E-Commerce MCQs and Notes
P
Q 51. A………………….provides a way to associate the message with the sender and is the equivalent of an ordinary signature.
V
Q 52. ………………….is the reverse process of encryption, to make the information readable once again
G
Q 53. …………………is the process of making information unintelligible to the unauthorized user.
P
Q 54. ………………attacks are difficult and are only successful if the attacker knows something about the shopper
R
Q 55. Gain entry into the user’s system and scan your file system for personal information is known as……………….
G
Q 56. Creating illegitimate sites that appear to be published by established organizations by unscrupulous artists is termed as………………………….
A
Q 57. SET means …………………………….
V
Q 58. …………..Prevents unauthorized communication into and out of the network, allowing the organization to enforce a security policy on traffic between its network and the internet.
A
Q 59. ……………….acts like a gate keeper that examines each users identification before allowing them to enter to the organization’s internal networks.
R