Multiple Choice Multiple Answer
Question Select the agencies besides the customer and vendor in a credit card transaction
Correct Answer Vendor's bank , Customer's bank , Card issuing company
Your Answer Vendor's bank , Customer's bank , Card issuing company
Multiple Choice Single Answer
Question A process of making information indeipherable except to those with a decoding key
Correct Answer Encryption
Your Answer Encryption
Match The Following
Question Correct Answer Your Answer
Secret data Existance is secret Existance is secret
Public data Protected from modification Protected from modification
Copyright data Content is not secret Content is not secret
Confidential data Content is secret Content is secret
True/False
Question The customer feedback got through the Web site should be the input for maintainance and enhancement of the site.
Correct Answer True
Your Answer True
Select The Blank
Question In public key encryption method one key is public and one key is ________.
Correct Answer Private
Your Answer Private
Multiple Choice Single Answer
Question The science of deciphering encrypted messages without knowing right key is known as
Correct Answer Cryptoanalysis
Your Answer Cryptography
Multiple Choice Multiple Answer
Question The Online equivalent of stored value card is
Correct Answer Ecash , Network Money
Your Answer Ecash , Network Money
True/False
Question A hardened firewall computer records not only the user logged in but also who has failed loging
Correct Answer True
Your Answer True
Multiple Choice Multiple Answer
Question Off-the-shelf home finance software are
Correct Answer Microsoft Money , Intuit's Quicken
Your Answer Microsoft Money , Intuit's Quicken
Multiple Choice Multiple Answer
Question The advantages of Ecash are
Correct Answer Cheap , Useful for small payments
Your Answer Cheap , Useful for small payments
Multiple Choice Multiple Answer
Question The key elements of a brand at the advertising agency are
Correct Answer Differentiation , Relevance , Perceived Value
Your Answer Differentiation , Relevance , Perceived Value
Multiple Choice Single Answer
Question A set of rules for encoding and decoing message is called as
Correct Answer Cipher
Your Answer Public Key
True/False
Question Select command modify information in the database.
Correct Answer False
Your Answer False
Multiple Choice Single Answer
Question The Link which gives error to display page is called
Correct Answer Broken Link
Your Answer Error Link
Multiple Choice Single Answer
Question The short form of world wide web consortium is :
Correct Answer W3C
Your Answer WWWC
Multiple Choice Single Answer
Question The most common way of paying for an ecommerce transaction is with
Correct Answer Credit Card
Your Answer Credit Card
Multiple Choice Multiple Answer
Question The advantages of Ecash are
Correct Answer Cheap , Useful for small payments
Your Answer Useful for small payments , Economical , Good Security
Multiple Choice Multiple Answer
Question The critical issues for e-business are
Correct Answer Create distinct distribution channels , Impove supply chain management , Technical competitiveness
Your Answer Create distinct distribution channels , Impove supply chain management , Technical competitiveness
True/False
Question In a credit card, the customer receive a payment for returned goods.
Correct Answer True
Your Answer False
Select The Blank
Question The SSl protocol operates at ________layer
Correct Answer Transport
Your Answer Transport
Multiple Choice Multiple Answer
Question Microsoft Merchant Solution is built on .
Correct Answer Windows NT , Internet Information Server
Your Answer Internet Information Server , Personal Web Server
Multiple Choice Single Answer
Question The banking which allows banks to set up retail branches on subscriber based online services is
Correct Answer Online Services Based Banking
Your Answer Online Services Based Banking
Multiple Choice Single Answer
Question The planning process for e-business include
Correct Answer Deciding about the products and services you want to sell
Your Answer Setting up the security system
True/False
Question Bilateral Transaction is not feasible because of potential for double spending.
Correct Answer True
Your Answer True
Multiple Choice Single Answer
Question The cheap delivery system for Ecommerce purchases is
Correct Answer Post
Your Answer Local Delivery
Select The Blank
Question ________ is a bits of information stored on a user's hard disk that identifies the user the next time he/she accesses the web site.
Correct Answer Cookies
Your Answer Cookies
Select The Blank
Question If the internet consumer is________, then the merchant can submit consumer's payment card immediately.
Correct Answer downloading digital files
Your Answer downloading digital files
True/False
Question To process payment card orders, a merchant must first set up a merchant account.
Correct Answer True
Your Answer True
Select The Blank
Question ________ are used to obtain data from the client for submission to server.
Correct Answer Form
Your Answer Form
Match The Following
Question Correct Answer Your Answer
SSL Address security concerns for inforamtion transfer Security scheme based on public key encryption
PCT Spawn secondary key for authentication Blocks pakcets from unknown user
S-HTTP Security scheme based on public key encryption Provide digital signature capability for financial transaction on web
SET Provide digital signature capability for financial transaction on web Spawn secondary key for authentication
True/False
Question The manner in which browser actually lays out the information is dependent on browser itself.
Correct Answer True
Your Answer False
Multiple Choice Multiple Answer
Question Select the two payment card companies using closed loop system
Correct Answer American Express , Discover
Your Answer Visa , Master card
Select The Blank
Question The model used for computer network is called as ________.
Correct Answer OSI
Your Answer OSI
Multiple Choice Multiple Answer
Question Microsoft wallet is currently working with
Correct Answer American express charge card , Master card
Your Answer Electronic cash system , American express charge card , Master card
True/False
Question Cybercash supports smart cards .
