All E-Com MCQ's

Download as pdf or txt
Download as pdf or txt
You are on page 1of 111

Question Bank

Sub. Code - BCA 602


Sub. Names- E-commerce
and Cyber curity
Multiple Choice Questions
1. Which of the following describes e-commerce?
a. Doing business electronically b. Doing business
c. Sale of goods d. All of the above

2.Which of the following is part of the four main types for e-commerce?
a. B2B b. B2C
c. C2B d. All of the above

3.Which segment do eBay, Amazon.com belong?


b. B2Bs b. B2Cs
c. C2Bs d. C2Cs

4,Which type of e-commerce focuses on consumers dealing with each other?


c. B2B b. B2C
c. C2B d. C2C

5. Digital products are best suited for B2C e-commerce because they:
a. Are commodity like products b. Can be mass-customized and
personalized
c. Can be delivered at the time of purchase d. All of the above

6.The solution for all business needs is


a. EDI b. ERP
c. SCM d. None of the above

7.Which is a function of E-commerce


a. marketing b. advertising
c. warehousing d. all of the above
8.Which is not a function of E-commerce
a. marketing b. advertising
c. warehousing d. none of the above

9. Which form of e-commerce currently accounts for about 97% of all e- commerce
revenues?
a. B2B b. B2C
c. C2B d. C2C

10. Which of the following is a useful security mechanism when considering


business strategy and IT?

a. encryption b. decryption
c. firewall d. all the above

11. Which of the following is not related to security mechanism


a. encryption b. decryption
c. e-cash d. all the above

12. What is the name given to an interactive business providing a centralized market
where many buyers and suppliers can come together for e-commerce or commerce-
related activities?
a. Direct marketplace b. B2B
c. B2C d. Electronic marketplace

13. Which of the following is a method of transferring money from one person's
account to another?
a. electronic check b. credit card
c. e-transfer d. none of the above

14. An electronic check is one form of what?


a. e-commerce b. online banking
c. e-cash d. check
15. If you need to transfer money to another person via the internet, which of
the following methods could you use?
a. financial cybermediary b. electronic check
c. electronic bill presentment and payment d. all of the above

16. Which of the following permits the transmission of a bill, along with payment of
that bill, to be conducted over the Internet?
a. financial cybermediary b. electronic check
c. electronic bill presentment and payment d. all of the above

17. A combination of software and information designed to provide security and


information for payment is called a what?
a. digital wallet b. pop up ad
c. shopping cart d. encryption

18. Public key encryption uses multiple keys. One key is used to encrypt data, while
another is used to decrypt data. The key used to encrypt data is called the
key, while the key used to decrypt data is called the key.
a. encryption, decryption b. private, public
c. encryption, public d. public, private

19. Secure Sockets Layers does which of the following?


a. creates a secure, private connection to a web server
b. encrypts information
c. sends information over the internet
d. all of the above

20. When a transaction is processed online, how can the merchant verify the customer's
identity?
a. use secure sockets layers b. use secure electronic transactions
c. use electronic data interchange d. use financial electronic data interchange

21.The practice of forging a return address on an e-mail so that the recipient is fooled into
revealing private information is termed?
a. hacking b. cracking
c. dumpster diving d. spoofing

22.Which will not harm computer resources


a. firewall b. Virus
c. Trojan horse d. None of the above

23.Who protects system from external threats?

a. firewall b. EDI

c. ERP d. Script kiddies

24.Who breaks into other people's computer systems and steals and destroys information?
a. Hackers b. softwares
c. Hacktivists d. Script kiddies

25.What floods a Web site with so many requests for service that it slows down or
crashes?
a. Computer virus b. Worm
c. Denial-of-service attack d. None of the above

26.What harnesses far-flung computers together by way of the Internet or a virtual


private network to share CPU power, databases, and database storage?
a. Computer virus b. Worm
c. Denial-of-service attack d. None of the above

27. What is an electronic representation of cash?

A Digital cash B. Electronic cash

C. E‐cash D. All of the above


28.Which of the following is a characteristic of a firewall?

A. Examines each message as it seeks entrance to the network

B. Blocks messages without the correct markings from entering the network

C. Detects computers communicating with the Internet without approval

D. All of the above

29.What might identity thieves do with your identity?

A. Apply for and use credit cards

B. Apply for a loan

C. Change their identity

D. All of the above

30.The most widely used encryption standard is ______.

A. Advanced Encryption Standard (AES)

B. Data Encryption Standard (DES)

C. Universal Encryption Standard (UES)

D. Optimal Encryption Standard (OES

31.A combination of software and information designed to provide security and


information for payment is called a what?

A. digital wallet

B. pop up ad

C. shopping cart

D. encryption

32.The most common form of securing channels is through ________.

A. S-HTTP
B. VPNs

C. SSL

D. PPTP

33.Firewalls perform all of the following functions except _________.

A. Forbids communications from untrustworthy sources

B. Allows communications from trustworthy sources

C. Eliminates viruses and other malicious attacks

D. Filters traffic based on packet attributes

34.The only payment system that is instantly convertible without intermediation is


_______.

A. Credit card

B. Accumulating balance

C. Stored value

D. Cash

35.Secure Sockets Layers does which of the following?

A. creates a secure, private connection to a web server

B. encrypts information

C. sends information over the internet

D. all of the above

36.The most prevalent online payment method is ______.

A. PayPal

B. checks
C. credit cards

D. debit

37.Which one is also known as plastic money?

A. Credit card

B. Debit card

C. Paper cash

D. All of the above

38.E‐cheques are ________

A. Prepaid

B. Postpaid

C. Both prepaid and postpaid

D. None of these

39.Digital signature is a.

A. Digital id,send as an attachment to a web page/e‐mail/message

B. Is used for verifying the attachments send using web

C. Both a and b

D. None of these

40.Which one is not a encryption technique?

A. RSA

B. DES

C. AES

D. FTP
41.Which one is not used as a security mechanism?

A. Encryption

B. Cryptography

C. Wallets

D. Digital signature

42.Which e‐government arena is being used when governmental agencies send out
and accept bids for work?

A. G2G

B. G2B

C. G2C

D. G2G

43.Which one is communication channel security protocol?

A. SSL

B. S‐HTTP

C. SET

D. ALL OF THE ABOVE

44.The protocol which allows the file transfer between computers is.

A. TCP/IP

B. FTP

C. HTTP

D. SOA

45.__________ is backbone of all E‐payments in E‐commerce.

A. EFT
B. EPS

C. PayPal

D. None of these

46.Secure communication means.

A. Protect transmission of credit card number

B. Guarantee privacy of customer

C. Unauthorized access of payment details

D. All the above

47.OTP stands for.

A. One Time Password

B. On Time processing

C. One time processor

D. None

48.Private Key cryptography is also known as __________ cryptography.

A. Public key

B. Symmetric

C. Asymmetric

D. None

49.The presence of ‐‐‐‐‐‐‐‐‐‐‐ make the smart card smart.

A. Memory

B. Microchip

C. E‐cash
D. None of the above

50.‐‐‐‐‐‐‐‐‐ card is read only mode.

A. Contact smart card

B. Contactless smart card

C. Proximity smart card

D. Both B and C

51.The virus that are commonly found in word documents are called __________.

A. Macro

B. Trojan horse

C. Script virus

D. None of the above

52.Malicious hackers who act with the intention of causing harm are __________.

A. White hats

B. Black hats

C. Grey hats

D. Brown hats

53.The practice of forging a return address on an e‐mail so that the recipient is


fooled into revealing private information is termed?

A. hacking

B. cracking

C. dumpster diving

D. spoofing
54.Unsolicited e‐mail is called what?

A. Junk mail

B. Spam

C. Extra mail

D. None of the above

55.What is the unauthorized use, duplication, distribution or sale of copyrighted


software?

A. Fair Use Doctrine

B. Pirated software

C. Counterfeit software

D. Privacy

MCQ (602 – E-Commerce and Cyber Security)


