On This Page
This set of Digital Business Multiple Choice Questions & Answers (MCQs) focuses on Digital Business Set 5
Q1 | acts like a gate keeper that examines each users identification before allowingthem to enter to the organization’s internal networks.
- Network firewall
- Antivirus
- both of these
- none of these
Q2 | Prevents unauthorized communication into and out of the network, allowing theorganization to enforce a security policy on traffic between its network and the internet.
- Network firewall
- Antivirus
- both of these
- none of these
Q3 | SET means …………………………….
- Standard Electronic Technology
- Standard Electronic Transfer
- Secure Electronic Transaction
- None of these
Q4 | The verification of credit card is done by using… with a communications link to themerchants acquiring bank
- Credit card payment terminal
- Point of Sale
- All of these
- none of these
Q5 | Creating illegitimate sites that appear to be published by established organizationsby unscrupulous artists is termed as………………………….
- Spoofing
- Snooping
- Sniffing
- None of these
Q6 | Gain entry into the user’s system and scan your file system for personal informationis known as……………….
- Spoofing
- Snooping
- Sniffing
- None of these
Q7 | attacks are difficult and are only successful if the attacker knows somethingabout the shopper
- Spoofing
- Snooping
- Sniffing
- Guessing passwords
Q8 | is the process of making information unintelligible to the unauthorized user.
- Spoofing
- Snooping
- Sniffing
- Cryptography
Q9 | is the reverse process of encryption, to make the information readable onceagain
- Spoofing
- Decryption
- Sniffing
- Cryptography
Q10 | A provides a way to associate the message with the sender and is theequivalent of an ordinary signature.
- cyber signature
- Digital signature
- SSL
- none of these
Q11 | A is an electronic file that uniquely identifies individuals and websites on theinternet and enables secure confidential communications
- Digital signature
- Digital certificates
- SSL
- none of these
Q12 | The information Technology Act [IT ACT] came into effect on
- 16th November 2000
- 15th December 2000
- 17th October 2000
- none of these
Q13 | Information sent over the Internet commonly uses the set of rules called………………………..
- TCP/IP
- FTP
- HTTP
- gopher
Q14 | is a person who breaks in or trespasses a computer system
- Hacker
- Snooper
- operator
- spoofer
Q15 | E-mail which contain useless material is termed as………………………
- Spam
- useless mail
- trunk mail
- Junk mail
Q16 | India has enacted the first IT Act in the year……………………………………
- 2001
- 2002
- 2009
- 2000
Q17 | Which of the following crimes were not covered under IT (Amendment) Act, 2008 ?
- Cyber terrorism
- Child pornography
- Video voyeurism
- None of these
Q18 | Trade mark, copyright, patent law etc comes under the purview of……………………
- Data protection
- Telecommunication laws
- Intellectual property laws
- None
Q19 | is a programme designed o replicate and spread generally with the victim beingoblivious to its existence
- hacker
- software
- Computer virus
- none of these
Q20 | Which one of the following is not a principle of e-commerce ?
- privacy
- integrity
- authentication
- none of these