Top 150+ Solved E-Commerce Management MCQ Questions Answer

From 121 to 135 of 140

Q. The attacker monitors the data between the shoppers computer and the server

a. spoofing

b. snoofing

c. sniffing

d. none

  • c. sniffing

Q. The IT act came into effect on

a. 17 may 2000

b. 17th december 2000

c. 17 oct 2000

d. 17 june 2000

  • c. 17 oct 2000

Q. UNCITRAL model law on E commerce is

a. 1996

b. 1994

c. 1995

d. 1997

  • a. 1996

Q. E commerce consists of commerce activities

a. electrically

b. technically

c. electronically

d. none

  • c. electronically

Q. A digital signature performs a similar functions to a

a. thump impression

b. written signature

c. scanning

d. none

  • b. written signature

Q. Digital signature acts as a ……………….. for e commerce

a. risk

b. virus

c. security

d. boon

  • c. security

Q. Privacy laws of their host Coventry effect

a. domestic companies

b. overseas companies

c. neighboring companies

d. none

  • b. overseas companies

Q. …………………….is designed to protect a persons personal information

a. data integrity

b. cyber law

c. private legislation

d. none

  • c. private legislation

Q. There are different types of risks connected with information protection suchas disruption, disaster.

a. unauthorized access

b. publicity

c. consumer

d. none

  • a. unauthorized access

Q. ………………… are electronic files that are used to uniquely identify peopleand resources over the internet

a. digital signature

b. digital certificate

c. encryption recourse

d. none

  • b. digital certificate

Q. ……………….. techniques make use of secret codes (or) keys to encryptinformation

a. cryptography

b. encryption

c. digital certificate

d. none

  • a. cryptography
Subscribe Now

Get All Updates & News