56. Which of the following perfectly describes e-commerce?
 Doing business electronically
 Doing business
 Sale of goods
 All of the above
57. Which of the following are the building block(s) of E-CommerceFramework?
 Public Policy legal and privacy issues
 Common Business services infrastructure
 Technical standards for E-documents, multimedia
 Video on-demand
58. Which of the following is not to be considered as E-commerce Consumer Application(s)?
 Consumer Applications and Social Interaction
 Delivery Products to Customers
 E-Commerce and the Retail Industry
 Consumer Research and E-Commerce
59. Which of the following is the part of E-Commerce Organization Application
(InventoryManagement and Organizational Applications)?
 Supply Chain Management
 WorkGroup Collaboration Applications
 Marketing and E-commerce
 Just-In-Time Manufacturing and Quick Response Retailing
60. Which of the following are the electronic gadgets that can be used toperform M-Commerce?
 Desktops
 Dashtops
 Mobile phones
 All of the above
61. Payment management, Financial Management,Distribution Management arethe functions of
__________________.
 SCM (Supply Chain Management)
 JIT (Just In Time)
 QR (Quick Retailing)
 HR (Human Resource)
62. Competitive Pressure, Global Regulatory changes, Demanding customer requirements are the
pressures that influences Changing Business.
 True
 False
63. Which of the following is/are part of the main types for e-commerceapplication services? Or
Which of the Following are Transaction Models?
 B2B
 B2C
 C2B
 All of the above
64. Which of the following is Market-Link Transaction?
 B2B
 B2C
 C2C
 C2B
65. I-Way is/are also called
 NII
 Data-dori
 Jaring
 All of the above
66. Which of the following is the category of Local or access roads or on-ramps?
 Satellite Network
 Network Access Equipment
 Commercial Online Infrastructure
 Global Information Distribution Network
67. Which of the following is the name of Network Infrastructure needed forE-commerce?
 I-Way
 Multimedia Super Highway
 Information Super highway
 All of the above
68. Which of the following is true related to Secure Socket Layer?
 creates a secure, private connection to a webserver
 Does not encrypts information
 Cannot sends information over the internet
 All of the above
69.What is an electronic representation of cash?
 Digital cash
 Electronic cash
 E-cash
 All of the above
70. Data such as Bank Account Statement, Personal files etc are type of ____________ data.
 Secret
 Public
 Confidential
 Copyright
71. The accounting server verifies the Digital Signature on the Check data by __________
authentication scheme.
 RSA
 Kerberos
 DSA
 Third Party
72. ________ can act as a debit card.
 E-Purse
 E-Wallet
 Relationship based cards
 Both 1 and 2
73. __________ act as an intermediary between client and merchant for E-paymentusing Credit card.
 Third party processor
 Encryption
 Verification
 Authorization
74. NetCheque Similar to E-Checks is developed by ______________ .
 Information Sciences Institute by Clifford
 Institute of Information Science
 Institute of EPS Institute of E-Checks.
 All of the above
75. Which of the following are the solutions that can be taken intoconsideration at the time of
protecting customers confidential Information?
 encode the data and store it on the server
 to delete all the confidential information
 separate server to store transaction backup
 All of the Above
76. The practice of forging a return address on an e-mail so that the recipientis fooled into revealing
private information is termed?
 hacking
 spoofing
 Spamming
 cracking
77. Which of the following will not harm computer resources?
 Virus
 Trojan horse
 firewall
 Worm
78. Who breaks into other people's computer systems and steals and destroysinformation?
 Hackers
 crackers
 Hacktivists
 Scriptkiddies
79. Which of the following spreads itself, not just from file to file, but fromcomputer to computer via
e-mail and another Internet traffic?
 virus
 Trojan horse
 Denial-of-service
 Worm
80. Which of the following floods a Web site with so many requests for servicethat it slows down or
crashes?
 virus
 Worm
 Denial-of-service attack
 Trojan Horse
81. Unsolicited e-mail is called what?
 Spam mail
 Extra mail
 Spoof mail
 Mass Mail
82. Which of the following is a program, when installed on a computer, recordsevery keystroke and
mouse click?
 Keylogger (Software)
 Keylogger (Hardware)
 Virus
 Worm
83. Which of the following refers to sending large no. of emails to the victimresulting in the victim’s
email account or mail server crashing?
 Email Forging
 Email Bombing
 Email Abuse
 D-DoS
84. TearDrop Attack exploits
 TCP/IP three way handshake
 Echo message of ICMP
 The vulnerability in the reassembling of data
 the large amount of data output feature of UDP
85. _________ D-DoS tool allows attacker to carry out variety of attacks such asTCP flood, SYN
flood and UDP flood on the target System.
 Smurf
 Hybrid
 Trin00
 TFN
86. The ratio of victim to attacker in D-DoS attack is 1:n.
 True
 False
87. Which of the following applies to the invention or implementation of anidea?
 Copyright
 Intellectual property
 Trade Mark
 Patent
88 What is the legal protection afforded an expression of an idea, such as asong, video game, and
some types of proprietary documents?
 Ethics
 Copyright
 Intellectual property
 Patent
89. Child Pornography is the visual depiction of sexually explicit conduct that ___________.
 Involves minor
 involves child below 18age
 both 1 and 2
 None of them
90. Renewal snatching, name jacking, reverse domain hijacking are the typesof _______.
 Cyber Terrorism
 Cyber Smearing
 Cyber Stalking
 Cyber Squatting
91. _________ can be defined as the repeated act of harassment or threateningbehaviour by the
criminal towards the victim using internet.
 Cyber Terrorism
 Cyber Smearing
 Cyber Stalking
 Cyber Squatting
92. __________ is an abusive attack on a person’s character or a good name.
 Defamation
 Stalking
 Squatting
 None of the above
93. Which of the following are the types of Cyber Squatting?
 Renewal snatching
 Name Jacking
 Reverse Domain Hijacking
 All of the above
94. Which of the following include a formula method, technique, program orprocess that is used in a
business and has independent economic value?
 CopyRight
 Trade Secret
 Patent
 Trademark
95. Which of the following protects words, names, symbols, sounds or colors that distinguish goods
and services from those manufactured or sold by others?
 Trade Secret
 CopyRight
 Trademark
 Patent

96. In which of the following, a person is constantly followed/chased by another person or


group of several peoples?

A. Phishing
B. Bulling
C. Stalking
D. Identity theft

97. Which one of the following can be considered as the class of computer threats?

A. Dos Attack
B. Phishing
C. Soliciting
D. Both A and C

98. Which of the following is considered as the unsolicited commercial email?

A. Virus
B. Malware
C. Spam
D. All of the above

99. Which of the following usually observe each activity on the internet of the victim, gather
all information in the background, and send it to someone else?

A. Malware
B. Spyware
C. Adware
D. All of the above

100._______ is a type of software designed to help the user's computer detect viruses and
avoid them.

A. Malware
B. Adware
C. Antivirus
D. Both B and C

101. Which one of the following is a type of antivirus program?

A. Quick heal
B. Mcafee
C. Kaspersky
D. All of the above

102. It can be a software program or a hardware device that filters all data packets coming
through the internet, a network, etc. it is known as the_______:

A. Antivirus
B. Firewall
C. Cookies
D. Malware

103. Which of the following refers to stealing one's idea or invention of others and use it for
their own benefits?

A. Piracy
B. Plagiarism
C. Intellectual property rights
D. All of the above

104. Read the following statement carefully and find out whether it is correct about the
hacking or not?

A. No, in any situation, hacking cannot be legal


B. It may be possible that in some cases, it can be referred to as a legal task

105 Which of the following refers to exploring the appropriate, ethical behaviours related to
the online environment and digital media platform?

A. Cyber low
B. Cyberethics
C. Cybersecurity
D. Cybersafety

106. Which of the following refers to the violation of the principle if a computer is no more
accessible?

A. Access control
B. Confidentiality
C. Availability
D. All of the above

107. Which one of the following refers to the technique used for verifying the integrity of the
message?

A. Digital signature
B. Decryption algorithm
C. Protocol
D. Message Digest

108. Which one of the following usually used in the process of Wi-Fi-hacking?

A. Aircrack-ng
B. Wireshark
C. Norton
D. All of the above

109 Which one of the following is actually considered as the first computer virus?

A. Sasser
B. Blaster
C. Creeper
D. Both A and C

110 To protect the computer system against the hacker and different kind of viruses, one
must always keep _________ on in the computer system.

A. Antivirus
B. Firewall
C. Vlc player
D. Script

111. Code Red is a type of ________

A. An Antivirus Program
B. A photo editing software
C. A computer virus
D. A video editing software

112. Which one of the following is also referred to as malicious software?

A. Maliciousware
B. Badware
C. Ilegalware
D. Malware

113. Hackers usually used the computer virus for ______ purpose.

A. To log, monitor each and every user's stroke


B. To gain access the sensitive information like user's Id and Passwords
C. To corrupt the user's data stored in the computer system
D. All of the above

114. In Wi-Fi Security, which of the following protocol is more used?

A. WPA
B. WPA2
C. WPS
D. Both A and C

115. The term "TCP/IP" stands for_____

A. Transmission Contribution protocol/ internet protocol


B. Transmission Control Protocol/ internet protocol
C. Transaction Control protocol/ internet protocol
D. Transmission Control Protocol/ intranet protocol

116. Which of the following statements is correct about the firewall?

A. It is a device installed at the boundary of a company to prevent unauthorized physical


access.
B. It is a device installed at the boundary of an incorporate to protect it
against the unauthorized access.
C. It is a kind of wall built to prevent files form damaging the corporate.
D. None of the above.

117. When was the first computer virus created?

A. 1970
B. 1971
C. 1972
D. 1969

118. Which of the following is considered as the world's first antivirus program?

A. Creeper
B. Reaper
C. Tinkered
D. Ray Tomlinson

119. Which of the following statements is true about the VPN in Network security?

A. It is a type of device that helps to ensure that communication between a device and a
network is secure.
B. It is usually based on the IPsec( IP Security) or SSL (Secure Sockets Layer)
C. It typically creates a secure, encrypted virtual "tunnel" over the open internet
D. All of the above

120. Which of the following type of text is transformed with the help of a cipher algorithm?

A. Transformed text
B. Complex text
C. Scalar text
D. Plain text

121. Which of the following statements is true about the Trojans?

A. Trojans perform tasks for which they are designed or programmed


B. Trojans replicates them self's or clone them self's through an infections
C. Trojans do nothing harmful to the user's computer systems
D. None of the above

122. Which of the following is a type of independent malicious program that never required
any host program?

A. Trojan Horse
B. Worm
C. Trap Door
D. Virus

123. In an any organization, company or firm the policies of information security come
under__________

A. CIA Triad
B. Confidentiality
C. Authenticity
D. None of the above

124. Why are the factors like Confidentiality, Integrity, Availability, and Authenticity
considered as the fundamentals?

A. They help in understanding the hacking process


B. These are the main elements for any security breach
C. They help to understand the security and its components in a better
manner
D. All of the above

125. In order to ensure the security of the data/ information, we need to ____________ the
data:

A. Encrypt
B. Decrypt
C. Delete
D. None of the above

126. Which of the following known as the oldest phone hacking techniques used by hackers
to make free calls?

A. Phreaking
B. Phishing
C. Cracking
D. Spraining

127.. A ______________ tries to formulate a web resource occupied or busy its users by
flooding the URL of the victim with unlimited requests than the server can handle.
A. Phishing attack
B. DoS attack
C. Website attack
D. MiTM attack

128.During a DoS attack, the regular traffic on the target _____________ will be either
dawdling down or entirely interrupted.
A.network
B. system
C. websit e
D. router

129. DoS is abbreviated as _____________________


A.Denial of Service
B.Distribution of Server
C.Distribution of Service
D.Denial of Server

130.. A DoS attack coming from a large number of IP addresses, making it hard to manually
filter or crash the traffic from such sources is known as a _____________
A. GoS attack
B. PDoS attack
C.DoS attack
D. DDoS attack

131. DDoS stands for _________________


A.Direct Distribution of Server
B.Distributed Denial of Service
C. Direct Distribution of Service
D. Distributed Denial of Server

132..Application layer DoS attack is also known as _______________


A.Layer4 DoS attack
B. Layer5 DoS attack
C Layer6 DoS attack
D. Layer DoS attack

133.. A ___________ is a small malicious program that runs hidden on infected system.
A. Virus
B. Trojan
C.Shareware
D. Adware

134. ____________ works in background and steals sensitive data.


A.Virus
B. Shareware
C. Trojan
D. Adware

135.Trojans can not ______________


A.steal data
B. self-replicate
C.steal financial information
D. steal login credentials
136 A _______________ provides malicious users remote control over the targeted
computer.
A.DDoS-Trojan
B. Backdoor Trojan
C.Trojan-Banker
D. Trojan-Downloader

137.______________ is an internet scam done by cyber-criminals where the user is


convinced digitally to provide confidential information.
A.Phishing attack
B. DoS attack
C. Website attack
D. MiTM attack

138. Phishers often develop ______________ websites for tricking users & filling their
personal data.
A. legitimate
B. illegitimate
C. genuine
D. official

139 _____________ = voice + phishing.


A.Algo-based phishing
B. Vishing
C.Domain Phishing
D. Email-based phishing

140. Which of the following is not a technique used by spanners?


A. Spoofing the domain
B.Sending attached virus in spams
C. Junk tags associated with spam-emails
D. Making important deals through such emails

141. ___________ are used which crawl web pages looking for email Ids and copies them to
the database.
A. Caches
B. Cookies
C. Bots
D. Spiders

142.Which of the following is not a type of spamming attack?


