LIST OF ATTEMPTED QUESTIONS AND ANSWERS
 Select The Blank
  Question      ________is the act of storing a document on local server,enabling it to be presented faster than if it is accessed from the document's original server.
  Correct Answer      Caching
  Your Answer      Caching
 True/False
  Question      Watchers are not easily suited for online medium.
  Correct Answer      True
  Your Answer      True
 Multiple Choice Multiple Answer
  Question      Ways of advertising a web presence and getting customers in through the door include
  Correct Answer      Site Name , Conventional Advertising , Search Engines
  Your Answer      Site Name , Conventional Advertising , Search Engines
 Multiple Choice Multiple Answer
  Question      The delivery system of ecommerce purcahses has to depend on
  Correct Answer      Size of Product , Nature of Product , Urgency
  Your Answer      Size of Product , Nature of Product , Urgency
 Match The Following
Question    Correct Answer    Your Answer
SSL    Address security concerns for inforamtion transfer    Address security concerns for inforamtion transfer
PCT    Spawn secondary key for authentication    Spawn secondary key for authentication
S-HTTP    Security scheme based on public key encryption    Security scheme based on public key encryption
SET    Provide digital signature capability for financial transaction on web    Provide digital signature capability for financial transaction on web
 Multiple Choice Single Answer
  Question      Millicent developed by Digital, which is now part of Compaq.Millicent is an electronic strip that
  Correct Answer      Does not issue one standard currency
  Your Answer      Does not issue one standard currency
 True/False
  Question      A single Mondex card can be used in both, the online world of internet as well as the offline world of ordinary merchant stores.
  Correct Answer      True
  Your Answer      False
 Multiple Choice Single Answer
  Question      The cheap delivery system for Ecommerce purchases is
  Correct Answer      Post
  Your Answer      Post
 Multiple Choice Multiple Answer
  Question      A trusted operating system provides
  Correct Answer      strong access controls , create virtual lockbox , protect against unauthoprized tampering with private account information
  Your Answer      strong access controls , create virtual lockbox , protect against unauthoprized tampering with private account information
 Multiple Choice Single Answer
  Question      The act of sending a message pretending to be authorized user is called as
  Correct Answer      Spoofing
  Your Answer      Spoofing
 Multiple Choice Single Answer
  Question      Using Agile wallet frame, the consumer completes a purchase transaction with
  Correct Answer      Single mouse click
  Your Answer      Single mouse click
 Select The Blank
  Question      The SSl protocol operates at ________layer
  Correct Answer      Transport
  Your Answer      Transport
 Multiple Choice Multiple Answer
  Question      Hit counter
  Correct Answer      Counts number of hits for a web site , Provided by ISP , Is a s/w
  Your Answer      Counts number of hits for a web site , Provided by ISP , Is a s/w
 Select The Blank
  Question      An internet user using Mondex, transfering cash over the internet requires ________ to be attached to the personal computer
  Correct Answer      Mondex reader
  Your Answer      Mondex card
 Select The Blank
  Question      SET provides________ by the use of message encryption.
  Correct Answer      Confidentiality
  Your Answer      Secuity
 Select The Blank
  Question      The SET specification use public key cryptography and________ for validating both consumer and merchant
  Correct Answer      digital certificate
  Your Answer      digital certificate
 True/False
  Question      In hardened firewall host FTP ,Gopher services are located on firewall systems rather than being maintained on many systems.
  Correct Answer      True
  Your Answer      True
 True/False
  Question      In a credit card, the customer receive a payment for returned goods.
  Correct Answer      True
  Your Answer      True
 Multiple Choice Multiple Answer
  Question      List the three types of information a smart card may contain
  Correct Answer      Financial facts , Account information , Health information
  Your Answer      Financial facts , Account information , Health information
 Multiple Choice Multiple Answer
  Question      Firewalls do which of the following things?
  Correct Answer      Default deny , Default Permit
  Your Answer      Default Permit , Default Delete , Default Update
 True/False
  Question      Number of times dialogue /feedback is unnecessary indicate adequate system feedback
  Correct Answer      False
  Your Answer      False
 Multiple Choice Single Answer
  Question      KDD communications (kCOM) is the internet subsidiary of
  Correct Answer      Kokusai Denshin Denwa
  Your Answer      Kokusai Denshin Denwa
 Select The Blank
  Question      Whenever the transaction is processed by a third party , the system is called ________.
