Top 150+ Solved E-Commerce Management MCQ Questions Answer
Q. The attacker monitors the data between the shoppers computer and the server
a. spoofing
b. snoofing
c. sniffing
d. none
Q. The private content of transaction, if unprotected can be intercepted when it gothrough the route over the internet called.
a. spoofing
b. snooping
c. sniffing
d. eavesdropping
Q. Gain entry into the user’s system and scan your file system for personalinformation is known as
a. spoofing
b. snooping
c. sniffing
d. none
Q. Creating illegitimate site that appear to published by established organizationsare by this name
a. spoofing
b. snooping
c. sniffing
d. none
Q. The IT act came into effect on
a. 17 may 2000
b. 17th december 2000
c. 17 oct 2000
d. 17 june 2000
Q. E commerce consists of commerce activities
a. electrically
b. technically
c. electronically
d. none
Q. …… provide security and privacy for the use of the web page content
a. http
b. html
c. ftp
d. none
Q. A digital signature performs a similar functions to a
a. thump impression
b. written signature
c. scanning
d. none
Q. Privacy laws of their host Coventry effect
a. domestic companies
b. overseas companies
c. neighboring companies
d. none
Q. …………………….is designed to protect a persons personal information
a. data integrity
b. cyber law
c. private legislation
d. none
Q. There are different types of risks connected with information protection suchas disruption, disaster.
a. unauthorized access
b. publicity
c. consumer
d. none
Q. ………………… are electronic files that are used to uniquely identify peopleand resources over the internet
a. digital signature
b. digital certificate
c. encryption recourse
d. none
Q. ……………….. techniques make use of secret codes (or) keys to encryptinformation
a. cryptography
b. encryption
c. digital certificate
d. none