A. Page-jacking
B.Image spamming
C. Spear phishing
D. Blog & wiki spamming

143.Which of the following is an “intellectual property” as per IPR Laws in India.

A.Original literary work


B.Industrial Design of Maruti800 car
C. Trademark of Tata company
D. All the above

144. A company wishes to ensure that no one else can use their logo.

A. Copy rights
B. Trade mark
C. Patent
D.Industrial designs

145. A singer wishes to assign the rights to reproduce a video she has made of her
concert.

A.. Copy rights


B. Trade mark
C. Patent
D.Industrial designs

146 .Which of the following describes e-commerce?


A. Doing business electronically
B. Doing business
C. Sale of goods
D. All of the above

147. Which of the following is part of the four main types for e-commerce?
A. B2B
B. B2C
C. C2B
D. All of the above

148. Which segment do Amazon.com belong?


A. B2Bs
B. B2Cs
C. C2Bs
D.C2Cs
149. Which type deals with auction?
A. B2B
B. B2C
C. C2B
D. C2C

150. The best products to sell in B2C e-commerce are:


A. Small products
B. Digital products
C. Specialty products
D. Fresh products
151. E-commerce involves
A. marketing
B. advertising
C. inventory management
D. all of the above

152. What are plastic cards the size of a credit card that contains an embedded chip on
which digital information can be stored?
A. Customer relationship management systems cards
B. E-government identity cards
C. FEDI cards
D. Smart cards

153. Which of the following are advantages normally associated with B2B e- commerce?
A. Shorter cycle times
B. Reduction in costs
C. Reaches wider audiences
D. all of the above

154. If the threat of substitute products or services is low it is a(n):


A. Disadvantage to the supplier
B. Advantage to the buyer
C. Advantage to the supplier
D. None of the above
155. If it is easy for competitors to enter the market, the threat of new entrants is considered:
A. High
B. Low
C.More
D. Less

156. Paisapay is facilitated in


A. eBay.co.in
B. amazon.com
C. flipkart.com
D. none of the above
157. Which of the following is a useful security mechanism when considering business strategy
and IT?
A. encryption
B. decryption
C. firewall
D. all the above

158. Which of the following is not related to security mechanism?


A. encryption
B. decryption
C. e-cash
D. all the above
159 . How the transactions occur in e-commerce?
A. Using e-medias
B. Using computers only
C. Using mobile phones only
D. None of the above

160. A business competing in a commodity like environment must focus on which of the
following?
A. Price
B. Ease / speed of delivery
C. Ease of ordering
D. all of the abov

161. Which of the following is a method of transferring money from one persons account
to another?
A. electronic check
B. credit card
C. e-cash
D. none of the above
162. A combination of software and information designed to provide security and information for
payment is called a?
A. digital wallet
B. pop up ad
C. shopping cart
D. encryption

163. What is the name for direct computer-to-computer transfer of transaction information
contained in standard business documents?
A. internet commerce
B. e-commerce
C. transaction information transfer

D. electronic data interchange

164. Public key encryption uses multiple keys. One key is used to encrypt data, while
another is used to decrypt data. The key used to encrypt data is called______ key and the key
used to decrypt data is called the______key.

A. encryption, decryption
B. private, public
C. encryption, public
D.public, private

165. Secure Sockets Layers does which of the following?


A. creates a secure, private connection to a web server
B. encrypts information
C. sends information over the internet
D. all of the above

166. When a transaction is processed online, how can the merchant verify the customers identity?
A. use secure sockets layers
B. use secure electronic transactions
C. use electronic data interchange
D. use financial electronic data interchange

167. The practice of forging a return address on an e-mail so that the recipient is fooled into
revealing private information is termed?
A. hacking
B. cracking
C. dumpster diving
D. spoofing

168.Which will not harm computer?


A. Firewall

B. Virus
C. Trojan horse
D. None of the above
169. Who breaks into other peoples computer systems and steals and destroys information?
A. Hackers
B. softwares
C. Hacktivists
D. Script kiddies

170. What is a type of virus that spreads itself, not just from file to file, but from computer to
computer via e-mail and other Internet traffic?
A. Computer virus
B. Worm
C. Denial-of-service attack
D. None of the above

171. What floods a Web site with so many requests for service that it slows down or crashes?
A. Computer virus
B. Worm
C. Denial-of-service attack
D. None of the above

172. Unsolicited Bulk E-mails (UBI) are called __________


A. SMS
B.MMS
C.Spam emails
D. Malicious emails

173. Fraudulent email messages are some fake email messages that seem to come from legitimate
source is called
A.Email Forging
B.Email Spoofing
C.Email Spamming
D.Email Bombing

174 What does local on ramp consist of?

A. Global information distribution network


B. Satellite network
C. Telecom cable
D. None of above

175.A company wishes to ensure that no one else can use their logo. Then it is called the
A. Copy rights
B. Trade mark
C. Patent
D. Industrial designs

176. A singer wishes to assign the rights to reproduce a video she has made of her concert.
(a). Copy rights
(b). Trade mark
(c). Patent
(a). Industrial designs

177. Which of the following statements is true?


(a). Trademark registrations can be renewed for an unlimited number of tenyear
periods
(b). Trademark law is intended to protect the owner’s original work
(c). To qualify for federal protection, a mark must be distinctive and have a "secondary
meaning."
(d). Surnames alone can be trademarked (Ans:a)

178.The rights of a patentee are


(a). Sell or distribute
(b). License
(c). Assign the property to others
(d). All of the above

179. What port does Telnet use?


A. 22
B. 80
C. 20
D. 23

=
180. The dimension of e-commerce that enables commerce across national
boundaries is called .
A. interactivity

Ans B. global reach

C. richness

D. ubiquity

181. Which of the following describes e‐commerce?


Ans A. Doing business electronically

B. Doing business

C. Sale of goods

D. All of the above

182. Which one of the following is not one of the major types of e-commerce?
Ans A. C2B

B. B2C

C. B2B

D. C2C

183. Which of the following is part of the four main types for e‐commerce?
A. B2B

B. B2C

C. C2B

Ans D. All of the above

184. Which segment do eBay, Amazon.com belong?


A. B2Bs
Ans B. B2Cs

C. C2Bs

D. C2Cs

185. Which type of e‐commerce focuses on consumers dealing with each other?
A. B2B

B. B2C

C. C2B

Ans D. C2C

186. Which segment is eBay an example?


A. B2B

B. C2B

C. C2C

Ans D. None of the above

187. All of the following are technologies used to gather information about you
online except .

A. spy ware

B. cookies

C. Gmail

Ans D. anonymizers

188. The best products to sell in B2C e‐commerce are:


A. Small products

Ans B. Digital products


C. Specialty products

D. Fresh products

189. Which products are people most likely to be more uncomfortable buying on
the Internet?
A. Books

Ans B. Furniture

C. Movies

D. All of the above

190. The source of revenue in a subscription revenue model is .


A. Fees from advertisers in exchange for advertisements

B. Fees for business referrals

Fees from subscribers in exchange for access to content or


Ans C.
services

D. Fees for enabling or execution a transaction

191 Which products are people most likely to be comfortable buying on the Internet?
A. Books

B. PCs

C. CDs

Ans D. All of the above

192 Which of the following is an example of a portal?


A. Amazon

B. eBay
Ans C. Yahoo

D. Face book

193. All of the following are major B2C business models except .
A. content provider

Ans B. industry consortium

C. transaction broker

D. service provider

194. The solution for all business needs is.


A. EDI

Ans B. ERP

C. SCM

D. None of the above

195. Compared to Internet users, the number of cell phone subscribers is .


A. about the same

B. slightly fewer

C. much fewer

Ans D. much larger

196. Which term represents a count of the number of people who visit one site,
click on an ad, and are taken to the site of the advertiser?
A. Affiliate programs

Ans B. Click‐through

C. Spam
D. All of the above

197. What is the percentage of customers who visit a Web site and actually
buy something called?
A. Affiliate programs

B. Click‐through

C. Spam

Ans D. Conversion rate

198. What is the process in which a buyer posts its interest in buying a certain
quantity of items, and sellers compete for the business by submitting successively
lower bids until there is only one seller left?
A. B2B marketplace

B. Intranet

Ans C. Reverse auction

D. Internet

199. What are plastic cards the size of a credit card that contains an embedded chip
on which digital information can be stored?
A. Customer relationship management systems cards

B. E‐government identity cards

C. FEDI cards

Ans D. Smart cards

200. Most individuals are familiar with which form of e‐commerce?


A. B2B

Ans B. B2C
C. C2B

D. C2C

201. Which form of e‐commerce currently accounts for about 97% of all e‐commerce
revenues?
Ans A. B2B

B. B2C

C. C2B

D. C2C

202. Which of the following are advantages normally associated with B2B e‐
commerce?
A. Shorter cycle times

B. Reduction in costs

C. Reaches wider audiences

Ans D. all of the above

203. The threat of new entrants is high when it is:


A. Hard for customers to enter the market

B. Hard for competitors to enter the market

Ans C. Easy for competitors to enter the market

D. Easy for customers to enter the market

204. Paisapay is facilitated in.


Ans A. eBay.co.in

B. amazon.com
C. flipkart.com

D. none of the above

205. Which of the following is a useful security mechanism when considering


business strategy and IT?
A. encryption

B. decryption

C. firewall

Ans D. all the above

206. Which of the following is not related to security mechanism?


A. encryption

B. decryption

Ans C. e‐cash

D. all the above

207. Which of the following statements accurately reflect the impact of technology?
A. Technology has caused buyer power to increase

B. Technology has lessened the entry barriers for many industries

Technology has increased the threat of substitute products and


C.
services

Ans D. all of the above

208. Which of the following was the first commercial Web browser?
A. Mosaic

B. Mozilla
Ans C. Netscape Navigator

D. Internet Explorer

209. A business cannot be all things to all people. Instead, a business must:
A. Identify target customers

B. Identify the value of products/services as perceived by customers

Ans C. all of the above

D. None of the above

210. How the transactions occur in e‐commerce?


Ans A. Using e‐medias

B. Using computers only

C. Using mobile phones only

D. None of the above

211. Which type of products is lesser purchased using eCommerce?


Ans A. automobiles

B. books

C. softwares

D. none

212. A business competing in a commodity like environment must focus on which of


the following?
A. Price

B. Ease / speed of delivery

C. Ease of ordering
Ans D. all of the above

213. The dominant Web server software is .


A. Zeus

Ans B. Apache

C. Microsoft IIS

D. Google

214. Which of the following refers to creating products tailored to individual


customers?
Ans A. customization

B. aggregation

C. Direct materials

D. Reverse auction

215. What Web server functionality allows it verify usernames and passwords and
process certificates and encryption information?
A. Processing of HTTP requests