  Correct Answer      Open loop
  Your Answer      Nested loop
 Multiple Choice Single Answer
  Question      The most good choice for online payment is
  Correct Answer      Credit Card
  Your Answer      Credit Card
 Multiple Choice Multiple Answer
  Question      The advantages of Internet over conventional manuals are
  Correct Answer      Readily corrected material , Search Facilities , No Mailing Costs
  Your Answer      Readily corrected material , Search Facilities , No Mailing Costs
 Multiple Choice Single Answer
  Question      Public key encryption is useful when the parties willing to communicate
  Correct Answer      can not rely on each other
  Your Answer      share a common key
 Multiple Choice Multiple Answer
  Question      To evaulate a web site using the model the following statements should be accessed.
  Correct Answer      Aesthetic Effect , Product Information , Customer Information
  Your Answer      Aesthetic Effect , Product Information , Customer Information
 Select The Blank
  Question      Embedded Style Definitions are defined in the ________ section of the HTML file.
  Correct Answer      HEAD
  Your Answer      TITLE
 Select The Blank
  Question      ________ is implementing upgrades or changes that are designed to improve system's productivity.
  Correct Answer      Enchancement
  Your Answer      Maintainence
 Multiple Choice Multiple Answer
  Question      Methods for ensuring inforamtion integrity include
  Correct Answer      Error detection codes , Checksums , Sequence Numbers
  Your Answer      Error detection codes , Checksums , Sequence Numbers
 True/False
  Question      A credit card contains cash.
  Correct Answer      False
  Your Answer      False
 Multiple Choice Multiple Answer
  Question      For managing customer feedback
  Correct Answer      Check the downloadable speed , Set up FAQs , Answer customer mail
  Your Answer      Set up FAQs , Answer customer mail , Check the downloadable speed
 True/False
  Question      In credit cards the transactions are always single way that is customer's charges to be credited to vendor's account
  Correct Answer      False
  Your Answer      False
 Multiple Choice Single Answer
  Question      Which electronic tokens are issued by ecoin.net that can be used to pay for online goods?
  Correct Answer      Ecoins
  Your Answer      Ecoins
 Multiple Choice Single Answer
  Question      What is the mode of payment for the purchases of small value on the internet
  Correct Answer      Electronic cash
  Your Answer      Credit card
 Multiple Choice Multiple Answer
  Question      Select the agencies besides the customer and vendor in a credit card transaction
  Correct Answer      Vendor's bank , Customer's bank , Card issuing company
  Your Answer      Vendor's bank , Customer's bank , Card issuing company
 Multiple Choice Single Answer
  Question      A process of making information indeipherable except to those with a decoding key
  Correct Answer      Encryption
  Your Answer      Encryption
 Match The Following
Question    Correct Answer    Your Answer
Secret data    Existance is secret    Existance is secret
Public data    Protected from modification    Protected from modification
Copyright data    Content is not secret    Content is not secret
Confidential data    Content is secret    Content is secret
 True/False
  Question      The customer feedback got through the Web site should be the input for maintainance and enhancement of the site.
  Correct Answer      True
  Your Answer      True
 Select The Blank
  Question      In public key encryption method one key is public and one key is ________.
  Correct Answer      Private
  Your Answer      Private
 Multiple Choice Single Answer
  Question      The science of deciphering encrypted messages without knowing right key is known as
  Correct Answer      Cryptoanalysis
  Your Answer      Cryptography
 Multiple Choice Multiple Answer
  Question      The Online equivalent of stored value card is
  Correct Answer      Ecash , Network Money
  Your Answer      Ecash , Network Money
 True/False
  Question      A hardened firewall computer records not only the user logged in but also who has failed loging
  Correct Answer      True
  Your Answer      True
 Multiple Choice Multiple Answer
  Question      Off-the-shelf home finance software are
  Correct Answer      Microsoft Money , Intuit's Quicken
  Your Answer      Microsoft Money , Intuit's Quicken
 Multiple Choice Multiple Answer
  Question      The advantages of Ecash are
  Correct Answer      Cheap , Useful for small payments
  Your Answer      Cheap , Useful for small payments
 Multiple Choice Multiple Answer
  Question      The key elements of a brand at the advertising agency are
  Correct Answer      Differentiation , Relevance , Perceived Value
  Your Answer      Differentiation , Relevance , Perceived Value
 Multiple Choice Single Answer
  Question      A set of rules for encoding and decoing message is called as
  Correct Answer      Cipher
  Your Answer      Public Key
No comments:
Post a Comment