Description : Which one is a communication channel threat? a) Sniffer programs b) Cyber vandalism c) Integrity threats d) All of the above
Last Answer : d) All of the above
Description : Which one is not a server level threat? a. Malicious code b. CGI threats c. Database threats d. Buffer overflows
Last Answer : a. Malicious code
Description : Which of the following records logons and deletions? a. Key logger b. Packet sniffer c. Log analysis tools d. Screen captures
Last Answer : c. Log analysis tools
Description : Which of the following examines information passing through switches, hubs, or routers? a. Key logger b. Packet sniffer c. Log analysis tools d. Screen captures
Last Answer : b. Packet sniffer
Description : Which of the following captures screen images? a. Key logger b. Packet sniffer c. Log analysis tools d. Screen capture software
Last Answer : d. Screen capture software
Description : Which one is a communication channel security protocol? a. SSL b. S‐HTTP c. SET d. ALL OF THE ABOVE
Last Answer : d. ALL OF THE ABOVE
Description : What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets? a. Risk management b. Risk assessment c. Security d. None of the above
Last Answer : b. Risk assessment
Description : What consists of the identification of risks or threats, the implementation of security measures, and the monitoring of those measures for effectiveness? a. Risk management b. Risk assessment c. Security d. None of the above
Last Answer : a. Risk management
Description : Who protects system from external threats? a. firewall b. EDI c. ERP d. Script kiddies
Last Answer : a. firewall
Description : Cyber slacking consists of what activities? a. Visiting “inappropriate” web sites b. Visiting news sites c. Chatting online with others about non‐work topics d. All of the above
Last Answer : d. All of the above
Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above
Last Answer : d. All the above
Description : What is I stands in CIA of smart card? a. International b. Integrity c. Identity d. None of the above
Last Answer : b. Integrity
Description : Which one is not a threat for E‐commerce a. Trojan horse b. Viruses c. Worm d. None
Last Answer : d. None
Description : Which one is a threat for E‐commerce a. Trojan horse b. firewall c. encryption d. None
Last Answer : a. Trojan horse
Description : Which one is a logical threat? a. Hacking b. Storm c. Phishing d. None of the above
Last Answer : a. Hacking
Description : Which one is a physical threat? a. Phishing b. Storm c. Earthquake d. All the above
Description : Which one is not a physical threat? a. Hacking b. Storm c. Phishing d. None of the above
Description : Which one is a client level threat? a. Malicious code b. Viruses c. Active contents d. All the above
Description : ‐‐‐‐‐‐‐‐‐‐‐‐‐‐ is an act that poses danger to computer assets. a. Threat b. Danger c. Error d. None of the above
Last Answer : a. Threat
Description : Which of the following statements accurately reflect the impact of technology? a. Technology has caused buyer power to increase b. Technology has lessened the entry barriers for many industries c. Technology has increased the threat of substitute products and services d. all of the above
Last Answer : d. all of the above
Description : If it is easy for competitors to enter the market, the threat of new entrants is considered: a. High b. Low c. More d. Less
Last Answer : a. High
Description : The threat of new entrants is high when it is: a. Hard for customers to enter the market b. Hard for competitors to enter the market c. Easy for competitors to enter the market d. Easy for customers to enter the market
Last Answer : c. Easy for competitors to enter the market
Description : If the threat of substitute products or services is low it is a(n): a. Disadvantage to the supplier b. Advantage to the buyer c. Advantage to the supplier d. None of the above
Last Answer : c. Advantage to the supplier
Description : What is an arrangement made between e‐commerce sites that direct users from one site to the other? a. Spam b. Viral marketing c. Affiliate programs d. None of the above
Last Answer : c. Affiliate programs
Description : Amazon.com is well‐known for which e‐commerce marketing technique? a. Banner ads b. Pop‐up ads c. Affiliate programs d. Viral marketing
Description : A product or service that customers have come to expect from an industry, which must be offered by new entrants if they wish to compete and survive, is known as a(n)? a. Switching costs b. Loyalty programs c. Entry barriers d. Affiliate programs
Last Answer : c. Entry barriers
Description : What is the percentage of customers who visit a Web site and actually buy something called? a. Affiliate programs b. Click‐through c. Spam d. Conversion rate
Last Answer : d. Conversion rate
Description : Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser? a. Affiliate programs b. Click‐through c. Spam d. All of the above
Last Answer : b. Click‐through
Description : Secure communication means a. Protect transmission of credit card number b. Guarantee privacy of customer c. Unauthorized access of payment details d. All the above
Description : Role of security auditor is to ____________ a) secure the network b) probe for safety and security of organization’s security components and systems c) detects and prevents cyber attacks and threats to organization d) does penetration testing on different web applications
Last Answer : b) probe for safety and security of organization’s security components and systems
Description : Intimidation threat a. Is not a threat to independence. b. Occurs when a member of the assurance team may be deterred from acting objectively and exercising professional skepticism by threats, actual or ... or opinion to the point that objectivity may, or may be perceived to be, compromised.
Last Answer : Occurs when a member of the assurance team may be deterred from acting objectively and exercising professional skepticism by threats, actual or perceived, from the directors, officers or employees of an assurance client.
Description : What are the smart security solutions given by Webroot against cyber threat?
Last Answer : Oh, I think that the best smart security solution was and remains use use of decentralised apps. For example Utopia p2p. These apps being a closed web system, do not requie the use of ... . In addition, they have their own separate browser, mail and even crypto, which further enhances security
Description : What price should I charge someone to design an e-commerce website?
Last Answer : answer:Heh, If I was using Joomla I'd be charging a lot, since I don't like Joomla ;^P In seriousness, it's hard to know how much to charge. I have run into this problem ... charged is for that specific set of requirements and that any additions not covered by the requirements will cost extra.
Description : The viruses spreads through‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Mails b. Pen drives and cds c. Websites d. All the above
Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above
Last Answer : c. Script virus
Description : The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Macro b. Trojan horse c. Script virus d. None of the above
Last Answer : a. Macro
Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above
Last Answer : b. Cryptography
Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above
Description : Which one is not a layer of E‐commerce infrastructure a. Physical layer b. Product layer c. Service layer d. None
Description : Which type deals with auction? a. B2B b. B2C c. C2B d. C2C
Last Answer : d. C2C
Description : What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents? a. Ethics b. Intellectual property c. Copyright d. Fair Use Doctrine
Last Answer : c. Copyright
Description : Public key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Private key b. Symmetric c. Asymmetric d. None
Last Answer : c. Asymmetric
Description : Private Key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Public key b. Symmetric c. Asymmetric d. None
Last Answer : b. Symmetric
Description : OTP stands for a. On Time Password b. On Time processing c. One time processor d. None
Last Answer : a. On Time Password
Description : which one is not an E‐payment method used in India a. Debit card b. Credit card c. e‐cheque d. none
Last Answer : d. none
Description : Which one is an online payment mode? a. Cash on delivery b. Cash before delivery c. Demand drafts d. e‐cheque
Last Answer : d. e‐cheque
Description : Which one is not an online payment mode? a. Cash on delivery b. Debit card c. Credit card d. e‐cheque
Last Answer : a. Cash on delivery
Description : Which one is an offline payment mode? a. Cash on delivery b. Cash before delivery c. Credit card d. Both a and b
Last Answer : d. Both a and b
Description : Which one is not an offline payment mode? a. Cash on delivery b. Cash before delivery c. Demand drafts d. e‐cheque