B. File Transfer Protocol

C. Data capture

Ans D. Security services

216. The underlying computing equipment that the system uses to achieve its
e- commerce functionality is called a .
Ans A. hardware platform

B. content platform

C. transaction platform
D. scalability platform

217. Amazon.com is well‐known for which e‐commerce marketing technique?


A. Banner ads

B. Pop‐up ads

Ans C. Affiliate programs

D. Viral marketing

218. Redundant navigation refers to .


pages that work, load quickly, and point the customer toward your
A.
product offerings

B. simple, fool-proof navigation

C. a site working with the most popular browsers

Ans D. alternative navigation to the same content

219. What is the name given to an interactive business providing a centralized


market where many buyers and suppliers can come together for e‐commerce or
commerce‐ related activities?
A. Direct marketplace

B. B2B

C. B2C

Ans D. Electronic marketplace

220. The set of standards for communication between a browser and a program
running on a server that allows for interaction between the user and the server is
known as .
A. Active Server Pages (ASP)

B. Java Server Pages (JSP)


Ans C. Common Gateway Interface (CGI)

D. VBScript

221. Which form of e‐marketplace brings together buyers and sellers from multiple
industries, often for MRO materials?
Ans A. horizontal

B. Vertical

C. Integrated

D. Inclined

222. Which form of e‐marketplace brings together buyers and sellers from the same
industry?
A. horizontal

Ans B. Vertical

C. Integrated

D. Inclined

223. The ability to change the product to better fit the needs of the customer is called
.
Ans A. customization

B. personalization

C. privacy

D. accessibility

224. Which type of add appears on a web page?


A. pop‐under ad

B. Pop‐up ad
Ans C. Banner ad

D. Discount ad

225. What type of ad appears on top of a web page?


A. pop‐under ad

Ans B. pop‐up ad

C. banner ad

D. discount ad

226. What type of ad appears under a web page?


Ans A. pop‐under ad

B. pop‐up ad

C. banner ad

D. discount ad

227. Which, if any, of the following types of ads are people most willing to tolerate?
A. pop‐under ad

B. pop‐up ad

C. banner ad

Ans D. none of the above

228. In the e-commerce security environment, which of the following constitutes


the inner-most layer?
A. people

Ans B. data

C. technology solutions
D. organizational policies and procedures

229. All of the following are major categories of computer viruses except .
A. Macro viruses

B. File-infecting viruses

C. Script viruses

Ans D. Trojan viruses

230. A worm is designed to spread .


Ans A. from computer to computer

B. from file to file on a computer

C. from Web site to Web site

D. from Web site to computer

231. Which of the following is a method of transferring money from one


person's account to another?
Ans A. electronic check

B. credit card

C. e‐transfer

D. none of the above

232. Malicious hackers who act with the intention of causing harm are .
A. White hats

Ans B. Black hats

C. Grey hats

D. Brown hats
233 An electronic check is one form of what?
A. e‐commerce

Ans B. online banking

C. e‐cash

D. check

234. When hackers flood a Web site with useless traffic to overwhelm the network,
it is called .
A. phishing

B. pharming

Ans C. a Denial of Service (DoS) attack

D. spoofing

235. If you need to transfer money to another person via the internet, which of the
following methods could you use?
A. financial cybermediary

B. electronic check

C. electronic bill presentment and payment

Ans D. all of the above

236. Which of the following is not a dimension of e-commerce security provided


by encryption?
Ans A. availability

B. message integrity

C. nonrepudiation

D. confidentiality
237. Which of the following permits the transmission of a bill, along with payment of
that bill, to be conducted over the Internet?
A. financial cybermediary

B. electronic check

Ans C. electronic bill presentment and payment

D. all of the above

238. The most widely used encryption standard is .


Ans A. Advanced Encryption Standard (AES)

B. Data Encryption Standard (DES)

C. Universal Encryption Standard (UES)

D. Optimal Encryption Standard (OES)

239. A combination of software and information designed to provide security and


information for payment is called a what?
Ans A. digital wallet

B. pop up ad

C. shopping cart

D. encryption

240. The most common form of securing channels is through .


A. S-HTTP

B. VPNs

Ans C. SSL

D. PPTP
241. What is the name for direct computer‐to‐computer transfer of transaction
information contained in standard business documents?
A. internet commerce

B. e‐commerce

C. transaction information transfer

Ans D. electronic data interchange

242. Firewalls perform all of the following functions except .


A. Forbids communications from untrustworthy sources

B. Allows communications from trustworthy sources

Ans C. Eliminates viruses and other malicious attacks

D. Filters traffic based on packet attributes

243. Which of the following is used in B2B to pay for purchases?


A. e‐commerce

Ans B. financial electronic data interchange

C. electronic data exchange

D. electronic checks

244. Public key encryption uses multiple keys. One key is used to encrypt data,
while another is used to decrypt data. The key used to encrypt data is called the
key, while the key used to decrypt data is called the key.
A. encryption, decryption

B. private, public

C. encryption, public

Ans D. public, private


245. The only payment system that is instantly convertible without intermediation is
.
A. Credit card

B. Accumulating balance

C. Stored value

Ans D. Cash

246. Secure Sockets Layers does which of the following?


A. creates a secure, private connection to a web server

B. encrypts information

C. sends information over the internet

Ans D. all of the above

. The most prevalent online payment method is .


A. PayPal

B. checks

Ans C. credit cards

D. debit

247. The practice of forging a return address on an e‐mail so that the recipient is
fooled into revealing private information is termed?
A. hacking

B. cracking

C. dumpster diving

Ans D. spoofing
248. influence the behavior of others through their personality, skills, or
other factors.
Ans A. Opinion leaders

B. Direct reference groups

C. Indirect reference groups

D. Lifestyle groups

249. What is an internal organizational Internet that is guarded against outside


access by a special security feature called a firewall (which can be software,
hardware, or a combination of the two)?
A. Client/server network

Ans B. Intranet

C. Extranet

D. Thin client

250. What is an intranet that is restricted to an organization and certain


outsiders, such as customers and suppliers?
A. Client/server network

B. Intranet

Ans C. Extranet

D. Thin client

251. The process of getting customers to pass along a company's


marketing message to friends, family, and colleagues is known as .
A. affiliate marketing

Ans B. viral marketing

C. permission marketing

D. blog marketing
252. Creating multiple versions of information goods and selling essentially the
same product to different market segments at different prices is called .
Ans A. versioning

B. bundling

C. transactive content

D. price discrimination

253. All of the following are examples of intelligent agent technology except
.

A. automated response systems

B. automatic shipping confirmation

C. order status reports

Ans D. online web bugs

254. Which factor represents how well your system can adapt to increased demands?
A. Availability

B. Accessibility

C. Reliability

Ans D. Scalability

255. What determines the future IT infrastructure requirements for new equipment
and additional network capacity?
A. Flexibility

B. Performance

Ans C. Capacity planning


D. Benchmark

256. The fastest growing form of online advertising is .


A. banner ads

B. pop-up ads

Ans C. rich media/video ads

D. pop-under ads

257. All of the following are among the most common categories of spam except
.
Ans A. fraud

B. commercial products

C. finance

D. health (drugs)

258. All of the following are types of social marketing except .


Ans A. affiliate marketing

B. blog advertising

C. social network advertising

D. game advertising

259. Which of the following measures the percentage of people exposed to an online
advertisement who actually click on the banner?
A. impression rate

B. view-through rate

Ans C. click-through rate


D. stickiness ratio

260. Which of the following is a measure of the percentage of purchasers who return
to a Web site within a year?
Ans A. loyalty

B. reach

C. recency

D. unique visitors

261. As consumers become more accustomed to new online advertising


formats, click-through rates tend to .
A. remain constant

Ans B. decrease

C. increase

D. rapidly increase

262. Which of the following is the primary characteristic of an intranet?


A. People outside the organization can access it

B. People inside the organization can't access it

Ans C. People outside the organization can't access it

D. None of the above

263. Which of the following statements about privacy is true?


Ans A. It is a moral right to be left alone

B. Only corporations and government need to be concerned about it

C. It has only just recently become a concern


D. It is most easily obtained on the Internet

264. Which process can prevent data from lose due to computer problems or
human errors?
Ans A. backup

B. recovery

C. benchmarking

D. data cleansing

265. Which process is used to reinstall data from a copy when the original data
has been lost?
A. backup

Ans B. recovery

C. benchmarking

D. data cleansing

266. A patent grants the owner an exclusive monopoly on the ideas behind
the invention for years.
A. 10

Ans B. 20

C. 30

D. 40

268 The number of business methods patents granted is compared to


the number of patents applied for.
Ans A. substantially smaller

B. slightly smaller
C. close to equal

D. equal

269. Who protects system from external threats?


Ans A. firewall

B. EDI

C. ERP

D. Script kiddies

270. The redirection of traffic from a legitimate site to an infringing site is called
.
A. cyber squatting

Ans B. cyber piracy

C. meta tagging

D. key wording

271. Who breaks into other people's computer systems and steals and destroys
information?
Ans A. Hackers

B. softwares

C. Hacktivists

D. Script kiddies

272. All of the following are types of intellectual property protection except .
A. patents

B. trademarks
Ans C. governance

D. copyrights

273. What is a type of virus that spreads itself, not just from file to file, but
from computer to computer via e‐mail and other Internet traffic?
A. Computer virus

Ans B. Worm

C. Denial‐of‐service attack

D. None of the above

274. All of the following are challenges to online retail except .


A. Consumer concerns about the security of transactions

Consumer concerns about the privacy of personal information given


B.
to Web sites

C. Delays in delivery of goods when compared to store shopping

Ans D. Inability to change prices nearly instantly

275. What floods a Web site with so many requests for service that it slows down
or crashes?
A. Computer virus

B. Worm

Ans C. Denial‐of‐service attack

D. None of the above

276. Which of the following is an industry strategic factor that relates to whether
new entrants face a disadvantage when attempting to enter an industry?
Ans A. barriers to entry
B. power of suppliers

C. power of consumers

D. industry value chain

277. What is the process of making a copy of the information stored on a computer?
Ans A. Backup

B. Anti‐virus

C. Firewall

D. Biometrics

278. What software detects and removes or quarantines computer viruses?


A. Backup

Ans B. Anti‐virus

C. Firewall

D. Biometrics

279. What is hardware and/or software that protects computers from intruders?
A. Backup

B. Anti‐virus

Ans C. Firewall

D. Biometrics

280. What is the use of physical characteristics — such as your fingerprint, the blood
vessels in the retina of your eye, the sound of your voice, or perhaps even your
breath — to provide identification?
A. Backup
B. Anti‐virus

