Top 150+ Solved Essentials of Ecommerce MCQ Questions Answer
Q. When goods are purchased without debiting money from your account what type of purchase method are you using?
a. Debit card Purchase
b. Cheque purchase
c. Credit card Purchase
d. Bank transfer purchase
Q. When money is debited from your account when purchasing goods, you are using
a. Debit Card Purchase
b. Credit card Purchase
c. Cash Purchase
d. Credit Promissory note purchase
Q. Those methods that involves a type of attack where attackers intrude into an existing connection to intercept the exchanged data and inject false information is called
a. Interception
b. Hacking
c. Snooping
d. Man-In-The-Middle
Q. Finger print recognition is a type of
a. Behavioural Biometric
b. Physiological Biometric
c. Encrypted Protection
d. Program Protected
Q. Which of the following is a card with a microchip that can be used instead of cash and coins for everything from vending machines to public transportation?
a. Debit Card
b. Credit Card
c. Electronic Wallet / Electronic Purse
d. Any of these
Q. Which of the following encrypts payment card transaction data and verifies that both parties in the transaction are genuine?
a. SSl
b. SET
c. Both of these
d. None of these
Q. Which of the following is automated methods of recognizing a person based on a physiological or behavioral characteristic?
a. Biometrics
b. PIN
c. Password
d. All of the above
Q. Which among the following is not an example for computer virus?
a. I Love You
b. Jerusalem
c. Melissa
d. Network Firewall
Q. Which of the following is a person who gains unauthorized access to a computer network for profit, criminal mischief or personal pleasure?
a. Black Hat Hacker
b. Spoofer
c. Operator
d. White Hat Hacker
Q. SET means:
a. Standard Electronic Transfer
b. Standard Electronic Technology
c. Secure Electronic Transfer
d. Secure Electronic Transaction
Q. The verification of credit card is done by using:
a. Credit Card Payment
b. Point of Sale
c. All of the above
d. None of these
Q. The reverse process of encryption, to make the information readable once again is:
a. Sniffing
b. Decryption
c. Cryptography
d. Translation153.
Q. A combination of software and information designed to provide security and information for payment is called?
a. Digital wallet
b. Pop up ads
c. Shoppng cart
d. Encryption