On This Page
This set of E-Commerce Management Multiple Choice Questions & Answers (MCQs) focuses on E Commerce Management Set 5
Q1 | Which is used for transferring money from one bank account to another directlywithout involving cash
- eft
- e-cash
- micropayment
- none
Q2 | Which system provides a service that is paid for prior to usage
- post paid payment system
- prepaid payment system
- spot cash system
- none
Q3 | Which is an electronic medium for making payment
- smart card
- debit card
- e- cash
- all of the above
Q4 | All credit cards are
- smart cash
- post paid cards
- e cash
- none
Q5 | A popular example of E wallet is
- micro soft wallet
- mega soft wallet
- penta soft wallet
- none
Q6 | Which are made for small payment on the web
- mega payments
- micro payments
- spot payment
- all the above
Q7 | Which are used for signing and endorsing electronic changes
- manual signature
- thump impression
- digital signature
- spot signature
Q8 | The two types of credit cards today namely credit cards issued by credit cardcompanies
- master card , visa
- smart card credit card
- debit card, e cash
- none
Q9 | ……………………is a card with a microchip that can be used instead of cashand coins for every thing.
- electronics cash
- fast cash
- electronic purse
- none
Q10 | Prepaid or real-time tokens are exchanged between
- banker and applicant
- payer and drawer
- buyer and seller
- none
Q11 | …………. Is a digital analogue of various forms of payment backed by a bank
- electronics cash
- electronic purse
- electronic tokens
- non e
Q12 | There are two main concerns for using digital coins: anonymity of theconsumer and :-
- prepaid system
- post paid system
- electronic tokens
- online verification
Q13 | SSL is the most widely deployed
- security protocol
- data encryption
- cryptography
- none
Q14 | …………………. Encrypts payment card transaction data and verifies that bothparties in the transaction are genuine.
- ssl
- set
- secret key
- none
Q15 | …………………. Is the process of coding and scrambling of messages toprevent un authorized access to under standing of data being transmitted
- cryptography
- encryption
- security key
- none
Q16 | ………………. Is used to keep transmissions privacy through the use ofdata encryption techniques.
- data encryption
- crytography
- security key
- non e
Q17 | Which refers to the automatic identification (or) identity verification of livingpersons using their enduring physical or behavioral characteristics
- biometrics
- cryptography
- encryption
- none
Q18 | ……………… involves checking to see if the signal is good quality
- transmission
- quality control
- decision
- none
Q19 | The process of encrypted data readable once again is called,
- encryption
- decryption
- uncryption
- none
Q20 | This the process of making information un intelligible to the unauthorized reader
- encryption
- decryption
- uncryption
- none
Q21 | The attacker monitors the data between the shoppers computer and the server
- spoofing
- snoofing
- sniffing
- none
Q22 | The private content of transaction, if unprotected can be intercepted when it gothrough the route over the internet called.
- spoofing
- snooping
- sniffing
- eavesdropping
Q23 | Gain entry into the user’s system and scan your file system for personalinformation is known as
- spoofing
- snooping
- sniffing
- none
Q24 | Creating illegitimate site that appear to published by established organizationsare by this name
- spoofing
- snooping
- sniffing
- none
Q25 | The IT act came into effect on
- 17 may 2000
- 17th december 2000
- 17 oct 2000
- 17 june 2000