C. Firewall

Ans D. Biometrics

281. What scrambles the contents of a file so you can't read it without having the
right decryption key?
Ans A. Encryption

B. Intrusion‐detection software

C. Security‐auditing software

D. All of the above

282. What is an encryption system that uses two keys: a public key that everyone
can have and a private key for only the recipient?
A. Encryption

Ans B. Public key encryption

C. Intrusion‐detection software

D. Security‐auditing software

283. Which of the following is not a type of media convergence?


A. technological convergence

B. content convergence

C. industry convergence

Ans D. community convergence

284. What looks for people on the network who shouldn't be there or who are acting
suspiciously?
A. Encryption
B. Public key encryption

Ans C. Intrusion‐detection software

D. Security‐auditing software

285. What checks out your computer or network for potential weaknesses?
A. Encryption

B. Public key encryption

Ans C. Security‐auditing software

D. None of the above

286. The combination of technical and legal means for protecting digital content from
unlimited reproduction without permission is known as .
Ans A. Digital rights management

B. Digital protection schemes

C. Digital distribution regulation

D. Digital rights protection

287. In simple terms, what does risk assessment ask?


A. What can go wrong?

B. How likely is it to go wrong?

C. What are the possible consequences if it does go wrong?

Ans D. All of the above

288. Which of the following is a characteristic of a firewall?


A. Examines each message as it seeks entrance to the network
Blocks messages without the correct markings from entering the
B.
network

Detects computers communicating with the Internet without


C.
approval

Ans D. All of the above

289. Which of the following are ways to prove access rights?


A. What you know, like a password

B. What you have, like an ATM card

C. What you look like

Ans D. All of the above

290. Which item can a password be used to protect?


A. Network

B. File

C. Folder

Ans D. All of the above

291 All of the following are characteristics of a social network except .


A. involves a group of people

B. features shared social interaction

Ans C. always feature shared goals and purposes

D. common ties among members

292. Social networking sites primarily earn their revenue through .


Ans A. advertising
B. subscriptions

C. donations

D. service fees

293. Which of the following applies to the implementation of an idea?


A. Copyright

B. Intellectual property

Ans C. Patent

D. Denial‐of‐service attack

294. The type of social network described as a community built around a common
interest such as games, sports, music, and so on is called .
A. general community

B. practice network

C. affinity community

Ans D. interest-based social network

295. Auction sites like eBay tend to use pricing.


Ans A. dynamic

B. fixed

C. trigger

D. utilization

296. Which of the following is not a dimension of privacy?


A. Need for personal space

B. Need to feel in control of our possessions


C. Need to feel in control of our personal information

Ans D. All of the above are dimensions of privacy

297. Which of the following examines information passing through switches, hubs,
or routers?
A. Key logger

Ans B. Packet sniffer

C. Log analysis tools

D. Screen captures

298. A dynamically priced market that features few buyers and many sellers is a
market that exhibits .
A. market neutrality

Ans B. buyer bias

C. seller bias

D. owner bias

299. E‐mail messages may be stored on which of the following computers?


A. Sender's computer

B. Sender's server

C. Recipient's server

Ans D. All of the above

300. What might identity thieves do with your identity?


A. Apply for and use credit cards

B. Apply for a loan


C. Change their identity

Ans D. All of the above

301 Which of the following is not a common approach to phishing?


A. Send an official‐looking e‐mail asking for confidential information

Ans B. Ask people to fill out and return a fake letter using postal mail

Ask people to click a link in an e‐mail to open a submission form


C.
on a web page

D. All of the above are uncommon approaches to phishing

302. Which of the following portal revenue models involves charging for premium
content?
A. ISP services

B. General advertising

Ans C. Subscription fees

D. Tenancy deals

303. A technique used to gain personal information for the purpose of identity theft,
often by e‐mail, is called?
A. Phishing

B. Carding

C. Brand spoofing

Ans D. All of the above

304. Cookies are used to do which of the following?


A. Store your ID and password for subsequent logons to the site

B. Store contents of electronic shopping carts

C. To track web activity


Ans D. All of the above and more

305. All of the following are potential benefits of B2B e-commerce except .
Ans A. reduced amount of 'first-mover' advantages

B. decreased product cycle time

increased opportunities for collaborating with suppliers and


C.
distributors

D. increased production flexibility

306. Unsolicited e‐mail is called what?


A. Junk mail

Ans B. Spam

C. Extra mail

D. None of the above

307. What is the legal protection afforded an expression of an idea, such as a song,
video game, and some types of proprietary documents?
A. Ethics

B. Intellectual property

Ans C. Copyright

D. Fair Use Doctrine

308. What is the unauthorized use, duplication, distribution or sale of copyrighted


software?
A. Fair Use Doctrine

Ans B. Pirated software

C. Counterfeit software

D. Privacy
309. What is a program, when installed on a computer, records every keystroke and
mouse click?
Ans A. Key logger software

B. Hardware key logger

C. Cookie

D. Adware

310. What is an electronic representation of cash?


A. Digital cash

B. Electronic cash

C. E‐cash

Ans D. All of the above

311. The E-commerce domain that involves business activity initiated by the
consumer and targeted to businesses is known as .
A. Business to Business (B2B)

B. Consumer to Consumer (C2C)

Ans C. Consumer to Business (C2B)

D. Business to Consumer (B2C)

312. Smart card is better protected than other cards using.


Ans A. Encryption

B. Firewall

C. Hub

D. All the above

313. Trust card is introduced by.


Ans A. BSNL and itzcash

B. BSNL and oxicash

C. BSNL only

D. None

314. Which one is also known as plastic money?


Ans A. Credit card

B. Debit card

C. Paper cash

D. All of the above

315. Digital signature is a.


A. Digital id,send as an attachment to a web page/e‐mail/message

B. Is used for verifying the attachments send using web

Ans C. Both a and b

D. None of these

316. The presence of ‐‐‐‐‐‐‐‐‐‐‐ make the smart card smart.


A. Memory

Ans B. Microchip

C. E‐cash

D. None of the above

317. The smart card which use antenna for reading and writing data.
A. Contact smart card

B. Contactless smart card


C. Proximity smart card

Ans D. Both B and C

318. ‐‐‐‐‐‐‐‐‐ card is read only mode.


A. Contact smart card

B. Contactless smart card

Ans C. Proximity smart card

D. Both B and C

319. Which of the smart card uses a sim like structure for reading and writing data?
Ans A. Contact smart card

B. Contactless smart card

C. Proximity smart card

D. Both B and C

320. Which one is the third party payment providers who offer digital wallets for E‐
merchants?
A. Oxicash

B. PayMate

C. PayPass

Ans D. All the above

321. Which one is not a encryption technique?


A. RSA

B. DES

C. AES

Ans D. NONE OF THE ABOVE


322 Which one is not used as a security mechanism?
A. Encryption

B. Cryptography

Ans C. Wallets

D. Digital signature

323 Which e‐government arena is being used when governmental agencies send
out and accept bids for work?
A. G2G

Ans B. G2B

C. G2C

D. G2G

324. Which one is communication channel threat?


A. Sniffer programs

B. Cyber vandalism

C. Integrity threats

Ans D. All of the above

325. Which one is communication channel security protocol?


A. SSL

B. S‐HTTP

C. SET

Ans D. ALL OF THE ABOVE

326. The protocol which allows the file transfer between computers is.
A. TCP/IP

Ans B. FTP

C. HTTP

D. SOA

327. E‐Banking is also known as.


A. ATMs

Ans B. Net banking

C. Traditional banking

D. None of these

328. is backbone of all E‐payments in E‐commerce.


A. EFT

Ans B. EPS

C. PayPal

D. None of these

329. Which one is not an encryption technique?


A. RSA

B. DES

C. AES

Ans D. FTP

330. Which one is an encryption technique?


A. RSA

B. DES
C. AES

Ans D. All of the above

331. Which one is threat for E‐commerce?


Ans A. Trojan horse

B. firewall

C. encryption

D. None

332. Which one is not an offline payment mode?


A. Cash on delivery

B. Cash before delivery

C. Demand drafts

Ans D. e‐cheque

333 Which one is an offline payment mode?


A. Cash on delivery

B. Cash before delivery

C. Credit card

Ans D. Both a and b

334. Which one is not an online payment mode?


Ans A. Cash on delivery

B. Debit card

C. Credit card

D. e‐cheque
335. which one is not an E‐payment method used in India?
A. Debit card

B. Credit card

C. e‐cheque

Ans D. none

336. OTP stands for.


Ans A. One Time Password

B. On Time processing

C. One time processor

D. None

337. Which one is not a threat for E‐commerce?


A. Trojan horse

B. Viruses

C. Worm

Ans D. None

338. Private Key cryptography is also known as cryptography.


A. Public key

Ans B. Symmetric

C. Asymmetric

D. None

339. Public key cryptography is also known as cryptography.


A. Private key

B. Symmetric
Ans C. Asymmetric

D. None

340. What is an arrangement made between e‐commerce sites that direct users from
one site to the other?
A. Spam

B. Viral marketing

Ans C. Affiliate programs

D. None of the above

341. Which will harm computer resources


A. Worm

B. Virus

C. Trojan horse

Ans D. All the above

342. The study of encryption is called .


A. Decryption

Ans B. Cryptography

C. Firewall

D. All the above

343. During E‐commerce transaction we should ensure .


A. Integrity

B. Security

C. Confidentiality

Ans D. All the above


344. The virus that are commonly found in word documents are called .
Ans A. Macro

B. Trojan horse

C. Script virus

D. None of the above

345. The virus that are attached with vb and java files are called.
A. Macro

B. Trojan horse

Ans C. Script virus

D. None of the above

346. The viruses spreads through .


A. Mails

B. Pen drives and cds

C. Websites

Ans D. All the above

1. Which of the following describese‐ commerce?


a. Doing business electronically
b. Doing business
c. Sale of goods
d. All of the above
Answer:A
2. Which of the following is part of the four main types f04‐ commerce?
a. B2B
b. B2C
c. C2B
d. All of the above
Answer:D
3. Which segment do eBay,Amazon.combelong?
a. B2Bs
b. B2Cs
c. C2Bs
d. C2Cs
Answer:B
4. Which type of e‐ commerce focuses on consumers dealing with each other?
a. B2B
b. B2C
c. C2B
d. C2C
Answer:D
5. Which segment is eBay an example?
a. B2B
b. C2B
c. C2C
d. Noneoftheabove
Answer:D
6. Which type deals with auction?
a. B2B
b. B2C
c. C2B
d. C2C

