1) Which set of standards developed in the 1960s to exchange business information and to do electronic transactions?

A) EDI

B) Protocols

C) TCP/IP

D) None of these

2) In which year World Wide Web (WWW) was introduced?

A) 1994

B) 1996

C) 1992

D) 1990

 

3) Electronic Exchange of business documents in a standard format is known as ………………

A) E-commerce

B) E-Business

C) EDI

D) None of these

 

4) Which among the following is a commercial process that includes production, distribution, sales or delivery of goods and services through electronic means?

A) E-commerce

B) SCM   

C) EDI

D) none of these

 

5) EDI requires

A) Representation of common business documents in computer readable forms

B) Data entry operators by receivers

C) Special value added network.

D) Special hardware at co-operating Business premises

 

6) Electronic commerce (EC) is defined as the online exchange of ________ between business, and also between business and their customers.

A) Goods

B) Services

C) Money

D) All of the above

 

7) Which dimension of e-commerce enables commerce across national boundaries?

A) Interactivity

B) Richness

C) Ubiquity

D) Global reach

 

8) Which of the following is basically a concept of online marketing and distributing of products and services over the internet?

A) B2G

B) B2E

C) B2C

D) B2B

 

9) Which amonng the following are features of e-commerce?

A) Global Reach

B) Universal Standards

C) Interactivity

D) All of the above

 

10) Which is top challenge facing e-commerce businesses?

 

A) Cybersecurity

B) Competition

C) Order fulfillment

D) All of the above

 

11) The nature to change the product to better fit the needs of the customer is called _____.

A) Personalization

B) Customization

C) Privacy

D) Accessibility

 

12) C2C is a type of EC that refers to transactions that occur as:

A) Consumer-to-consumer

B) Client-to-client

C) Concumer-to-client

D) None of the above

 

13) Which of the following is not suitable for a B2C transaction?

A) Clothes

B) Flowers

C) Airline reservation

D) None


14) IndiaMart typical transaction is an example of a Web site that employs the ____type of EC.

A) B2B

B) B2C

C) B2E

D) C2C

 

15) The business work physically at shop as well as online known as

A) Click & Mortal

B) Brick & Brick

C) Brick & Click

” style=”font-size: medium;”>
(adsbygoogle = window.adsbygoogle || []).push({});
” style=”font-size: medium;”>

D) Click & Click

16) Which of the following is not one of the popular e-commerce?

A) C2B

B) B2C

C) B2B

D) C2C

 

17) Which among the following is an example of C2C?

A) e-Bay

B) Amazon.com

C) Rentalic.com

D) All of these

 

18) Which among the following is an example of B2B?

A) Amazon

B) Dell

C) IndiaMart

D) None of the above

 

19) Which among the following is an example of B2C?

A) Amazon

B) Alibaba

C) IndiaMart

D) None of the above

 

20) Which are the features of e-commerce?

A) A uniform strategy can be easily established and maintain in e-commerce

B) In e-Commerce or Electronic Market, there is no human intervention.

C) E-Commerce website provides user a platform where all information is available at one place.

D) All of the above


21. Which acts like a gate keeper that examines each user’s identification before allowing them to enter to the organization’s internal networks?

A) Network firewall

B) Antivirus C) both of these

D) None of these

22 SET means ………………

A) Standard Electronic Technology

B) Standard Electronic Transfer

C) Secure Electronic Transaction

(D) None of these

23. Which of the following provide security and privacy for the use of the web page content?

A) HTTP 

B) HTML

C) FTP 

D) None of these

24. In the e-commerce among following may be a payment card holder from an issuer.

A) Customer 

B) Issuer 

C) Merchant 

D) Acquirer

25. A………………….provides a way to associate the message with the sender and is the equivalent of an ordinary signature.

A) Cyber signature

B) Digital signature

C) SSL 

D) none of these

26. In e-commerce, the SET protocol is used for

A) Credit Card Payment

B) Cheque Payment

C) Electronic Cash Payment

D) RTGS

27.  In SET protocol a customer encrypts credit card number using

A) His Private Key

B) Banks Public Key

C) Bank’s Private key

D) Merchants Public Key

28. Which among the following is wrong for SET?

A) It is relatively simple and has a low consumption of computer resources.

