1. acts like a gate keeper that examines each users identification before allowing
them to enter to the organization’s internal networks.
Correct : A. Network firewall
2. Prevents unauthorized communication into and out of the network, allowing the
organization to enforce a security policy on traffic between its network and the internet.
Correct : A. Network firewall
3. SET means …………………………….
Correct : C. Secure Electronic Transaction
4. The verification of credit card is done by using… with a communications link to the
merchants acquiring bank
Correct : C. All of these
5. Creating illegitimate sites that appear to be published by established organizations
by unscrupulous artists is termed as………………………….
Correct : A. Spoofing
6. Gain entry into the user’s system and scan your file system for personal information
is known as……………….
Correct : B. Snooping
7. attacks are difficult and are only successful if the attacker knows something
about the shopper
Correct : D. Guessing passwords
8. is the process of making information unintelligible to the unauthorized user.
Correct : D. Cryptography
9. is the reverse process of encryption, to make the information readable once
again
Correct : B. Decryption
10. A provides a way to associate the message with the sender and is the
equivalent of an ordinary signature.
Correct : B. Digital signature
11. A is an electronic file that uniquely identifies individuals and websites on the
internet and enables secure confidential communications
Correct : B. Digital certificates
12. The information Technology Act [IT ACT] came into effect on
Correct : C. 17th October 2000
13. Information sent over the Internet commonly uses the set of rules called………………………..
Correct : A. TCP/IP
14. is a person who breaks in or trespasses a computer system
Correct : A. Hacker
15. E-mail which contain useless material is termed as………………………
Correct : D. Junk mail
16. India has enacted the first IT Act in the year……………………………………
Correct : D. 2000
17. Which of the following crimes were not covered under IT (Amendment) Act, 2008 ?
Correct : D. None of these
18. Trade mark, copyright, patent law etc comes under the purview of……………………
Correct : C. Intellectual property laws
19. is a programme designed o replicate and spread generally with the victim being
oblivious to its existence
Correct : C. Computer virus
20. Which one of the following is not a principle of e-commerce ?