Answer:D
7. In which website GlobalEasy Buy is facilitated?
a. Ebay.com
b. Amazon.com
c. Yepme.com
d. Noneofthese
Answer:A
8. The best products to sellinB2C e‐ commerce are:
a. Small products
b. Digital products
c. Specialty products
d. Fresh products
Answer:B
9. Which products are people most likely to be more uncomfortable buying on the
Internet?
a. Books
b. Furniture
c. Movies
d.Alloftheabove
Answer:B
10. Which products are people most likely to be comfortable buying on
theInternet?
a. Books
b. PCs
c. CDs
d. All of the above
Answer:D
11. Digital products are best suited for B2C e‐ commerce because they:
a. Are commodity like products
b. Can be mass‐ customized and personalized
c. Can be delivered at the time of purchase
d. All of the above
Answer:D
12. The solution for all business needs is
a. EDI
b. ERP
c. SCM
d. None of the above
Answer:B
13. All of the following are techniques B2C e‐ commerce companies use to
attract customers,except:
a. Registering with search engines
b. Viral marketing
c. Online ads
d. Virtual marketing
Answer:D
14. Which is a function of E‐ commerce
a. marketing
b. advertising
c. warehousing
d. all of the above
Answer:D
15. Which is not a function of E‐ commerce
a. marketing
b. advertising
c. warehousing
d. none of the above
Answer:C
16. Which term represents account of the number of people who visit onesite,click
on an ad,and are taken to the site of the advertiser?
a. Affiliate programs
b. Click‐ through
c. Spam
d. All of the above
Answer:B
17. What is the percent age of customers who visit a Website and actually buy
some thing called?
a. Affiliate programs
b. Click‐ through
c. Spam
d. Conversionrate
Answer:D
18. What are materials used in production in a manufacturing company
or rare placed on the shelf or sale in are tail environment?
a. Direct materials
b. Indirect materials
c. EDI
d. None of the above
Answer:A
19. What are materials that are necessary for running a modern corporation,but
do not relate to the company's primary business activities?
a. Direct materials
b. Indirect materials
c. EDI
d. None of the above
Answer:B
20. What are ball point pens purchased by a clothing company?
a. Direct materials
b. Indirect materials
c. EDI
d. None of theabove
Answer:B
21. What is another name for?
a. Direct materials
b. Indirect materials
c. EDI
d. None of the above
Answer:B
22. What is the process in which a buyer posts its interest in buying a certain
quantity of items,and sellers compete for the business by submitting
successively lowerbids until there is only one seller left?
a. B2B marketplace
b. Intranet
c. Reverse auction
d. Internet
Answer:C
23. What are plastic cards the size of a creditcard that contains an embedded chip
on which digital information can be stored?
a. Customer relationship management systems cards
b. E‐ government identity cards
c. FEDI cards
d. Smartcards
Answer:D
24. Most individuals are familiar with which form of e‐ commerce?
a. B2B
b. B2C
c. C2B
d. C2C
Answer:B
25. Which form of e‐ commerce currently accounts for about 97% of all
e‐ commercere venues?
a. B2B
b. B2C
c. C2B
d. C2C
Answer:A
26. Which of the following are advantages normally associated with B2B
e‐ commerce?
a. Shorter cycle times
b. Reduction in costs
c. Reaches wider audiences
d. All of the above
Answer:D
27. If the threat of substitute products or services is low it is a(n):
a. Disadvantage to the supplier
b. Advantage to the buyer
c. Advantage to the supplier
d. None of the above
Answer:C
28. The threat of new entrants is high when it is:
a. Hard for customers to enter the market
b. Hard for competitors to enter the market
c. Easy for competitors to enter the market
d. Easy for customers to enter the market
Answer:C
29. If it is easy for competitors to enter the market,the threat of newentrants is
considered:
a. High
b. Low
c. More
d. Less
Answer:A
30. An industry is less attractive for suppliers when the rivalry among existing
competitors is:
a. High
b. Low
c. More
d. Less
Answer:A
31. Unique value auction is mainly applies to?
a. New products
b. Second hand products
c. Engineering products
d. None of the above
i. Answer:B
32. Paisa pay is facilitated in
a. eBay.co.in
b. amazon.com
c. flipkart.com
d. none of the above
Answer:A
33. Which of the following is a useful security mechanism when considering
business strategy and IT?
encryption
a.
decryption
b.
firewall
c.
all the above
d.
Answer:D
34. Which of the following is not related to security mechanism
a. encryption
b. decryption
c. e‐ cash
d. all the above

Answer:C
35. A productor service that customers have come to expect froman
industry,which must be offered by newentrants if they wish to compete and
survive,is known as a(n)?
a. Switching costs
b. Loyalty programs
c. Entry barriers
d. Affiliate programs
Answer:C
36. Which of the following statements accurately reflect the impact of technology?
a. Technology has caused buyer power to increase
b. Technology has less ened the entry barriers for many industries
c. Technology has increased the threat of substitute products and services
d. All of the above
Answer:D
37. A business can not be all things to all people.Instead,a business must:
a. Identify target customers
b. Identify the value of products/services as perceived by customers
c. All of the above
d. None of the above
Answer:C
38. How the transactions occurin e‐ commerce?
a. Using e‐ medias
b. Using computers only
c. Using mobile phones only
d. None of the above
Answer:A
39. Which type of products is lesser purchased using ecommerce?
a. automobiles
b. books
c. softwares
d. none
Answer:A
40. A business competing in a commodity like environment must focus on which of
the following?
a. Price
b. Ease/speed of delivery
c. Ease of ordering
d. All of the above
Answer:D
41. Which of the following refers to creating products tailor ed to individual
customers?
a. customization
b. aggregation
c. Direct materials
d. Reverse auction
Answer:A
42. Materials used in the normal operation of a business but not related to
primary business operations are called what?
a. Supplies
b. Direct materials
c. Indirect materials
d. Daily stuff
Answer:C
43. Amazon.com is well‐ known for which e‐ commerce marketing technique?
a. Banner ads
b. Pop‐ up ads
c. Affiliate programs
d. Viral marketing
Answer:C
44. What is the name given to an interactive business providing a centralized
market where many buyers and suppliers can come together for e‐ commerce
or commerce‐ related activities?
a. Direct market place
b. B2B
c. B2C
d. Electronic market place
Answer:D
45. Which form of e‐ market place brings together buyers and sellers from multiple
industries,often for MRO materials?
a. horizontal
b. Vertical
c. Integrated
d. Inclined
Answer:A
46. Which form of e‐ market place brings together buyers and sellers from the same
industry?
a. horizontal
b. Vertical
c. Integrated
d. Inclined
Answer:B
47. Which type of add appears on a webpage?
a. pop‐ underad
b. Pop‐ up ad
c. Banner ad
d.Discount ad
Answer:C
48. What type of ad appears on top of a webpage?
a. pop‐ underad
b. pop‐ up ad
c. banner ad
d. discount ad
Answer:B
49. What type of ad appears under a webpage?
a. pop‐ under ad
b. pop‐ up ad
c. banner ad
d. discount ad
Answer:A
50. Which,if any,of the following types of ads are people most willing to tolerate?
a. pop‐ underad
b. pop‐ up ad
c. banner ad
d. none of the above
Answer:D
51. Which of the following is an Internet‐ based company that makes it easy for on
e person to pay another over the Internet?
a. Electronic check
b. Electronic bill presentment and payment
c. Conversion rates
d. Financial cybermediary
Answer:D
52. Which of the following is a method of transferring money from one
person's account toa nother?
a. Electronic check
b. creditcard
c. e‐ transfer
d. none of the above
Answer:A
53. An electronic check is one form of what?
a. e‐ commerce
b. online banking
c. e‐ cash
d. check Answer B
54. If you need to transfer money to another person via the internet,which of
the following methods could you use?
a. Financial cybermediary
b. Electronic check
c. Electronic bill presentment and payment
d. All of the above
Answer:D
55. Which of the following permits the transmission of a bill,along with payment of
that bill,to be conducted over theInternet?
a. Financial cybermediary
b. Electronic check
c. Electronic bill presentment andpayment
d. All of the above
Answer:C
56. A combination of software and information designed to provide security and
information for payment is called a what?
a. Digital wallet
b. Popup ad
c. Shopping cart
d. encryption
Answer:A
57. What is the name for direct computer‐ to‐ computer transfer of
transaction information contained in standard business documents?
a. Internet commerce
b. e‐ commerce
c. transaction information transfer
d. electronic data interchange
Answer:D
58. Which of thefollowing is used in B2B to pay for purchases?
a. e‐ commerce
b. financial electronic data interchange
c. electronic data exchange
d. electronic checks
Answer:B
59. Public key encryption uses multiple keys.One key is used to encryptdata,while
another is used to decrypt data.The key used to encryptdata is called the
key,while the key used to decrypt data is called the key.
a. encryption,decryption
b. private,public
c. encryption,public
d. public,private
Answer:D
60. Secure Sockets Layers does which of the following?
a. Creates a secure,private connection to a webserver
b. Encrypts information
c. Sends information over the internet
d. All of the above
Answer:D
61. When a transaction is processed online,how can the merchant verify the
customer's identity?
a. Use secure sockets layers
b. Use secure electronic transactions
c. Use electronic data interchange
d. Use financial electronic data interchange
e. Answer:B
62. The practice of forging a return address on an e‐ mail so that the
recipientis fooled into revealing private information is termed?
a. hacking
b. cracking
c. dumpster diving
d. spoofing
Answer:D
63. What is a model of a proposed product,service,or system?
a. Prototyping
b. Prototype
c. Proof‐ of‐ concept prototype
d. Selling prototype
Answer:B
64. What is an internal organizational Internet that is guarded against outside
access by a special security feature called a firewall (which can be
software,hardware,or a combination of the two)?
a. Client/server network
b. Intranet
c. Extranet
d. Thinclient
Answer:B
65. What is an intranet that is restricted to an organization and certain
outsiders,such as customers and suppliers?
a. Client/server network
b. Intranet
c. Extranet
d. Thinclient
Answer:C
66. What is a detailed process for recovering information or an IT system in
the event of acatastrophic disaster such as a fire or flood?
a. Disaster recovery plan
b. Hotsite
c. Coldsite
d. Disaster recovery cost curve
Answer:A
67. What is a separate facility that does not have any computer equipment but is a
place where the knowledge workers can move after the disaster?
a. Disaster recovery plan
b. Hotsite
c. Coldsite
d. Disaster recovery costcurve
Answer:C
68. What is a separate and fully equipped facility where the company can move
immediately after the disaster and resume business?
a. Disaster recovery plan
b. Hotsite
c. Coldsite
d. Disaster recovery cost curve
Answer:B
69. Whatcharts(1) the cost to your organization of the unavailability of information
and technology and (2) the cost to your organization of recovering from a
disaster overtime?
a. Disaster recovery plan
b. Hotsite
c. Coldsite
d. Disaster recovery
costcurve
Answer:D
70. Which factor determines when your IT system will be available for
knowledge workers to access?
a. Availability
b. Accessibility
c. Reliability
d. None of the above

