Description : Which one is a physical threat? a. Phishing b. Storm c. Earthquake d. All the above
Description : Which one is not a physical threat? a. Hacking b. Storm c. Phishing d. None of the above
Description : Which one is not a server level threat? a. Malicious code b. CGI threats c. Database threats d. Buffer overflows
Last Answer : a. Malicious code
Description : Which one is an encryption technique? a. RSA b. DES c. AES d. All of the above
Description : Which one is not an encryption technique? a. RSA b. DES c. AES d. FTP
Last Answer : d. FTP
Description : ‐‐‐‐‐‐‐‐‐‐‐‐‐‐ is backbone of all E‐payments in E‐commerce a. EFT b. EPS c. PayPal d. None of these
Last Answer : b. EPS
Description : E‐Banking is also known as a. ATMs b. Net banking c. Traditional banking d. None of these
Last Answer : b. Net banking
Description : The protocol which allows the file transfer between computers is a. TCP/IP b. FTP c. HTTP d. SOA
Last Answer : b. FTP
Description : Which one is a communication channel security protocol? a. SSL b. S‐HTTP c. SET d. ALL OF THE ABOVE
Last Answer : d. ALL OF THE ABOVE
Description : Which one is a communication channel threat? a. Sniffer programs b. Cyber vandalism c. Integrity threats d. All of the above
Description : Secret key is used for a. Public key cryptography b. Private key cryptography c. Asymmetric key cryptography d. None of these
Last Answer : b. Private key cryptography
Description : Which e‐government arena is being used when governmental agencies send out and accept bids for work? a) G2G b) G2B c) G2C d) G2G
Last Answer : b) G2B
Description : Which one is not used as a security mechanism? a. Encryption b. Cryptography c. Wallets d. Digital signature
Last Answer : c. Wallets
Description : Which one is not a encryption technique a. RSA b. DES c. AES d. NONE OF THE ABOVE
Last Answer : d. NONE OF THE ABOVE
Description : ‐‐‐‐‐‐‐‐‐‐‐‐‐‐ is an act that poses danger to computer assets. a. Threat b. Danger c. Error d. None of the above
Last Answer : a. Threat
Description : Which is used to identify mobile money a. MCID b. MMID c. RSID d. NONE OF THE ABOVE
Last Answer : b. MMID
Description : Which one is the third party payment providers who offer digital wallets for E‐ merchants a. Oxicash b. PayMate c. PayPass d. All the above
Description : What is C stands in CIA of smart card? a. confidentiality b. conference c. congress d. None of the above
Last Answer : a. confidentiality
Description : What is A stands in CIA of smart card? a. auditing b. authenticity c. authorized d. None of the above
Last Answer : b. authenticity
Description : What is I stands in CIA of smart card? a. International b. Integrity c. Identity d. None of the above
Last Answer : b. Integrity
Description : Which is not a feature of ecommerce a. SCM b. EDI c. WWW d. BPR
Last Answer : d. BPR