During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐
a. Integrity
b. Security
c. Confidentiality
d. All the above

1 Answer

Answer :

d. All the above

Related questions

Description : What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents? a. internet commerce b. e‐commerce c. transaction information transfer d. electronic data interchange

Last Answer : d. electronic data interchange

Description : What is C stands in CIA of smart card? a. confidentiality b. conference c. congress d. None of the above

Last Answer : a. confidentiality

Description : What price should I charge someone to design an e-commerce website?

Last Answer : answer:Heh, If I was using Joomla I'd be charging a lot, since I don't like Joomla ;^P In seriousness, it's hard to know how much to charge. I have run into this problem ... charged is for that specific set of requirements and that any additions not covered by the requirements will cost extra.

Description : Which one is not a layer of E‐commerce infrastructure a. Physical layer b. Product layer c. Service layer d. None

Last Answer : d. None

Description : What is an arrangement made between e‐commerce sites that direct users from one site to the other? a. Spam b. Viral marketing c. Affiliate programs d. None of the above

Last Answer : c. Affiliate programs

Description : Which one is not a threat for E‐commerce a. Trojan horse b. Viruses c. Worm d. None

Last Answer : d. None

Description : Which one is a threat for E‐commerce a. Trojan horse b. firewall c. encryption d. None

Last Answer : a. Trojan horse

Description : ‐‐‐‐‐‐‐‐‐‐‐‐‐‐ is backbone of all E‐payments in E‐commerce a. EFT b. EPS c. PayPal d. None of these

Last Answer : b. EPS

Description : Which of the following is used in B2B to pay for purchases? a. e‐commerce b. financial electronic data interchange c. electronic data exchange d. electronic checks

Last Answer : b. financial electronic data interchange

Description : What is the name given to an interactive business providing a centralized market where many buyers and suppliers can come together for e‐commerce or commerce‐related activities? a. Direct marketplace b. B2B c. B2C d. Electronic marketplace

Last Answer : d. Electronic marketplace

Description : Amazon.com is well‐known for which e‐commerce marketing technique? a. Banner ads b. Pop‐up ads c. Affiliate programs d. Viral marketing

Last Answer : c. Affiliate programs

Description : How the transactions occur in e‐commerce? a. Using e‐medias b. Using computers only c. Using mobile phones only d. None of the above

Last Answer : a. Using e‐medias

Description : Which of the following are advantages normally associated with B2B e‐commerce? a. Shorter cycle times b. Reduction in costs c. Reaches wider audiences d. all of the above

Last Answer : d. all of the above

Description : Which form of e‐commerce currently accounts for about 97% of all e‐commerce revenues? a. B2B b. B2C c. C2B d. C2C

Last Answer : a. B2B

Description : Most individuals are familiar with which form of e‐commerce? a. B2B b. B2C c. C2B d. C2C

Last Answer : b. B2C

Description : Which is not a function of E‐commerce a. marketing b. advertising c. warehousing d. none of the above

Last Answer : c. warehousing

Description : Which is a function of E‐commerce a. marketing b. advertising c. warehousing d. all of the above

Last Answer : d. all of the above

Description : All of the following are techniques B2C e‐commerce companies use to attract customers, except: a. Registering with search engines b. Viral marketing c. Online ads d. Virtual marketing

Last Answer : d. Virtual marketing

Description : Digital products are best suited for B2C e‐commerce because they: a. Are commodity like products b. Can be mass‐customized and personalized c. Can be delivered at the time of purchase d. All of the above

Last Answer : d. All of the above

Description : The best products to sell in B2C e‐commerce are: a. Small products b. Digital products c. Specialty products d. Fresh products

Last Answer : b. Digital products

Description : Which type of e‐commerce focuses on consumers dealing with each other? a. B2B b. B2C c. C2B d. C2C

Last Answer : d. C2C

Description : Which of the following is part of the four main types for e‐commerce? a. B2B b. B2C c. C2B d. All of the above