Answer:A
71. Which factor determines whoh as the right to access different types of IT
systems and information?
a. Availability
b. Accessibility
c. Reliability
d. Scalability

Answer:B

72. Which factor ensures your IT systems are functioning correctly and
providing accurate information?
a. Availability
b. Accessibility
c. Reliability
d. Scalability

Answer:C

73. Which factor represent show well your system can adapt to increased demands?
a. Availability
b. Accessibility
c. Reliability
d. Scalability

Answer:D

74. Which factor represents a system's ability to change quickly?


a. Flexibility
b. Performance
c. Capacityplanning
d. Benchmark
Answer:A
75. What is a set of conditions used to measure how well a productor system
functions?
a. Flexibility
b. Performance
c. Capacity planning
d. Benchmark
Answer:D
76. What determines the future IT
Infrastructure requirements for new equipment and additional network
capacity?
a. Flexibility
b. Performance
c. Capacityplanning
d. Benchmark
Answer:C

77. What automates business processes?


a. Workflow
b. ASP
c. Workflowsystem
d. EIP
Answer:C
78. What defines all of the steps or business rules,from beginning to end,required
for a process to run correctly?
a. Workflow
b. EIP
c. Workflowsystem
d. SLA
Answer:A
79. Whats ends work assignments through an email system?
a. Database‐ based enterprise information portal
b. Messaging‐ based enterprise information portal
c. Database‐ based workflow system
d. Messaging‐ based workflow system
Answer:D
80. Which will no tharm computer resources
a. firewall
b. Virus
c. Trojan horse
d. None of the above
Answer:A
81. Which is not a function of ERP?
a. Warehousing
b. sales
c. scheduling
d. None of the above
Answer:D
82. Which is a function of ERP?
a. Warehousing
b. sales
c. scheduling
d. all of the above
Answer:D
83. Which of the following is the primary characteristic of an intranet?
a. People outside the organization can access it
b. People inside the organization can't access it
c. People outside the organization can't access it
d. None of the above
Answer:C
84. Which concept suggests that different applications and computer systems
should be able to communicate with one another?
a. Integration
b. Webservices
c. Scalability
d. Interoperability
Answer:D
85. Which service encom passes all technologies used to transmit and process
information on an acrossa network?
a. Interoperability
b. Scalability
c. Benchmarking
d. Webservices
Answer:D
86. Which process can prevent data from lose due to computer problems or
human errors?
a. backup
b. recovery
c. bench marking
d. data cleansing
Answer:A
87. Which process is used to reinstall data from a copy when the original data has
been lost?
a. backup
b. recovery
c. bench marking
d. data cleansing
Answer:B
88. What describes a process of continuously measuring results and comparing
those results to optimal performances other actual performance may be
improved?
a. Performance
b. Capacity planning
c. Benchmarking
d. Data cleansing
Answer:C
89. Who protects system from external threats?
a. firewall
b. EDI
c. ERP
d. Script kiddies
Answer:A
90. Who breaks into other people's computer systems and steals and destroys
information?
a. Hackers
b. softwares
c. Hacktivists
d. Scriptkiddies
Answer:a
91. What is software that comes hidden in free down loadable software and tracks
your online movements,mines the information stored ony our computer,or uses
your computer's CPU and storage for some task you know nothing about?
a. Weblog
b. Clickstream
c. Anonymous Webbrowsing service
d. None of the above
Answer:D
92. ERP stands for
a. Enterprise resolution planning
b. Enterprise reverse planning
c. Enterprisere source planning
d. None of the above
Answer:C
93. Which is not acomponent of ERP?
a. Legacy systems
b. Bolton applications
c. Operational database
d. Cybersoft
Answer:D
94. Which is not a function of ERP?
a. Human resource management
b. financial
c. warehousing
d. Noneoftheabove
Answer:D
95. What is a type of virus that spreads itself,not just from file to file,but from
computer to computer via e‐ mail and other Internet traffic?
a. Computervirus
b. Worm
c. Denial‐ of‐ serviceattack
d. None of the above
Answer:B
96. What floods a Website with so many requests for service that its lows down or
crashes?
a. Computervirus
b. Worm
c. Denial‐ of‐ serviceattack
d. None of the above
Answer:C
97. What harnesses far‐ flung computers together by way of the Internet or a virtual
private network to share CPU power,databases,and database storage?
a. Computer virus
b. Worm
c. Denial‐ of‐ service attack
d. None of the above
Answer:D
98. What consists of the identification of risks or threats,the implementation of
security measures,and them on montoring of those measures for effectiveness?
a. Risk management
b. Risk assessment
c. Security
d. None of theabove
Answer:A
99. What is the process of evaluating ITassets,their importance to the
organization,and their susceptibility to threats,to measure the risk exposure
of these assets?
a. Risk management
b. Risk assessment
Security
c.
d. None of the above

Answer:B
100.
What is the process of making a copyoftheinformationstoredonacomputer?
a. Backup
b. Anti‐virus
c. Firewall
d.
Biometrics

Answer:A
What software detects and removes or quarantines computerviruses?
101.
Backup
a. Anti‐virus
b.
c. Firewall
d. Biometrics
Answer:B
Whati shardware and/or software that protects computers from intruders?
102.
Backup
a. Anti‐virus
b.
c. Firewall
d. Biometrics
Answer:C
103. What is the use of physical characteristics—such as your fingerprint,the
blood vessels in the retina of your eye,the sound of your voice,or perhaps
evenyour breath—to provide identification?
a. Backup
b. Anti‐ virus
c. Firewall
d. Biometrics
Answer:D
104. All of the following are considered biometrics,except:
a. Fingerprint
b. Retina
c. Password
d. Voice
Answer:C
105. Whats crambles the contents of a file so you can't read it without
having the right decryptionkey?
a. Encryption
b. Intrusion‐ detectionsoftware
c. Security‐ auditingsoftware
d. Alloftheabove
Answer:A
106. What is an encryption system that use two keys: a public key that every one can have and a
private keyfor only the recipient?
a.
Encryption
b. Public key encryption
c. Intrusion‐detection software
d. Security‐auditing software

Answer:B
107.suspiciously?
Whatlooksforpeopleonthenetworkwhoshouldn'tbethereorwhoareacting

a. Encryption
PublickeyencryptionIntrusion‐detection
b. softwareSecurity‐auditingsoftware
c.
d.

Answer:C
108.
What checks out your computer or network for potential weaknesses?
a. Encryption
b. Public key encryption Security
c. ‐auditing software
d. Noneoftheabove

Answer:C
109.
Which of the following to viruses harm?
a. Your keyboard
b. Your monitor
c. Your processor
d. Viruses do not har many of the above
Answer: D
110.
Which of the following can a virus do?
a. Hurt yourhardware

Hurt any files they weren't designed to Attack


b.
c. Infect files on write‐protected disks

d. None of the above


Answer:D
111. In simple terms,what does riskassessmen task?

a. What can go wrong?


b. How likely is it to go wrong?
What are the possible consequences if it does go wrong?
c.
d. All of the above

Answer:D
112. Which of the following is a characteristic of a firewall?
Examine seach message as it seeks entrance to the network
a.
b. Blocks messages without the correct markings from entering the network
c. Detects computers communicating with the Internet without approval
d. All of the above

Answer:D
113. Which of the following are ways to prove accessrights?
a. What you know,likeapassword

b. What you have, like an ATMcard


c. What you look like
d. All of th eabove

Answer:D
114. Which item can a password be used to protect?
a. Network

b. File
c. Folder
d.
Alloftheabove
Answer:D
115. Which is the most important component o fIT?
a. Information

b. People
c.
Information technology
d. Computers
Answer:B
116. Which of the following applies to the implementation of an idea?
a. Copyright

b. Intellectualproperty
c. Patent
d. Denial‐ of‐ serviceattack
Answer:C

117. Wheny
a. oupurchasecopyrightedsoftware,whatactuallyareyoupayingfor?Thecostofth
b. eCDs,manuals,anddevelopmentofthesoftware
c.
d. ThecostoftheCDs,manuals,andashareofthecostofthesoftwaredevelopmentAshareo
Answer:D
fthecostofsoftwaredevelopment
Which of the following is not a dimension of privacy?
a. Need for personal space
118.
Alloftheabove
b. Need to feel in control of our possessions
c.
d. Need to feel in control of our personal information

Alloftheabovearedimensionsofprivacy
Answer:D
Which of the following captures screen images?
119. a
Keylogger
a. PacketsnifferLog
b.
c. analysistools
d. Screencapturesoftware
Answer:D
120. Which of the following examines information passing through
switches,hubs,or routers?
a. Keylogger
b. Packetsniffer
c. Log analysis tools
d. Screen captures
Answer:B
121. Whichofthefollowingrecordslogonsanddeletions?
a. Keylogger
b. Packet sniffer
Log analysi stools
c.
d. Screen captures

Answer:C
E‐mail messages may be stored onwhich of the following computers?
122. a Sender'scomputer

a.
b. Sender'sserverRecipient
'sserver
c.
Alloftheabove
d.
Answer:D
What might identity thieves do with your identity?
123.
a
Applyforandusecreditcards
b. Applyforaloan
a.
c. Changetheiridentity
d. Alloftheabove
Answer:D
124. Which of the following is not a common approach to phishing?
a. Send an official‐looking e‐mail asking for confidential information
b. Ask people to fill out and return a fake letter using postalmail
c. Ask people to clicka link in an e‐mail to open a submission form on a webpage
d. All of the above are uncommon approaches to phishing
Answer:B
125. A technique used to gain personal information for the purpose of identity
theft,often bye‐ mail,iscalled?
a. Phishing
b. Carding
c. Brand spoofing
d. All of th eabove
Answer:D
126. Companies can gather information about employees and potential
employees from which of the following places?
a. Job applications
b. Credit reports
c. Companies that track Websurfers
d. All of the above

Answer:D

127. Cyber slacking consists of what activities?


Visiting “inappropriate” websites
a.
b. Visiting news sites
Chatting on line with others about non‐worktopics
c.
Alloftheabove
d.
Answer:D
Cookies are used to do which of the following?
128. Store your ID and password for subsequent log on sto the site
a
. Store contents of electronic shopping carts To
b.
c. track web activity
d. All of the above and more
Answer:D
129. Unsolicitede‐mailiscalledwhat?
a. Junkmail
b. Spam
Extramail
c.
d. Noneoftheabove
Answer:B
What is the name of the new anti‐Spambill?
130. a.
No‐Spam
b.
c. CAN‐SpamSpa
m‐AwayStopS
d. pam

