E‐Commerce MCQ:- Part Six

  1. The presence of ‐‐‐‐‐‐‐‐‐‐‐ make the smart card smart.

a. Memory
b. Microchip
c. E‐cash
d. None of the above

Answer: (b) Microchip

2. The smart card which use antenna for reading and writing data

a. Contact smart card
b. Contactless smart card
c. Proximity smart card
d. Both B and C

Answer: (d) Both B and C

3. ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ card is read only.

a. Contact smart card
b. Contactless smart card
c. Proximity smart card
d. Both B and C

Answer: (c) Proximity smart card

4. Which of the smart card uses a sim like structure for reading and writing data

a. Contact smart card
b. Contactless smart card
c. Proximity smart card
d. Both B and C

Answer: (a) Contact smart card

5. Which is not a feature of ecommerce

a. SCM
b. EDI
c. WWW
d. BPR

Answer: (d) BPR

6. What is I stands in CIA of smart card?

a. International
b. Integrity
c. Identity
d. None of the above

Answer: (b) Integrity

7. What is A stands in CIA of smart card?

a. auditing
b. authenticity
c. authorized
d. None of the above

Answer: (b) authenticity

8. What is C stands in CIA of smart card?

a. confidentiality
b. conference
c. congress
d. None of the above

Answer: (a) confidentiality

9. Which one is the third party payment providers who offer digital wallets for E‐merchants

a. Oxicash
b. PayMate
c. PayPass
d. All the above

Answer: (d) All the above

10. Which is used to identify mobile money

a. MCID
b. MMID
c. RSID
d. NONE OF THE ABOVE

Answer: (b) MMID

11. ‐‐‐‐‐‐‐‐‐‐‐‐‐ is an act that poses danger to computer assets.

a. Threat
b. Danger
c. Error
d. None of the above

Answer: (a) Threat

12. Which one is not a encryption technique

a. RSA
b. DES
c. AES
d. NONE OF THE ABOVE

Answer: (d) NONE OF THE ABOVE

13. Which one is not used as a security mechanism?

a. Encryption
b. Cryptography
c. Wallets
d. Digital signature

Answer : (c) Wallets

14. Which e‐government arena is being used when governmental agencies send out and accept bids for work?

a. G2G
b. G2B
c. G2C
d. G2G

Answer: (b) G2B

15. Secret key is used for

a. Public key cryptography
b. Private key cryptography
c. Asymmetric key cryptography
d. None of these

Answer: (b) Private key cryptography

16. Which one is a communication channel threat?

a. Sniffer programs
b. Cyber vandalism
c. Integrity threats
d. All of the above

Answer: (d) All of the above

17. Which one is a communication channel security protocol?

a. SSL
b. S‐HTTP
c. SET
d. ALL OF THE ABOVE

Answer: (d) ALL OF THE ABOVE

18. The protocol which allows the file transfer between computers is

a. TCP/IP
b. FTP
c. HTTP
d. SOA

Answer: (b) FTP

19. E‐Banking is also known as

a. ATMs
b. Net banking
c. Traditional banking
d. None of these

Answer: (b) Net banking

20. ‐‐‐‐‐‐‐‐‐‐‐‐‐‐ is backbone of all E‐payments in E‐commerce

a. EFT
b. EPS
c. PayPal
d. None of these

Answer: (b) EPS

21. Which one is a client level threat?

a. Malicious code
b. Viruses
c. Active contents
d. All the above

Answer: (d) All the above

22. Which one is not an encryption technique?

a. RSA
b. DES
c. AES
d. FTP

Answer: (d) FTP

23. Which one is an encryption technique?

a. RSA
b. DES
c. AES
d. All of the above

Answer: (d) All of the above

24. Which one is not a server level threat?

a. Malicious code
b. CGI threats
c. Database threats
d. Buffer overflows

Answer: (a) Malicious code

25. Which one is not a physical threat?

a. Hacking
b. Storm
c. Phishing
d. None of the above

Answer: (a) Hacking

26. Which one is a physical threat?

a. Phishing
b. Storm
c. Earthquake
d. All the above

Answer: (d) All the above

27. Which one is a logical threat?

a. Hacking
b. Storm
c. Phishing
d. None of the above

Answer: (a)Hacking

28. The basic elements of website is

a. Home page
b. Web pages
c. Links and banners
d. All the above

Answer: (d) All the above

29. Which one is a threat for E‐commerce

a. Trojan horse
b. firewall
c. encryption
d. None

Answer: (a) Trojan horse

30. Secure communication means

a. Protect transmission of credit card number
b. Guarantee privacy of customer
c. Unauthorized access of payment details
d. All the above

Answer: (d) All the above

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *