Top 150+ Solved Digital Business MCQ Questions Answer
Q. Gain entry into the user’s system and scan your file system for personal informationis known as……………….
a. Spoofing
b. Snooping
c. Sniffing
d. None of these
Q. attacks are difficult and are only successful if the attacker knows somethingabout the shopper
a. Spoofing
b. Snooping
c. Sniffing
d. Guessing passwords
Q. is the process of making information unintelligible to the unauthorized user.
a. Spoofing
b. Snooping
c. Sniffing
d. Cryptography
Q. is the reverse process of encryption, to make the information readable onceagain
a. Spoofing
b. Decryption
c. Sniffing
d. Cryptography
Q. A provides a way to associate the message with the sender and is theequivalent of an ordinary signature.
a. cyber signature
b. Digital signature
c. SSL
d. none of these
Q. A is an electronic file that uniquely identifies individuals and websites on theinternet and enables secure confidential communications
a. Digital signature
b. Digital certificates
c. SSL
d. none of these
Q. The information Technology Act [IT ACT] came into effect on
a. 16th November 2000
b. 15th December 2000
c. 17th October 2000
d. none of these
Q. Information sent over the Internet commonly uses the set of rules called………………………..
a. TCP/IP
b. FTP
c. HTTP
d. gopher
Q. is a person who breaks in or trespasses a computer system
a. Hacker
b. Snooper
c. operator
d. spoofer
Q. E-mail which contain useless material is termed as………………………
a. Spam
b. useless mail
c. trunk mail
d. Junk mail
Q. Which of the following crimes were not covered under IT (Amendment) Act, 2008 ?
a. Cyber terrorism
b. Child pornography
c. Video voyeurism
d. None of these
Q. Trade mark, copyright, patent law etc comes under the purview of……………………
a. Data protection
b. Telecommunication laws
c. Intellectual property laws
d. None
Q. is a programme designed o replicate and spread generally with the victim beingoblivious to its existence
a. hacker
b. software
c. Computer virus
d. none of these
Q. Which one of the following is not a principle of e-commerce ?
a. privacy
b. integrity
c. authentication
d. none of these