B) Demands all the participants to have an X.509 public-key certificate.

C) Simplify the process of authenticating the client by using a password instead of public key certificates

D) None

29. Which of the following security is provided by Digital Signature?

A) Authentication

B) Non-repudiation

C) Integrity Protection

D) All of the above


30. In which protocols does a website encrypt the session with Digital Certificate?

A) TCP

B) SHTTP

C) XHTTP

D) None

“>
(adsbygoogle = window.adsbygoogle || []).push({});
“>“>
(adsbygoogle = window.adsbygoogle || []).push({});
“>

31. Which is an electronic file that uniquely identifies individuals and websites on the internet and enables secure confidential communications?

A) Digital signature

B) Digital certificates

C) SSL 

D) none of these

32.  The verification of credit card is done by using _____ with a communications link to the merchants acquiring bank

A) Credit card payment terminal

B) Point of Sale

C) Both A & B

D) None of these

33. In which year India has enacted the first IT Act?

A) 2001 

B) 2002 

C) 2009 

D) 2000


34. Which of the following is a principle of e-commerce?

A) Privacy 

B) Integrity 

C) Authentication 

D) All of the above


35.  A certificate authority issues_______ that contain a public key and the identity of the owner. 

A) Digital Certificates 

B) Password 

C) UID 

D) None of the above

36.  Which of the following is certificate authority? 

A) IdenTrust 

B) DigiCert 

C) GoDaddy 

D) All of the above


37. Which of the following term for “Information should not be accessible to an unauthorized person”?

A) Integrity 

B) Confidentiality 

C) Non-Repudiability 

D) None of the above

38. Which of the following term for “Information should not be altered during its transmission over the network”? 

A) Integrity 

B) Confidentiality 

C) Non-Repudiability 

D) None of the above

39. Secure Socket Layer (SSL) does not meet the following term

A) Authentication

B) Encryption

C) Integrity

D) Digital Signature


40.  A _____ provides a way to associate the message with the sender and is the equivalent of an ordinary signature.

A) Cyber signature

B) Digital signature

C) SSL 

D) none of these

 

41) Which is an automated method for recognizing a person based on a physiological or behavioral characteristic?

A) Biometrics

B) Face recognition

C) Retina Scanner

D) All of the above

 

42) Which of the following is used to verify the integrity of the message?

A) Message Digest

B) Digital Signature

C) Cryptography

D) Protocol

 

43) Which of the following is basically a secure gate between our organization data and internet?

A) Network Firewall

B) Antivirus

C) Both

D) None of the above

 

44) Firewall as part of a router program

A) Filters only packets coming from internet

B) Filters only packets going to internet

C) Filters packets travelling from and to the intranet from the internet

D) Ensures rapid traffic of packets for speedy e-Commerce

 

45) Which is the process of making information unintelligible to the unauthorized user?

A) Spoofing

B) Snooping

C) Sniffing

D) Cryptography

 

46) What is full form of SET?

A) Standard Electronic Technology

B) Standard Electronic Transfer

C) Secure Electronic Transaction

D) None of these

47) What is meaning of merchant?

A) Customer

B) Bank

C) Seller of Product

D) Issuer

 

48) What is full form of RTGS?

A) Real Time Gross Settlement

B) Real Type General Scheme

C) Real Type Gross Settlement Scheme

D) Real Time Gross System

 

49) In cheque payment protocol, the purchase order form is signed by purchaser using

A) his public key

B) his private key

C) his private key using his signature hardware

D) various public keys

 

50) Certification of Digital signature by an independent authority is needed because

A) it is safe

B) it gives confidence to a business

C) the authority checks and assures customers that the public key indeed belongs to the business which claims its ownership

D) private key claimed by a sender may not be actually his

 

51) By encryption of a text we mean

A) Compressing it

B) Expanding it

C) Scrambling it to preserve its security

D) Hashing it


52) By symmetric key encryption we mean

A) One private key is used for both encryption and decryption

B) Private and public key used are symmetric

C) Only public keys are used for encryption

D) Only symmetric key is used for encryption

 

53) Hashed message is signed by a sender using

A) his public key

B) his private key

C) receiver’s public key

D) receiver’s private key

 

54) In which year National Electronic Fund Transfer started in India?

