Top 550+ Solved E-Commerce MCQ Questions Answer

From 136 to 150 of 516

Q. …………………..are program developed by some dishonest people to destroy the computersystem and the valuable information in it.

a. Network firewall

b. computer virus

c. both of these

d. none of these

  • b. computer virus

Q. Which among the following is not an example for computer virus ?

a. Chernobyl

b. Melissa

c. I Love You

d. None of these

  • d. None of these

Q. ……………………are special type of software meant for limiting the risks of being hit bycomputer viruses

a. Network firewall

b. Antivirus

c. both of these

d. none of these

  • b. Antivirus

Q. SET means …………………………….

a. Standard Electronic Technology

b. Standard Electronic Transfer

c. Secure Electronic Transaction

d. None of these

  • c. Secure Electronic Transaction

Q. The verification of credit card is done by using…………….. with a communications link to themerchants acquiring bank

a. Credit card payment terminal

b. Point of Sale

c. All of these

d. none of these

  • c. All of these

Q. ………………attacks are difficult and are only successful if the attacker knows somethingabout the shopper

a. Spoofing

b. Snooping

c. Sniffing

d. Guessing passwords

  • d. Guessing passwords

Q. …………………is the process of making information unintelligible to the unauthorized user.

a. Spoofing

b. Snooping

c. Sniffing

d. Cryptography

  • d. Cryptography

Q. ………………….is the reverse process of encryption, to make the information readable onceagain

a. Spoofing

b. Decryption

c. Sniffing

d. Cryptography

  • b. Decryption

Q. A………………….provides a way to associate the message with the sender and is theequivalent of an ordinary signature.

a. cyber signature

b. Digital signature

c. SSL

d. none of these

  • b. Digital signature
Subscribe Now

Get All Updates & News