Last Answer : d. All of the above

Description : Which of the following describes e‐commerce? a. Doing business electronically b. Doing business c. Sale of goods d. All of the above

Last Answer : a. Doing business electronically

Description : Which one is a communication channel threat? a. Sniffer programs b. Cyber vandalism c. Integrity threats d. All of the above

Last Answer : d. All of the above

Description : What is I stands in CIA of smart card? a. International b. Integrity c. Identity d. None of the above

Last Answer : b. Integrity

Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity

Last Answer : a) Confidentiality

Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. a) Confidentiality b) Integrity c) Availability d) Authenticity

Last Answer : b) Integrity

Description : In computer security, __________means that computer system assets can be modified only by authorized parities. i) Confidentiality ii) Integrity iii) Availability iv) Authenticity

Last Answer : ii) Integrity

Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity

Last Answer : A) Confidentiality

Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity

Last Answer : B) Integrity

Description : When a transaction is processed online, how can the merchant verify the customer's identity? a. use secure sockets layers b. use secure electronic transactions c. use electronic data interchange d. use financial electronic data interchange

Last Answer : b. use secure electronic transactions

Description : Which of the following is not related to security mechanism a. encryption b. decryption c. e‐cash d. all the above

Last Answer : c. e‐cash

Description : DES and public key algorithm are combined (i) to speed up encrypted message transmission (ii)to ensure higher security by using different key for each transmission (iii) as a combination is always better than individual system (iv ... e-Commerce a. i and ii b. ii and iii c. iii and iv d. i and iv  

Last Answer : a. i and ii

Description : Which security provision is used to ensure data integrity and authentication? -Technology

Last Answer : A digital signature helps the user to ensure data integrity and authentication.

Description : One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid values can be assigned to each data items. This is referred to as A) Data Security B) Domain access C) Data Control

Last Answer : C) Data Control

Description : Which one is a communication channel security protocol? a. SSL b. S‐HTTP c. SET d. ALL OF THE ABOVE

Last Answer : d. ALL OF THE ABOVE

Description : Which one is not used as a security mechanism? a. Encryption b. Cryptography c. Wallets d. Digital signature

Last Answer : c. Wallets

Description : What checks out your computer or network for potential weaknesses? a. Encryption b. Public key encryption c. Security‐auditing software d. None of the above

Last Answer : c. Security‐auditing software

Description : What looks for people on the network who shouldn't be there or who are acting suspiciously? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software

Last Answer : c. Intrusion‐detection software

Description : What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software

Last Answer : b. Public key encryption

Description : What scrambles the contents of a file so you can't read it without having the right decryption key? a. Encryption b. Intrusion‐detection software c. Security‐auditing software d. All of the above

Last Answer : a. Encryption

Description : What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets? a. Risk management b. Risk assessment c. Security d. None of the above

Last Answer : b. Risk assessment

Description : What consists of the identification of risks or threats, the implementation of security measures, and the monitoring of those measures for effectiveness? a. Risk management b. Risk assessment c. Security d. None of the above

Last Answer : a. Risk management

Description : What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? a. Client/server network b. Intranet c. Extranet d. Thin client

Last Answer : b. Intranet

Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. pop up ad c. shopping cart d. encryption

Last Answer : a. digital wallet

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. encryption b. decryption c. firewall d. all the above

Last Answer : d. all the above

Description : How the medical assistant can ensure confidentiality of patient information during a visit to health care facility?

Last Answer : What is the answer ?

Description : What precautions can you take to ensure confidentiality is kept during communication?

Last Answer : Need answer

Description : If a professional accountant is billing an audit client a number of hours greater than those actually worked, which of the following fundamental principles is likely violated? a. Objectivity b. Integrity c. Professional due care d. Confidentiality

Last Answer : Integrity

Description : Which fundamental principle is seriously threatened by an engagement that is compensated based on the net proceeds on loans received by the client from a commercial bank? a. Integrity b. Objectivity c. Professional behavior d. Confidentiality

Last Answer : Objectivity