A) 2004

B) 2002

C) 2006

D) 2005

55) Immediate Payment Service (IMPS) facility is provided by?

A) BBPS

B) RBI

C) NPCI

D) AEPS

 

56) IMPS is available on how many days in a week?

A) 4

B) 5

C) 6

D) 7

 

57) Identify the false statement with respect to IMPS

A) The customer needs to have a bank account with the bank which has enabled IMPS facility. B) Customer should enroll for Mobile Banking Service.

C) The customer cannot link the same mobile number to more than one account.

D) The bank will allocate a Mobile Money Identifier (MMID) for each account of the mobile banking customers.

 

58) MMID is used for fund transfer in IMPS. What does the First M in MMID stands for?

A) Mobile

B) Money

C) Multi

D) Message

 

59) Which among the following is a kind of payment card that transfers fund directly from the consumer’s bank account to the merchants account?

A) Debit Card

B) Electronic purse

C) Credit card

D) any of these


60) Which among the following is required to accept a credit card for payment?

A) Savings Bank

B) Current account

C) Merchant account

D) any of these

61) Which technique is used to verify the integrity of the payment information?

A) Message Digest

B) Digital Signature

C) Decryption Algorithm

D) Protocol

 

62) Which among the following hold the private key in asymmetric key cryptography?

A) sender

B) receiver

C) sender and receiver

D) all the connected devices to the network

 

63) which among the following is a cryptographic protocol used to secure HTTP connection?

A) Stream Control Transmission Protocol (SCTP)

B) Transport Layer Security (TLS)

C) Explicit Congestion Notification (ECN)

D) Resource Reservation Protocol

 

64) Secure Sockets Layer

A) Uses handshaking to create a secure connection

B) Uses polling to create a secure connection

C) Sits on top of the application layer

D) Opens a connection that is only closed by the user when they choose to do so

 

65) What should user turn on following to protect from computer hacker?

A) Firewall

B) Script

C) Antivirus

D) Password System

 

66) The use of Firewall is to protect against_______

A) Virus attacks

B) Fire attacks

C) Un-authorized access

D) Data driven attacks

 

67) Which among the following uses Public Key Infrastructure (PKI) and digital certificates to provide privacy and authentication?

A) DES

B) TLS

C) SET

D) SSL

 

68) The bank required public keys of all customers in SET protocol to

A) check the digital signature of customers

B) communicate with merchant

C) communicate with merchants credit card company

D) certify their keys

 

69) What characteristics make passwords more secure?

A) Length

B) Doesn’t contain dictionary words

C) Contains special characters (%, &, #, etc)

D) All of the above

 

“>
(adsbygoogle = window.adsbygoogle || []).push({});
“>70) Which among the following is NOT an internet protocol used for security?

A) SSL

B) SHTML

C) SHTTP

D) SSH

 

71) In asymmetric cryptography sender has to encrypted message by using

A) His private key

B) Receivers private key

C) Receivers public key

D) His public key

 

72) Public key system is useful because

A) it uses two keys.

B) there is no key distribution problem as public key can be kept in a commonly accessible database.

C) private key can be kept secret.

D) it is a symmetric key system.

 

73) A digital signature is

A) a bit string giving identity of a correspondent

B) a unique identification of a sender

C) an authentication of an electronic record by tying it uniquely to a key only a sender knows

D) an encrypted signature of a sender

 

74) Which among the following is Participants in SET?

A) Cardholder

B) Issuer

C) Merchant

D) All of the above

75) In SET protocol a customer sends a purchase order

A) Encrypted with his public key

B) In plain text form

C) Encrypted using Bank’s public key

D) Using digital Signature system

 

76) What does mean by symmetric key cryptography?

A) One private key is used for both encryption and decryption

B) Private and public key used are symmetric

C) Only public keys are used for encryption

D) Only symmetric key is used for encryption

 

77) Which of the following is computer virus that replicates itself?

A) Bug

B) Worm

C) Vaccine

D) Bomb

 

78) Internet virtual private networks are preferred over extra-nets for all of the following reasons except.

A) Data can be encapsulated

B) Communications are kept private

C) Good security

D) Use of inexpensive leased phone lines

 

79) Which among the following benefits of online payments?

