Quiznetik

Digital Business | Set 2

1. acts like a gate keeper that examines each users identification before allowing them to enter to the organization’s internal networks.

Correct : A. Network firewall

2. Prevents unauthorized communication into and out of the network, allowing the organization to enforce a security policy on traffic between its network and the internet.

Correct : A. Network firewall

3. SET means …………………………….

Correct : C. Secure Electronic Transaction

4. The verification of credit card is done by using… with a communications link to the merchants acquiring bank

Correct : C. All of these

5. Creating illegitimate sites that appear to be published by established organizations by unscrupulous artists is termed as………………………….

Correct : A. Spoofing

6. Gain entry into the user’s system and scan your file system for personal information is known as……………….

Correct : B. Snooping

7. attacks are difficult and are only successful if the attacker knows something about the shopper

Correct : D. Guessing passwords

8. is the process of making information unintelligible to the unauthorized user.

Correct : D. Cryptography

9. is the reverse process of encryption, to make the information readable once again

Correct : B. Decryption

10. A provides a way to associate the message with the sender and is the equivalent of an ordinary signature.

Correct : B. Digital signature

11. A is an electronic file that uniquely identifies individuals and websites on the internet and enables secure confidential communications

Correct : B. Digital certificates

12. The information Technology Act [IT ACT] came into effect on

Correct : C. 17th October 2000

13. Information sent over the Internet commonly uses the set of rules called………………………..

Correct : A. TCP/IP

14. is a person who breaks in or trespasses a computer system

Correct : A. Hacker

15. E-mail which contain useless material is termed as………………………

Correct : D. Junk mail

16. India has enacted the first IT Act in the year……………………………………

Correct : D. 2000

17. Which of the following crimes were not covered under IT (Amendment) Act, 2008 ?

Correct : D. None of these

18. Trade mark, copyright, patent law etc comes under the purview of……………………

Correct : C. Intellectual property laws

19. is a programme designed o replicate and spread generally with the victim being oblivious to its existence

Correct : C. Computer virus

20. Which one of the following is not a principle of e-commerce ?

Correct : D. none of these