1. Which is used for transferring money from one bank account to another directly
without involving cash
Correct : A. eft
2. Which system provides a service that is paid for prior to usage
Correct : B. prepaid payment system
3. Which is an electronic medium for making payment
Correct : D. all of the above
4. All credit cards are
Correct : B. post paid cards
5. A popular example of E wallet is
Correct : A. micro soft wallet
6. Which are made for small payment on the web
Correct : B. micro payments
7. Which are used for signing and endorsing electronic changes
Correct : C. digital signature
8. The two types of credit cards today namely credit cards issued by credit card
companies
Correct : A. master card , visa
9. ……………………is a card with a microchip that can be used instead of cash
and coins for every thing.
Correct : C. electronic purse
10. Prepaid or real-time tokens are exchanged between
Correct : C. buyer and seller
11. …………. Is a digital analogue of various forms of payment backed by a bank
Correct : C. electronic tokens
12. There are two main concerns for using digital coins: anonymity of the
consumer and :-
Correct : D. online verification
13. SSL is the most widely deployed
Correct : A. security protocol
14. …………………. Encrypts payment card transaction data and verifies that both
parties in the transaction are genuine.
Correct : B. set
15. …………………. Is the process of coding and scrambling of messages to
prevent un authorized access to under standing of data being transmitted
Correct : B. encryption
16. ………………. Is used to keep transmissions privacy through the use of
data encryption techniques.
Correct : B. crytography
17. Which refers to the automatic identification (or) identity verification of living
persons using their enduring physical or behavioral characteristics
Correct : A. biometrics
18. ……………… involves checking to see if the signal is good quality
Correct : B. quality control
19. The process of encrypted data readable once again is called,
Correct : A. encryption
20. This the process of making information un intelligible to the unauthorized reader
Correct : A. encryption
21. The attacker monitors the data between the shoppers computer and the server
Correct : C. sniffing
22. The private content of transaction, if unprotected can be intercepted when it go
through the route over the internet called.
Correct : D. eavesdropping
23. Gain entry into the user’s system and scan your file system for personal
information is known as
Correct : A. spoofing
24. Creating illegitimate site that appear to published by established organizations
are by this name
Correct : A. spoofing
25. The IT act came into effect on
Correct : C. 17 oct 2000
26. UNCITRAL model law on E commerce is
Correct : A. 1996
27. E commerce consists of commerce activities
Correct : C. electronically
28. …… provide security and privacy for the use of the web page content
Correct : A. http
29. A digital signature performs a similar functions to a
Correct : B. written signature
30. Digital signature acts as a ……………….. for e commerce
Correct : C. security
31. Privacy laws of their host Coventry effect
Correct : B. overseas companies
32. …………………….is designed to protect a persons personal information
Correct : C. private legislation
33. There are different types of risks connected with information protection such
as disruption, disaster.
Correct : A. unauthorized access
34. ………………… are electronic files that are used to uniquely identify people
and resources over the internet
Correct : B. digital certificate
35. ……………….. techniques make use of secret codes (or) keys to encrypt
information
Correct : A. cryptography
36. The organization has to ensure that the …………… are sent to the customers
Correct : A. ordered goods
37. ………………… can catch the transmissions to obtain customers sensitive
information
Correct : C. hackers
38. SATAN is an example
Correct : C. snooping
39. Customers are concerned about
Correct : A. privacy and security of information
40. Information sent over the internet commonly uses the set of rules called