Quiznetik

E-Commerce Management | Set 2

1. Which is used for transferring money from one bank account to another directly without involving cash

Correct : A. eft

2. Which system provides a service that is paid for prior to usage

Correct : B. prepaid payment system

3. Which is an electronic medium for making payment

Correct : D. all of the above

4. All credit cards are

Correct : B. post paid cards

5. A popular example of E wallet is

Correct : A. micro soft wallet

6. Which are made for small payment on the web

Correct : B. micro payments

7. Which are used for signing and endorsing electronic changes

Correct : C. digital signature

8. The two types of credit cards today namely credit cards issued by credit card companies

Correct : A. master card , visa

9. ……………………is a card with a microchip that can be used instead of cash and coins for every thing.

Correct : C. electronic purse

10. Prepaid or real-time tokens are exchanged between

Correct : C. buyer and seller

11. …………. Is a digital analogue of various forms of payment backed by a bank

Correct : C. electronic tokens

12. There are two main concerns for using digital coins: anonymity of the consumer and :-

Correct : D. online verification

13. SSL is the most widely deployed

Correct : A. security protocol

14. …………………. Encrypts payment card transaction data and verifies that both parties in the transaction are genuine.

Correct : B. set

15. …………………. Is the process of coding and scrambling of messages to prevent un authorized access to under standing of data being transmitted

Correct : B. encryption

16. ………………. Is used to keep transmissions privacy through the use of data encryption techniques.

Correct : B. crytography

17. Which refers to the automatic identification (or) identity verification of living persons using their enduring physical or behavioral characteristics

Correct : A. biometrics

18. ……………… involves checking to see if the signal is good quality

Correct : B. quality control

19. The process of encrypted data readable once again is called,

Correct : A. encryption

20. This the process of making information un intelligible to the unauthorized reader

Correct : A. encryption

21. The attacker monitors the data between the shoppers computer and the server

Correct : C. sniffing

22. The private content of transaction, if unprotected can be intercepted when it go through the route over the internet called.

Correct : D. eavesdropping

23. Gain entry into the user’s system and scan your file system for personal information is known as

Correct : A. spoofing

24. Creating illegitimate site that appear to published by established organizations are by this name

Correct : A. spoofing

25. The IT act came into effect on

Correct : C. 17 oct 2000

26. UNCITRAL model law on E commerce is

Correct : A. 1996

27. E commerce consists of commerce activities

Correct : C. electronically

28. …… provide security and privacy for the use of the web page content

Correct : A. http

29. A digital signature performs a similar functions to a

Correct : B. written signature

30. Digital signature acts as a ……………….. for e commerce

Correct : C. security

31. Privacy laws of their host Coventry effect

Correct : B. overseas companies

32. …………………….is designed to protect a persons personal information

Correct : C. private legislation

33. There are different types of risks connected with information protection such as disruption, disaster.

Correct : A. unauthorized access

34. ………………… are electronic files that are used to uniquely identify people and resources over the internet

Correct : B. digital certificate

35. ……………….. techniques make use of secret codes (or) keys to encrypt information

Correct : A. cryptography

36. The organization has to ensure that the …………… are sent to the customers

Correct : A. ordered goods

37. ………………… can catch the transmissions to obtain customers sensitive information

Correct : C. hackers

38. SATAN is an example

Correct : C. snooping

39. Customers are concerned about

Correct : A. privacy and security of information

40. Information sent over the internet commonly uses the set of rules called

Correct : B. tcp/ip