Ecommerce
Mails
Pen drives and cds
Websites
All the above
Answer is Wrong!
Answer is Right!
2. The virus that are attached with vb and java files are called. A. Macro B. Trojan horse C. Script virus D. None of the above
Macro
Trojan horse
Script virus
None of the above
Answer is Wrong!
Answer is Right!
3. The virus that are commonly found in word documents are called __________. A. Macro B. Trojan horse C. Script virus D. None of the above
Macro
Trojan horse
Script virus
None of the above
Answer is Wrong!
Answer is Right!
4. Which will harm computer resources A. Worm B. Virus C. Trojan horse D. All the above
Worm
Virus
Trojan horse
All the above
Answer is Wrong!
Answer is Right!
5. The study of encryption is called ___________. A. Decryption B. Cryptography C. Firewall D. All the above
Decryption
Cryptography
Firewall
All the above
Answer is Wrong!
Answer is Right!
6. Public key cryptography is also known as _________ cryptography. A. Private key B. Symmetric C. Asymmetric D. None
Private key
Symmetric
Asymmetric
nan
Answer is Wrong!
Answer is Right!
7. Private Key cryptography is also known as __________ cryptography. A. Public key B. Symmetric C. Asymmetric D. None
Public key
Symmetric
Asymmetric
nan
Answer is Wrong!
Answer is Right!
8. OTP stands for. A. One Time Password B. On Time processing C. One time processor D. None
One Time Password
On Time processing
One time processor
nan
Answer is Wrong!
Answer is Right!
9. Which one is an offline payment mode? A. Cash on delivery B. Cash before delivery C. Credit card D. Both a and b
Cash on delivery
Cash before delivery
Credit card
Both a and b
Answer is Wrong!
Answer is Right!
10. Secure communication means. A. Protect transmission of credit card number B. Guarantee privacy of customer C. Unauthorized access of payment details D. All the above
Protect transmission of credit card number
Guarantee privacy of customer
Unauthorized access of payment details
All the above
Answer is Wrong!
Answer is Right!