Secure communication means
a. Protect transmission of credit card number
b. Guarantee privacy of customer
c. Unauthorized access of payment details
d. All the above

1 Answer

Answer :

d. All the above

Related questions

Description : What is the unauthorized use, duplication, distribution or sale of copyrighted software? a. Fair Use Doctrine b. Pirated software c. Counterfeit software d. Privacy

Last Answer : b. Pirated software

Description : which one is not an E‐payment method used in India a. Debit card b. Credit card c. e‐cheque d. none

Last Answer : d. none

Description : Which one is not an online payment mode? a. Cash on delivery b. Debit card c. Credit card d. e‐cheque

Last Answer : a. Cash on delivery

Description : Which one is an offline payment mode? a. Cash on delivery b. Cash before delivery c. Credit card d. Both a and b

Last Answer : d. Both a and b

Description : The E‐payment mechanism widely used in B2B is a. Credit card b. Debit card c. Master card d. E‐cheque

Last Answer : d. E‐cheque

Description : What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? a. Customer relationship management systems cards b. E‐government identity cards c. FEDI cards d. Smart cards

Last Answer : d. Smart cards

Description : Which of the following permits the transmission of a bill, along with payment of that bill, to be conducted over the Internet? a. financial cybermediary b. electronic check c. electronic bill presentment and payment d. all of the above

Last Answer : c. electronic bill presentment and payment

Description : What is not a role of encryption? a)It is used to protect data from unauthorized access during transmission. b)It is used to ensure user authentication c)It is used to ensure data integrity d)It is used to ensure data corruption does not happens

Last Answer : d)It is used to ensure data corruption does not happens

Description : Which of the following are ways to prove access rights? a. What you know, like a password b. What you have, like an ATM card c. What you look like d. All of the above

Last Answer : d. All of the above

Description : Which of the following is not a dimension of privacy? a. Need for personal space b. Need to feel in control of our possessions c. Need to feel in control of our personal information d. All of the above are dimensions of privacy

Last Answer : d. All of the above are dimensions of privacy

Description : Unauthorized communication of information means and include:- a) To which he is not authorized to have access. b) Which he is not authorized to keep in his personal custody c) Both A & B d) None of these

Last Answer : c) Both A & B

Description : Which one is also known as plastic money? a. Credit card b. Debit card c. Paper cash d. All of the above

Last Answer : a. Credit card

Description : Which of the following is a method of transferring money from one person's account to another? a. electronic check b. credit card c. e‐transfer d. none of the above

Last Answer : a. electronic check

Description : When a transaction is processed online, how can the merchant verify the customer's identity? a. use secure sockets layers b. use secure electronic transactions c. use electronic data interchange d. use financial electronic data interchange

Last Answer : b. use secure electronic transactions

Description : Secure Sockets Layers does which of the following? a. creates a secure, private connection to a web server b. encrypts information c. sends information over the internet d. all of the above

Last Answer : d. all of the above

Description : The Secure Electronic Transaction protocol is used for a. credit card payment b. cheque payment c. electronic cash payments d. payment of small amounts for internet services 

Last Answer : a. credit card payment  

Description : Which one is an online payment mode? a. Cash on delivery b. Cash before delivery c. Demand drafts d. e‐cheque

Last Answer : d. e‐cheque

Description : Which one is not an offline payment mode? a. Cash on delivery b. Cash before delivery c. Demand drafts d. e‐cheque

Last Answer : d. e‐cheque

Description : Which one is the third party payment providers who offer digital wallets for E‐ merchants a. Oxicash b. PayMate c. PayPass d. All the above

Last Answer : d. All the above

Description : Which one is the component of cybercash payment system a. CC user software b. CC merachant software c. CC Server Software d. All of the above

Last Answer : d. All of the above

Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. pop up ad c. shopping cart d. encryption

Last Answer : a. digital wallet

Description : If you need to transfer money to another person via the internet, which of the following methods could you use? a. financial cybermediary b. electronic check c. electronic bill presentment and payment d. all of the above

Last Answer : Answer: D

Description : Which of the following is an Internet‐based company that makes it easy for one person to pay another over the Internet? a. electronic check b. electronic bill presentment and payment c. conversion rates d. financial cybermediary

Last Answer : d. financial cybermediary

Description : Which item can a password be used to protect? a. Network b. File c. Folder d. All of the above

Last Answer : d. All of the above

Description : Firewalls are used to protect a communication network system against: (A) Unauthorized attacks (B) Virus attacks (C) Data-driven attacks (D) Fire-attacks

Last Answer : Answer: A In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a ... outside network, such as the Internet, that is assumed to not be secure or trusted.

Description : A firewall is a a. wall built to prevent fires from damaging a corporate intranet b. security device deployed at the boundary of a company to prevent unauthorized physical access c. ... it from unauthorized access d. device to prevent all accesses from the internet to the corporate intranet

Last Answer : c. security device deployed at the boundary of a corporate intranet to protect it from unauthorized access

Description : Which one is a communication channel security protocol? a. SSL b. S‐HTTP c. SET d. ALL OF THE ABOVE

Last Answer : d. ALL OF THE ABOVE

Description : Which one is a communication channel threat? a. Sniffer programs b. Cyber vandalism c. Integrity threats d. All of the above

Last Answer : d. All of the above

Description : Which of the following is the primary characteristic of an intranet? a. People outside the organization can access it b. People inside the organization can't access it c. People outside the organization can't access it d. None of the above

Last Answer : c. People outside the organization can't access it

Description : Which factor determines who has the right to access different types of IT systems and information? a. Availability b. Accessibility c. Reliability d. Scalability

Last Answer : b. Accessibility

Description : Which factor determines when your IT system will be available for knowledge workers to access? a. Availability b. Accessibility c. Reliability d. None of the above

Last Answer : a. Availability

Description : What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? a. Client/server network b. Intranet c. Extranet d. Thin client

Last Answer : b. Intranet

Description : Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication: a) Protocols b) Algorithms c) Strategies d) All of the Above

Last Answer : d) All of the Above

Description : Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication: a) Protocols b) Algorithms c) Strategies d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : Companies can gather information about employees and potential employees from which of the following places? a. Job applications b. Credit reports c. Companies that track Web surfers d. All of the above

Last Answer : d. All of the above

Description : What might identity thieves do with your identity? a. Apply for and use credit cards b. Apply for a loan c. Change their identity d. All of the above

Last Answer : d. All of the above

Description : What is C stands in CIA of smart card? a. confidentiality b. conference c. congress d. None of the above

Last Answer : a. confidentiality

Description : What is A stands in CIA of smart card? a. auditing b. authenticity c. authorized d. None of the above

Last Answer : b. authenticity

Description : What is I stands in CIA of smart card? a. International b. Integrity c. Identity d. None of the above

Last Answer : b. Integrity

Description : Which of the smart card uses a sim like structure for reading and writing data a) Contact smart card b) Contactless smart card c) Proximity smart card d) Both B and C

Last Answer : a) Contact smart card

Description : ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ card is read only. a) Contact smart card b) Contactless smart card c) Proximity smart card d) Both B and C

Last Answer : c) Proximity smart card

Description : The smart card which use antenna for reading and writing data a) Contact smart card b) Contactless smart card c) Proximity smart card d) Both B and C

Last Answer : d) Both B and C

Description : The presence of ‐‐‐‐‐‐‐‐‐‐‐ make the smart card smart. a. Memory b. Microchip c. E‐cash d. None of the above

Last Answer : b. Microchip

Description : Trust card is introduced by a. BSNL and itzcash b. BSNL and oxicash c. BSNL only d. None

Last Answer : a. BSNL and itzcash

Description : Smart card is better protected than other cards using a. Encryption b. Firewall c. Hub d. All the above

Last Answer : a. Encryption

Description : In Electronic cash payment a. a debit card payment system is used b. a customer buys several electronic coins which are digitally signed by coin issuing bank c. a credit card payment system is used d. RSA cryptography is used in the transactions 

Last Answer : b. a customer buys several electronic coins which are digitally signed by coin issuing bank 

Description : In the NetBill's protocol for small payments for services available in the internet. (i) the customer is charged only when the information is delivered (ii)the vendor is guaranteed payment when information is delivered  (iii) the customer ... , ii b. i, ii, iii c. i, ii, iii, iv d. i, ii, iv 

Last Answer : d. i, ii, iv

Description : If a stranger tried to make an unauthorized purchase with my credit card number, what else should i do besides cancelling the card?

Last Answer : Here is the government’s web site about protecting yourself against identity theft.

Description : Banks issue a letter to beneficiary on behalf of its constituents like guarantee for making payment on their behalf on fulfilment of its terms and conditions. What is this arrangement known in banking context? A. Line of Credit B. Loan to Client C. Loan on Credit D. Letter of Credit

Last Answer : D. Letter of Credit Explanation: A letter issued by a bank to another bank (especially one in a different country) to serve as a guarantee for payments made to a specified person under specified conditions.

Description : Credit Card Fraud includes: a) Credit cards are illegally get and used to get movable or immovable property b) Unauthorized and illegal use of credit cards c) Both of Above d) None of These

Last Answer : c) Both of Above