Ecommerce
Sniffer programs
Cyber vandalism
Integrity threats
All of the above
Answer is Right!
Answer is Wrong!
12. Secret key is used for. A. Public key cryptography B. Private key cryptography C. Asymmetric key cryptography D. None of these
Public key cryptography
Private key cryptography
Asymmetric key cryptography
None of these
Answer is Right!
Answer is Wrong!
13. Which one is not a encryption technique? A. RSA B. DES C. AES D. NONE OF THE ABOVE
RSA
DES
AES
NONE OF THE ABOVE
Answer is Right!
Answer is Wrong!
Detailed SolutionWhich one is not a encryption technique? A. RSA B. DES C. AES D. NONE OF THE ABOVE
14. Which one is not used as a security mechanism? A. Encryption B. Cryptography C. Wallets D. Digital signature
Encryption
Cryptography
Wallets
Digital signature
Answer is Right!
Answer is Wrong!
15. Which is used to identify mobile money? A. MCID B. MMID C. RSID D. NONE OF THE ABOVE
MCID
MMID
RSID
NONE OF THE ABOVE
Answer is Right!
Answer is Wrong!
16. What is C stands in CIA of smart card? A. confidentiality B. conference C. congress D. None of the above
confidentiality
conference
congress
None of the above
Answer is Right!
Answer is Wrong!
17. What is I stands in CIA of smart card? A. International B. Integrity C. Identity D. None of the above
International
Integrity
Identity
None of the above
Answer is Right!
Answer is Wrong!
18. What is A stands in CIA of smart card? A. auditing B. authenticity C. authorized D. None of the above
auditing
authenticity
authorized
None of the above
Answer is Right!
Answer is Wrong!
19. Which is not a feature of eCommerce? A. SCM B. EDI C. WWW D. BPR
SCM
EDI
WWW
BPR
Answer is Right!
Answer is Wrong!
Detailed SolutionWhich is not a feature of eCommerce? A. SCM B. EDI C. WWW D. BPR
20. Which of the smart card uses a sim like structure for reading and writing data? A. Contact smart card B. Contactless smart card C. Proximity smart card D. Both B and C
Contact smart card
Contactless smart card
Proximity smart card
Both B and C
Answer is Right!
Answer is Wrong!