Answer:B

131. What is the legal protection afforded an expression of an idea,such as a song,


game,and some
Vide o types of proprietary documents?
a. Ethics
b. Intellectualproperty
c. Copyright
d. FairUseDoctrine

Answer:C
132. What is the unauthorized use ,duplication,distribution or sale of copyrighted software?
a. Fair Use Doctrine Pirated
b. software
c. Counterfeit
d . softwarePrivacy

Answer:B
133. What is a program,when installed on a computer,records every key stroke and mouse
click?
a. Keyloggersoftware
b. Hardwarekeylogger
c. Cookie
d. Adware
Answer:A
134. What is software you don't want hidden inside software you do want?
a. Adware
b. Trojan‐ horse software
c. Spyware
d. All of the above
Answer:D
135. What is an electronic representation of cash?
a. Digital cash
b. Electronic cash
c. E‐ cash
d. All of the above
Answer:D
136. What is a fully‐ equipped computer that you wear as a piece of clothing or
attached to a
Piece of clothing similar to the way you would carry your cell phone on yourbelt?
a. Wearable computer
b. GPS
c. Implant chip None
d. of the above
Answer:A
137. What is a technology‐enabled microchip implanted in to the humanbody?
a. Wearablecomputer
b. GPS
c. Implantchip
d.
Noneoftheabove

Answer:C

138. Which of the following is not a reason why digital cash has turned out to
be extremely difficult?
a. If your system crashes you lose your money
b. There is only one standard
c. Digital cash makes money laundering easy
d. Digital cash travels across the vast Internet an dissusceptible to
begin stolen
Answer:B
139. Smart card is better protected than other cards using

a. Encryption

b. Firewall

c. Hub

d. All the above

Answer:A
140. Trust card is introduced by
a. BSNLanditzcash

b. BSNL and oxicash


c. BSNLonly
d. None
Answer:A

141. Paisa Pay is offered only by

a. Homeshop18.com

b. eBay.in

c. amazon.com

d. None
Answer:B
142. The E‐payment mechanism widely used in B2B is

a. Creditcard

b. Debitcard

c. Mastercard
d.E‐ chequ
Answer:D
143. Which type of technology will increase portability and mobility?
a. Implant chips
b. Micro‐ payments
c. Internet phone calls
d. All of the above
Answer:D
144. Which of the following an accurate statement about internet phone
calls?
a. They are possible but not yet free
b. They are not possible
c. They are currently standard practice
d. None of the above is an accurate statement about internet
phone calls
Answer:A
145. What are the most commonly used input devices today?
a. Keyboard
b. Mouse
c. All of the above
d. None of the above
Answer:C
146. Which of the following can be used to help identify people in a crowd?
a. Biochip
b. Implant chip
c. Facial recognition software
d. Vision chip
Answer:C
147. Which one is also known as plastic money?
a. Credit card
b. Debit card
c. Paper cash
d. All of th eabove
Answer:A
148. E‐ chequesare…………………
a.Prepaidb.
b Postpaid
c.Both prepaid and postpaid
Answer:A
149. Digital signature is a
a. Digital id,send as an attachment to a webpage/e‐mail/message
b. Isused for verifying the attachments send using web

c. Bothaandb

d. None of these
Answer:C

150. Which one is the component of cyber cash payment system


CC user software
a.
b. CC merachant software
c. CC Server Software
d.
All of the above
Answer:D
151. The presence of ‐‐‐‐‐‐‐‐‐‐‐ make the smart card smart.
a. Meomry

b. Microchip
c. E‐cash
d. None of the above
Answer:B

152. The smart card which use antenna for reading and writing data Contact

a) smartcard

b) Contactles smartcard
c)
Proximity smartcard (d) Both B and C
)
Answer:D
153. ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ card is read only.
a) Contact smart card
b) Contactless smart card
c) Proximity smart card
d) Both B and C
Answer:C

154. Which of the smart card uses a sim like structure for reading and writing data
a) Contact smart card

b) Contactless smart card


c) Proximity smart card
d) BothBandC
Answer:A

155. Which is not a feature of ecommerce

a. SCM
b. EDI
c. WWW
d. BPR
Answer:D
156. What is I stands in CIA of smart card?
a. International
b. Integrity
c. Identity
d. None of the above
Answer:B

157. What is A stands in CIA of smartcard?

a. Auditing
b. Authenticity

c. Authorized

d. Noneoftheabove
Answer:B

158. What is C stands in CIA of smartcard?


A Confidentiality

b. Conference
c. Congress

d. None of the above


Answer:A
159. Which one is the third party payment providers who offer digital
wallets for E‐ merchants
a. Oxicash
b. PayMate
c. PayPass
d. All the above
Answer:D
160. Which is used to identify mobile money

a. MCID
b. MMID

c. RSID
d. NONE OF THE ABOVE
Answer:B

161. ‐‐‐‐‐‐‐‐‐‐‐‐‐‐is an act that poses danger to computer assets.

a. Threat

b. Danger

c. Error

d. Noneoftheabove
Answer:A
162. Which one is not a encryption technique

a. RSA
b. DES

c. AES

d. NONEOFTHEABOVE
Answer:D

163. Which one is not used as a security mechanism?

a. Encryption

b. Cryptography

c. Wallets

d. Digital signature
Answer:C
164. Which e‐ government arenais being used when governmental
agencies send out and accept bids for work?
a) G2G
b) G2B
c) G2C
d) G2G

Answer:B

165. Secret key is used for

a. Public key cryptography

b. Private key cryptography


c. Asymmetric key cryptography

d. None of these
Answer:B

166. Which one is a communication channel threat?

a. Sniffer programs

b. Cyber vandalism

c. Integrity threats

d. All of the above


Answer:D

167. Which one is a communication channel security protocol?

a. SSL

b. S‐HTTP

c. SET

d. ALLOFTHEABOVE

Answer:D

168. The protocol which allows the file transfer between computers is
a. TCP/IP

b. FTP

c. HTTP

d. SOA
Answer:B
169. E‐Bankingisalsoknownas

a. ATMs

b. Netbanking

c. Traditional banking

d. None of these
Answer:B

170. ‐‐‐‐‐‐‐‐‐‐‐‐‐‐ is back bone of all E‐payments in E‐commerce

a. EFT

b. EPS

c. PayPal

d. None of these
Answer:B

171. Whichoneisaclientlevelthreat?

a. Malicious code

b. Viruses

c. Active contents

d. All the above


Answer:D

172. Which one is not an encryption technique?

a. RSA

b. DES

c. AES

d. FTP
Answer:D

173. Which one is an encryption technique?

a. RSA

b. DES

c. AES

d. All of the above


Answer:D

174. Which one is not a server level threat?

a. Malicious code

b. CGI threats
c. Database threats

d. Buffer overflows
Answer:A

175. Which one is not a physical threat?

a. Hacking

b. Storm

c. Phishing

d. None of the above

Answer:A
176. Which one is a physical threat?

a. Phishing

b. Storm

c. Earthquake

d. All the above


Answer:D

177. Which one is a logical threat?

a. Hacking

b. Storm

c. Phishing

d. None of the above

Answer:A

178. The basic elements of website is


a. Homepage

b. Webpages

c. Links and banners

d. All the above


Answer:D

179. Which one is a threat for E‐commerce

a. Trojan horse

b. firewall

c. encryption

d. None
Answer:A

180. Secure communication means

a. Protect transmission of credit card number

b. Guarantee privacy of customer


c. Unauthorized access of payment details

d. All the above


Answer:D

181. Which one is not an offline payment mode?

a. Cash on delivery
b. Cash before delivery

c. Demand drafts

d. e‐cheque
Answer:D

182. Which one is an offline payment mode?

a. Cash on delivery

b. Cash before delivery

c. Creditcard

d. Both a and b
Answer:D
183. Which one is not an online payment mode?

a. Cash on delivery

b. Debitcard

c. Creditcard

d. e‐cheque
Answer:A

184. Which one is an online payment mode?

a. Cashon delivery

b. Cash before delivery

c. Demand drafts

d. e‐cheque
Answer:D

185. Which one is not an E‐payment method used in India

a. Debitcard

b. Creditcard

c. e‐cheque

d. None
Answer:D

186. OTP stands for

a. On Time Password

b. On Time processing

c. One time processor

d. None
Answer:A

187. Which one is not a threat for E‐commerce

a. Trojanhorse

b. Viruses

c. Worm

d. None
Answer:D

188. Private Key cryptogra phyis also known as‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography.

a. Publickey

b. Symmetric
c. Asymmetric

d. None
Answer:B

189. Public key cryptogra phyis also known as‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography.


a. Privatekey

b. Symmetric

c. Asymmetric

d. None
Answer:C
190. What is the legal protection afforded an expression of an idea,such as
a song,videogame,and some types of proprietary documents?
a. Ethics
b. Intellectualproperty
c. Copyright
d. FairUseDoctrine

Answer:C
191. Cyber slacking consists of what activities?
a. Visiting“inappropriate”websites
b. Visiting news sites
c. Chatting online with others about non‐worktopics
d. All of the above
Answer:D
192. What is an arrangement made between e‐ commerce sites that direct
users from one site to theother?

a. Spam
b. Viralmarketing
c. Affiliateprograms
d. Noneoftheabove
Answer:C
193. Which type deals with auction?
a. B2B
b. B2C
c. C2B
d. C2C
Answer:D

194. Which one is not a layer of E‐commerce in frastructure

a. Physical layer

b. Product layer

c. Service layer

d. None
Answer:D

195. Which will harm computer resources


a. Worm
b. Virus
c. Trojanhorse
d. All the above

Answer:D

196. The study of encryption is called‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐ ‐


a. Decryption
b. Cryptography
c. Firewall
d. Alltheabove
Answer:B

197. DuringE‐commercetransactionweshouldensure‐‐‐‐‐‐‐‐‐‐‐‐‐

a. Integrity

b. Security

c. Confidentiality

d. All the above


Answer:D

198. The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐

a. Macro

b. Trojanhorse

c. Scriptvirus

d. None of the above


Answer:A

199. The virus that are attached with vb and java files are called

a. Macro

b. Trojanhorse

c. Scriptvirus

d. None of the above


Answer:C

200. The viruses spreads through‐‐‐‐‐‐‐‐‐‐‐‐‐

a. Mails

b. Pendrives and cds

c. Websites

d. All the above


Answer:D

You might also like