E-Commerce MCQs and Notes

P

Praveen Singh • 36.81K Points
Coach

Q 51. A………………….provides a way to associate the message with the sender and is the equivalent of an ordinary signature.

(A) cyber signature
(B) Digital signature
(C) SSL
(D) none of these

V

Vinay • 28.75K Points
Instructor II

Q 52. ………………….is the reverse process of encryption, to make the information readable once again

(A) Spoofing
(B) Decryption
(C) Sniffing
(D) Cryptography

G

Gopal Sharma • 38.32K Points
Coach

Q 53. …………………is the process of making information unintelligible to the unauthorized user.

(A) Spoofing
(B) Snooping
(C) Sniffing
(D) Cryptography

P

Praveen Singh • 36.81K Points
Coach

Q 54. ………………attacks are difficult and are only successful if the attacker knows something about the shopper

(A) Spoofing
(B) Snooping
(C) Sniffing
(D) Guessing passwords

R

Rakesh Kumar • 28.44K Points
Instructor II

Q 55. Gain entry into the user’s system and scan your file system for personal information is known as……………….

(A) Spoofing
(B) Snooping
(C) Sniffing
(D) None of these

G

Gopal Sharma • 38.32K Points
Coach

Q 56. Creating illegitimate sites that appear to be published by established organizations by unscrupulous artists is termed as………………………….

(A) Spoofing
(B) Snooping
(C) Sniffing
(D) None of these

A

Admin • 36.93K Points
Coach

Q 57. SET means …………………………….

(A) Standard Electronic Technology
(B) Standard Electronic Transfer
(C) Secure Electronic Transaction
(D) None of these

V

Vinay • 28.75K Points
Instructor II

Q 58. …………..Prevents unauthorized communication into and out of the network, allowing the organization to enforce a security policy on traffic between its network and the internet.

(A) Network firewall
(B) Antivirus
(C) both of these
(D) none of these

A

Admin • 36.93K Points
Coach

Q 59. ……………….acts like a gate keeper that examines each users identification before allowing them to enter to the organization’s internal networks.

(A) Network firewall
(B) Antivirus
(C) both of these
(D) none of these

R

Ram Sharma • 193.86K Points
Coach

Q 60. A……………….is a person who gains unauthorized access to a computer network for profit, criminal mischief or personal pleasure.

(A) Hacker
(B) spoofer
(C) operator
(D) none of these

Download our easy to use, user friendly Android App from Play Store. And learn MCQs with one click.

Image