A) Low risk of theft

B) Convenience for online sales

C) Low labour costs

D) All of the above

 

“>
(adsbygoogle = window.adsbygoogle || []).push({});
“>80) Which among the following disadvantages of online payments?

A) Service fees

B) Vulnerability to cybercriminals

C) Technical problems

” style=”color: rgb(0, 0, 0); font-family: "Times New Roman"; font-size: medium;”>
(adsbygoogle = window.adsbygoogle || []).push({});
” style=”color: rgb(0, 0, 0); font-family: "Times New Roman"; font-size: medium;”>” style=”color: rgb(0, 0, 0); font-family: "Times New Roman"; font-size: medium;”>
(adsbygoogle = window.adsbygoogle || []).push({});
” style=”color: rgb(0, 0, 0); font-family: "Times New Roman"; font-size: medium;”>” style=”color: rgb(0, 0, 0); font-family: "Times New Roman"; font-size: medium;”>
(adsbygoogle = window.adsbygoogle || []).push({});
” style=”color: rgb(0, 0, 0); font-family: "Times New Roman"; font-size: medium;”>

D) All of the above

81) Which among the following is not a major way of stealing email information?

A) Stealing cookies

B) Reverse Engineering

C) Password Phishing

D) Social Engineering

 

82) Which among the following is a non-technical type of intrusion or attack technique?

A) Reverse Engineering

B) Malware Analysis

C) Social Engineering

D) Malware Writing

 

83) Which of the following provides the integrity and security to the data that are passing over a network?

A) Firewall

B) Antivirus

C) Pentesting Tools

D) Network-Security Protocols

 

84) Which of the following is not a secured mail transferring methodology?

a) S/MIME

B) SSMTP

C) Mail using PGP

D) POP

 

85) What is a full form of HTTPS?

A) Hypertexts Transfer Protocol Secured

B) Secured Hyper Text Transfer Protocol

C) Hyperlinked Text Transfer Protocol Secured

D) Hyper Text Transfer Protocol Secure

 

86) Which of the following is the technique used for tricking users to disclose their username and passwords through fake pages?

A) Social Engineering

B) Phishing

C) Cookie Stealing

D) Banner Grabbing

87) Which of the following needs to be turned off in order to prevent from this attack?                    

A) Email scripting

B) Email attachments

C) Email services

D) Third party email programs

 

88) What is full form of S/MIME?

A) Secure/Multimedia Internet Mailing Extensions

B) Secure/Multipurpose Internet Mailing Extensions

C) Secure/Multimedia Internet Mail Extensions

D) Secure/Multipurpose Internet Mail Extensions

 

89) Which among the following are threads to Email security?

A) Viruses

B) Trojans

C) Spam

D) All of the above

 

” style=”color: rgb(0, 0, 0); font-family: "Times New Roman"; font-size: medium;”>
(adsbygoogle = window.adsbygoogle || []).push({});
” style=”color: rgb(0, 0, 0); font-family: "Times New Roman"; font-size: medium;”>

90) Which among the following is an encryption program or add-ons which provides cryptographic privacy & authentication for email communication?

A) Powerful Good Privacy

B) Pretty Good Privacy

C) Pretty Good Encryption

D) Pretty Strong Encryption

 

91) In which among the following attacks an attacker do not contact with authorizing party for stealing password?

A) Passive online

B) Active online

C) Offline

d) Non-electronic

 

92) Which among the following program is used to send and receive email?

A) Mail Transfer Agent

B) Mail Delivery Agent

C) Mail User Agent

D) Mail Reading Agent

 

93) Which among the following is not a disadvantage of active online attack?

A) Takes a long time

B) Easily and automatically detected

C) Need high network bandwidth

D) Need the patience to crack

 

94) Which of the following is not an example of offline password attack?

A) Dictionary attack

B) Rainbow attacks

C) Brute force attack

D) Spamming attack

95) Which of the following performs when POP filters spam traffic?

A) Return it to the sender

B) Redirect it to the spam mail box

C) Tag the spam mail

D) Delete the spam mail

 

96) Which of the following action minimizes the virus infection via email attachment?

