On This Page

This set of E-Commerce Multiple Choice Questions & Answers (MCQs) focuses on E Commerce Set 15

Q1 | ………………is automated methods of recognizing a person based on a physiological orbehavioral characteristic.
  • Biometrics
  • PIN
  • both of these
  • none of these
Q2 | In Biometrics,…………………………ID system is designed to prevent more than one person fromusing a single identity
  • Positive ID system
  • Negative ID system
  • both of these
  • none of these
Q3 | In Biometrics,…………………………ID system is designed to prevent one person from usingmore than one identity
  • Positive ID system
  • Negative ID system
  • both of these
  • none of these
Q4 | …………………..are program developed by some dishonest people to destroy the computersystem and the valuable information in it.
  • Network firewall
  • computer virus
  • both of these
  • none of these
Q5 | Which among the following is not an example for computer virus ?
  • Chernobyl
  • Melissa
  • I Love You
  • None of these
Q6 | ……………………are special type of software meant for limiting the risks of being hit bycomputer viruses
  • Network firewall
  • Antivirus
  • both of these
  • none of these
Q7 | A……………….is a person who gains unauthorized access to a computer network for profit,criminal mischief or personal pleasure.
  • Hacker
  • spoofer
  • operator
  • none of these
Q8 | ……………….acts like a gate keeper that examines each users identification before allowingthem to enter to the organization’s internal networks.
  • Network firewall
  • Antivirus
  • both of these
  • none of these
Q9 | …………..Prevents unauthorized communication into and out of the network, allowing theorganization to enforce a security policy on traffic between its network and the internet.
  • Network firewall
  • Antivirus
  • both of these
  • none of these
Q10 | SET means …………………………….
  • Standard Electronic Technology
  • Standard Electronic Transfer
  • Secure Electronic Transaction
  • None of these
Q11 | The verification of credit card is done by using…………….. with a communications link to themerchants acquiring bank
  • Credit card payment terminal
  • Point of Sale
  • All of these
  • none of these
Q12 | Creating illegitimate sites that appear to be published by established organizations byunscrupulous artists is termed as………………………….
  • Spoofing
  • Snooping
  • Sniffing
  • None of these
Q13 | Gain entry into the user’s system and scan your file system for personal information isknown as……………….
  • Spoofing
  • Snooping
  • Sniffing
  • None of these
Q14 | ………………attacks are difficult and are only successful if the attacker knows somethingabout the shopper
  • Spoofing
  • Snooping
  • Sniffing
  • Guessing passwords
Q15 | …………………is the process of making information unintelligible to the unauthorized user.
  • Spoofing
  • Snooping
  • Sniffing
  • Cryptography
Q16 | ………………….is the reverse process of encryption, to make the information readable onceagain
  • Spoofing
  • Decryption
  • Sniffing
  • Cryptography
Q17 | A………………….provides a way to associate the message with the sender and is theequivalent of an ordinary signature.
  • cyber signature
  • Digital signature
  • SSL
  • none of these
Q18 | A ………………is an electronic file that uniquely identifies individuals and websites on theinternet and enables secure confidential communications
  • Digital signature
  • Digital certificates
  • SSL
  • none of these
Q19 | The information Technology Act [IT ACT] came into effect on
  • 16th November 2000
  • 15th December 2000
  • 17th October 2000
  • none of these
Q20 | Information sent over the Internet commonly uses the set of rules called………………………..
  • TCP/IP
  • FTP
  • HTTP
  • gopher
Q21 | E-mail which contain useless material is termed as………………………
  • Spam
  • useless mail
  • trunk mail
  • Junk mail
Q22 | India has enacted the first IT Act in the year……………………………………
  • 2001
  • 2002
  • 2009
  • 2000
Q23 | Which of the following crimes were not covered under IT (Amendment) Act, 2008 ?
  • Cyber terrorism
  • Child pornography
  • Video voyeurism
  • None of these
Q24 | Trade mark, copyright, patent law etc comes under the purview of……………………
  • Data protection
  • Telecommunication laws
  • Intellectual property laws
  • None
Q25 | ……………….is a programme designed o replicate and spread generally with the victim beingoblivious to its existence
  • hacker
  • software
  • Computer virus
  • none of these