11. Which one is communication channel threat? A. Sniffer programs B. Cyber vandalism C. Integrity threats D. All of the above

Sniffer programs
Cyber vandalism
Integrity threats
All of the above

Detailed SolutionWhich one is communication channel threat? A. Sniffer programs B. Cyber vandalism C. Integrity threats D. All of the above

12. Secret key is used for. A. Public key cryptography B. Private key cryptography C. Asymmetric key cryptography D. None of these

Public key cryptography
Private key cryptography
Asymmetric key cryptography
None of these

Detailed SolutionSecret key is used for. A. Public key cryptography B. Private key cryptography C. Asymmetric key cryptography D. None of these

13. Which one is not a encryption technique? A. RSA B. DES C. AES D. NONE OF THE ABOVE

RSA
DES
AES
NONE OF THE ABOVE

Detailed SolutionWhich one is not a encryption technique? A. RSA B. DES C. AES D. NONE OF THE ABOVE

14. Which one is not used as a security mechanism? A. Encryption B. Cryptography C. Wallets D. Digital signature

Encryption
Cryptography
Wallets
Digital signature

Detailed SolutionWhich one is not used as a security mechanism? A. Encryption B. Cryptography C. Wallets D. Digital signature

15. Which is used to identify mobile money? A. MCID B. MMID C. RSID D. NONE OF THE ABOVE

MCID
MMID
RSID
NONE OF THE ABOVE

Detailed SolutionWhich is used to identify mobile money? A. MCID B. MMID C. RSID D. NONE OF THE ABOVE

16. What is C stands in CIA of smart card? A. confidentiality B. conference C. congress D. None of the above

confidentiality
conference
congress
None of the above

Detailed SolutionWhat is C stands in CIA of smart card? A. confidentiality B. conference C. congress D. None of the above

17. What is I stands in CIA of smart card? A. International B. Integrity C. Identity D. None of the above

International
Integrity
Identity
None of the above

Detailed SolutionWhat is I stands in CIA of smart card? A. International B. Integrity C. Identity D. None of the above

18. What is A stands in CIA of smart card? A. auditing B. authenticity C. authorized D. None of the above

auditing
authenticity
authorized
None of the above

Detailed SolutionWhat is A stands in CIA of smart card? A. auditing B. authenticity C. authorized D. None of the above

19. Which is not a feature of eCommerce? A. SCM B. EDI C. WWW D. BPR

SCM
EDI
WWW
BPR

Detailed SolutionWhich is not a feature of eCommerce? A. SCM B. EDI C. WWW D. BPR

20. Which of the smart card uses a sim like structure for reading and writing data? A. Contact smart card B. Contactless smart card C. Proximity smart card D. Both B and C

Contact smart card
Contactless smart card
Proximity smart card
Both B and C

Detailed SolutionWhich of the smart card uses a sim like structure for reading and writing data? A. Contact smart card B. Contactless smart card C. Proximity smart card D. Both B and C