A) Opening attachment from external hard drives

B) Copying attachment to special directories before opening them

C) Right clicking attachment

D) Deleting mail containing attachment from unknown senders

 

97) Which information of initial SMTP server client must know?

A) IP address

B) MAC address

C) URL

D) Name

 

98) In which among the following password grabbing attack the attacker directly tries different passwords 1-by-1 against victim’s system/account?

A) Passive online

B) Active online

C) Offline attack

D) Non-electronic

 

99) What is meaning of MLA in S/MIME?

A) Mailing list agent

B) Multipurpose list agent

C) Mail lock agent

D) Message link agent

 

” style=”color: rgb(0, 0, 0); font-family: "Times New Roman"; font-size: medium;”>
(adsbygoogle = window.adsbygoogle || []).push({});
” style=”color: rgb(0, 0, 0); font-family: "Times New Roman"; font-size: medium;”>

100) Which is a measure medium for the spread of malware spam, & phishing attacks?

A) Cloud

B) Pen drive

C) Website

D) Email

 

 

101) What does error 404 or Not Found error while accessing a URL mean?

A) The server could not find the requested URL

B) Requested HTML file is not available

C) The path to the interpreter of the script is not valid

D) The requested HTML file does not have sufficient permissions

 

102) Which of the following programs automatically connects to web sites and download documents and save them to local drive?

A) Web Servers

B) Web Downloading Utilities

C) Offline Browsers

D) None of the above

 

103) Which of the following are internet tools relevant to e-commerce?

A) Archie

B) FTP

C) Gopher

D) All of the above

 

104) Which of the following are automatically loaded and operates as a part of browser?          

A) Add-ons

B) Plug-ins

C) Utilities

D) Widgets

 

105) Which of the following statements are true?

A) HTTP runs over TCP

B) HTTP allows information to be stored in a URL

C) HTTP can be used to test the validity of a hypertext link

D) All of the above

 

106) Which of these is a client server application?

A) Web browsing

B) E-mail

C) Internet Chat

D) All of the above

107) Which is most famous HTTP response error “Not Found” code?

A) 400

B) 404

C) 405

D) 408

 

108) Search Engines are able to search which of the following?

A) Documents

B) Images

C) Videos

D) All of the above

 

109) To join the internet, the computer has to be connected to a _________

A) Internet architecture board

B) Internet society

C) Internet service provider

D) Different computer

 

“>
(adsbygoogle = window.adsbygoogle || []).push({});
“>110) ISP exchanges internet traffic between their networks by __________

A) Internet exchange point

B) Subscriber end point

C) ISP end point

D) Internet end point

 

111) Which web server is product of Microsoft Corporation?

A) Apache Tomcat

B) Caudium

C) Internet Information Services (IIS)

D) XAMPP

 

112) Internet works on _______

A) Packet switching

B) Circuit switching

C) Both packet switching and circuit switching

D) Data switching

 

113) Which one of the following is not used in media access control?

A) Ethernet

B) Digital subscriber line

C) Fiber distributed data interface

D) Packet switching

 

114) Cookies were originally designed for ____________

A) Client side programming

B) Server side programming

C) Both Client side programming and Server side programming

D) Socket programming

115) ISP exchanges internet traffic between their networks by

A) Internet exchange point

B) Subscriber end point

C) ISP end point

D) Internet end point

 

116) The size of an IP address in IPv6 is _________

A) 32 bits

B) 64 bits

C) 128 bits

D) 265 bits

 

117) In internet communication “cookie” is used for

A) Storing authentication information at server side for entire session

B) Storing authentication information at client side for entire session

C) Detecting intrusion at client side for entire session

D) Detecting intrusion at server side for entire session

 

118) Which of the following is not the function of the physical layer?

A) Converting the digital bits into an electrical signal

B) Detecting and correcting errors

C) Defining voltages and data rates needed for transmission.

D) Activating, maintaining and deactivating the physical connection

 

119) Who defines the Internet architecture?

A) IETF

B) IEEE

C) ACM

D) None

 

120) How many headers and trailers are added by transport layer in TCP/IP protocol suit?

A) 1 header and 2-3 trailers

B) 1 header and no trailer

C) 2-3 headers and no trailers

“>
(adsbygoogle = window.adsbygoogle || []).push({});
“>

D) Undefined