E-Commerce Management

M

Mr. Dubey • 51.17K Points
Coach

Q 11. Digital signature acts as a ……………….. for e commerce

(A) risk
(B) virus
(C) security
(D) boon
WhatsApp Facebook Telegram

Share in MCQ Buddy Groups

Share

M

Mr. Dubey • 51.17K Points
Coach

Q 12. A digital signature performs a similar functions to a

(A) thump impression
(B) written signature
(C) scanning
(D) none
WhatsApp Facebook Telegram

Share in MCQ Buddy Groups

Share

M

Mr. Dubey • 51.17K Points
Coach

Q 13. …… provide security and privacy for the use of the web page content

(A) http
(B) html
(C) ftp
(D) none
WhatsApp Facebook Telegram

Share in MCQ Buddy Groups

Share

M

Mr. Dubey • 51.17K Points
Coach

Q 14. E commerce consists of commerce activities

(A) electrically
(B) technically
(C) electronically
(D) none
WhatsApp Facebook Telegram

Share in MCQ Buddy Groups

Share

M

Mr. Dubey • 51.17K Points
Coach

Q 15. UNCITRAL model law on E commerce is

(A) 1996
(B) 1994
(C) 1995
(D) 1997
WhatsApp Facebook Telegram

Share in MCQ Buddy Groups

Share

M

Mr. Dubey • 51.17K Points
Coach

Q 16. The IT act came into effect on

(A) 17 may 2000
(B) 17th december 2000
(C) 17 oct 2000
(D) 17 june 2000
WhatsApp Facebook Telegram

Share in MCQ Buddy Groups

Share

M

Mr. Dubey • 51.17K Points
Coach

Q 17. Creating illegitimate site that appear to published by established organizations are by this name

(A) spoofing
(B) snooping
(C) sniffing
(D) none
WhatsApp Facebook Telegram

Share in MCQ Buddy Groups

Share

M

Mr. Dubey • 51.17K Points
Coach

Q 18. Gain entry into the user’s system and scan your file system for personal information is known as

(A) spoofing
(B) snooping
(C) sniffing
(D) none
WhatsApp Facebook Telegram

Share in MCQ Buddy Groups

Share

M

Mr. Dubey • 51.17K Points
Coach

Q 19. The private content of transaction, if unprotected can be intercepted when it go through the route over the internet called.

(A) spoofing
(B) snooping
(C) sniffing
(D) eavesdropping
WhatsApp Facebook Telegram

Share in MCQ Buddy Groups

Share

M

Mr. Dubey • 51.17K Points
Coach

Q 20. The attacker monitors the data between the shoppers computer and the server

(A) spoofing
(B) snoofing
(C) sniffing
(D) none
WhatsApp Facebook Telegram

Share in MCQ Buddy Groups

Share