Correct Answer False
Your Answer True
Multiple Choice Single Answer
Question The act of sending a message pretending to be authorized user is called as
Correct Answer Spoofing
Your Answer Spammig
Multiple Choice Multiple Answer
Question Select the agencies besides the customer and vendor in a credit card transaction
Correct Answer Vendor's bank , Customer's bank , Card issuing company
Your Answer Vendor's bank , Card issuing company
Multiple Choice Multiple Answer
Question To evaulate a web site using the model the following statements should be accessed.
Correct Answer Aesthetic Effect , Product Information , Customer Information
Your Answer Aesthetic Effect , Product Information , Customer Information
True/False
Question The efficiency of user interface increases if error prevention is good
Correct Answer True
Your Answer True
Multiple Choice Multiple Answer
Question Pure Cyberbanks provide following services
Correct Answer Personal Banking , Financial Services
Your Answer Personal Banking , Request a trade , Trade Mutual Funds
True/False
Question Microsoft wallet comes preinstalled in Internet Explorer and Netscape Navigator
Correct Answer False
Your Answer False
Multiple Choice Single Answer
Question Digital Signatures are used for
Correct Answer Sender Authentication
Your Answer Sender Authentication
Select The Blank
Question An ________ system is one that people can easily enhance without providing any earlier work on the system
Correct Answer extensible
Your Answer extensible
Multiple Choice Single Answer
Question The main security feature to prevent double spending is
Correct Answer Threat of prosecution
Your Answer Serial numbering of electronic cash
Select The Blank
Question File Transfer protocol transfers ________ data.
Correct Answer Binary
Your Answer Binary
Multiple Choice Multiple Answer
Question Typically what information a new business required to provide the merchant bank in opening an account
Correct Answer Business plan , details about existing bank accounts , credit history
Your Answer Business plan , details about existing bank accounts , credit history
True/False
Question SQL statements can be used with higher level languages like Java,C++
Correct Answer True
Your Answer True
True/False
Question Customers must have an account with central online bank in most digital cash systems
Correct Answer True
Your Answer False
Select The Blank
Question ________ hubs have built in programmable features to handle packet switching ,routing traffic
Correct Answer Intelligent
Your Answer Intelligent
Multiple Choice Multiple Answer
Question Hit counter
Correct Answer Counts number of hits for a web site , Provided by ISP , Is a s/w
Your Answer Counts number of hits for a web site , Provided by ISP
Match The Following
Question Correct Answer Your Answer
Marketing Notice New Products Information Latest Marketing Update
Logon Page Business partner's page Business partner's page
Home Page Latest Marketing Update New Products Information
Order Page Product summaries Summary Of Orders
Multiple Choice Single Answer
Question To create temper proof electronic cash that can be traced back to its origin, what is used?
Correct Answer Complex Cryptographic algorithm
Your Answer Complex Cryptographic algorithm
Select The Blank
Question A list of company activities that make up the website is called ________.
Correct Answer Content Inventory
Your Answer Event List
Multiple Choice Single Answer
Question In Millicent system when a consumer locates a product on a merchan's web site that he or she would like to purchase ,the consumer converts the broker's strip into
Correct Answer Vendor specific scrip
Your Answer Merchan specific scrip
Select The Blank
Question In ________auction the seller puts up an item for sale at a high price.
Correct Answer Reverse
Your Answer Increasing
Multiple Choice Single Answer
Question An attack on the information and communication services by a third party that prevents legitimate users from using the infrastructure is
Correct Answer Denial of Service
Your Answer Spoofing
True/False
Question For Online Retailing to Succeed ,online technology must compliment management and opeational straegy.
Correct Answer True
Your Answer True
Multiple Choice Multiple Answer
Question The server developed by cybercash handles
Correct Answer Consumer payment and purchase information , Quick and safe transaction completion
Your Answer Consumer payment and purchase information , Quick and safe transaction completion
Select The Blank
Question ECML stands for ________.
Correct Answer Electronic Commerce modeling language
Your Answer Electronic Commerce modeling language
True/False
Question If you have limited hardware and networking technology then your ISP can load your Web site on its server and manage it.
Correct Answer True
Your Answer True
Multiple Choice Multiple Answer
Question Select the two payment card companies using open loop system.
Correct Answer Visa , Master card
Your Answer Visa , Master card
Multiple Choice Single Answer
Question Which electronic tokens are issued by ecoin.net that can be used to pay for online goods?
Correct Answer Ecoins
Your Answer Ecoins
Select The Blank
Question ________ was developed to use DSL protocol suite .
Correct Answer Integrated Services Digital Network
Your Answer Integrated Services Digital Network
True/False
Question There is no preset spending limit based on the user's credit limit in a credit card.
Correct Answer False
Your Answer False
Multiple Choice Single Answer
Question The way of dividing browser window into a number of subwindows is
Correct Answer Frame
Your Answer Frame
Multiple Choice Single Answer
Question The act of sending a message pretending to be authorized user is called as
Correct Answer Spoofing
Your Answer Spoofing
Multiple Choice Single Answer
Question To create temper proof electronic cash that can be traced back to its origin, what is used?
Correct Answer Complex Cryptographic algorithm
Your Answer Electronic security
Select The Blank
Question Most Popular Internet ads are ________.
Correct Answer Banners
Your Answer Banners
Fun and Fun only Recent Posts: |
Wednesday, April 29, 2009
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment