Top 150+ Solved Digital Business MCQ Questions Answer
Q. ……………..is a card with a microchip that can be used instead of cash and coins for everythingfrom vending machines to public transportation.
a. Debit Card
b. Electronic purse
c. credit card
d. any of these
Q. is basically a secure gate between our organization data and internet.
a. Network firewall
b. Antivirus
c. both of these
d. none of these
Q. encrypts payment card transaction data and verifies that both parties in thetransaction are genuine.
a. SSL
b. SET
c. both of these
d. none of these
Q. is automated methods of recognizing a person based on a physiological orbehavioral characteristic.
a. Biometric
b. PIN
c. both of these
d. none of these
Q. In Biometrics,… ID system is designed to prevent more than one person fromusing a single identity
a. Positive ID system
b. Negative ID system
c. both of these
d. none of these
Q. In Biometrics,… ID system is designed to prevent one person from usingmore than one identity
a. Positive ID system
b. Negative ID system
c. both of these
d. none of these
Q. are program developed by some dishonest people to destroy the computersystem and the valuable information in it.
a. Network firewall
b. computer virus
c. both of these
d. none of these
Q. Which among the following is not an example for computer virus ?
a. Chernobyl
b. Melissa
c. I Love You
d. None of these
Q. are special type of software meant for limiting the risks of being hit bycomputer viruses
a. Network firewall
b. Antivirus
c. both of these
d. none of these
Q. A is a person who gains unauthorized access to a computer network for profit,criminal mischief or personal pleasure.
a. Hacker
b. spoofer
c. operator
d. none of these
Q. acts like a gate keeper that examines each users identification before allowingthem to enter to the organization’s internal networks.
a. Network firewall
b. Antivirus
c. both of these
d. none of these
Q. Prevents unauthorized communication into and out of the network, allowing theorganization to enforce a security policy on traffic between its network and the internet.
a. Network firewall
b. Antivirus
c. both of these
d. none of these
Q. SET means …………………………….
a. Standard Electronic Technology
b. Standard Electronic Transfer
c. Secure Electronic Transaction
d. None of these
Q. The verification of credit card is done by using… with a communications link to themerchants acquiring bank
a. Credit card payment terminal
b. Point of Sale
c. All of these
d. none of these
Q. Creating illegitimate sites that appear to be published by established organizationsby unscrupulous artists is termed as………………………….
a. Spoofing
b. Snooping
c. Sniffing
d. None of these