Download as pdf or txt
Download as pdf or txt
You are on page 1of 31

ECommerce

BCom
IIISem
MultipleChoiceQuestions

1. Whichofthefollowingdescribesecommerce?
a. Doingbusinesselectronically
b. Doingbusiness
c. Saleofgoods
d. Alloftheabove
Answer:A
2. Whichofthefollowingispartofthefourmaintypesforecommerce?
a. B2B
b. B2C
c. C2B
d. Alloftheabove
Answer:D
3. WhichsegmentdoeBay,Amazon.combelong?
a. B2Bs
b. B2Cs
c. C2Bs
d. C2Cs
Answer:B
4. Whichtypeofecommercefocusesonconsumersdealingwitheachother?
a. B2B
b. B2C
c. C2B
d. C2C
Answer:D
5. WhichsegmentiseBayanexample?
a. B2B
b. C2B
c. C2C
d. Noneoftheabove

Answer:D
6. Whichtypedealswithauction?
a. B2B
b. B2C

c. C2B
d. C2C
Answer:D
7. InwhichwebsiteGlobalEasyBuyisfacilitated?
a. Ebay.com
b. Amazon.com
c. Yepme.com
d. Noneofthese
Answer:A
8. ThebestproductstosellinB2Cecommerceare:
a. Smallproducts
b. Digitalproducts
c. Specialtyproducts
d. Freshproducts
Answer:B
9. WhichproductsarepeoplemostlikelytobemoreuncomfortablebuyingontheInternet?
a. Books
b. Furniture
c. Movies
d. Alloftheabove

Answer:B
10. WhichproductsarepeoplemostlikelytobecomfortablebuyingontheInternet?
a. Books
b. PCs
c. CDs
d. Alloftheabove
Answer:D
11. DigitalproductsarebestsuitedforB2Cecommercebecausethey:
a. Arecommoditylikeproducts
b. Canbemasscustomizedandpersonalized
c. Canbedeliveredatthetimeofpurchase
d. Alloftheabove
Answer:D
12. Thesolutionforallbusinessneedsis
a. EDI
b. ERP
c. SCM
d. Noneoftheabove
Answer:B
13. AllofthefollowingaretechniquesB2Cecommercecompaniesusetoattractcustomers,
except:
a. Registeringwithsearchengines

14.

15.

16.

17.

18.

19.

b. Viralmarketing
c. Onlineads
d. Virtualmarketing
Answer:D
WhichisafunctionofEcommerce
a. marketing
b. advertising
c. warehousing
d. alloftheabove
Answer:D
WhichisnotafunctionofEcommerce
a. marketing
b. advertising
c. warehousing
d. noneoftheabove
Answer:C
Whichtermrepresentsacountofthenumberofpeoplewhovisitonesite,clickonanad,and
aretakentothesiteoftheadvertiser?
a. Affiliateprograms
b. Clickthrough
c. Spam
d. Alloftheabove
Answer:B
WhatisthepercentageofcustomerswhovisitaWebsiteandactuallybuysomethingcalled?
a. Affiliateprograms
b. Clickthrough
c. Spam
d. Conversionrate
Answer:D
Whatarematerialsusedinproductioninamanufacturingcompanyorareplacedontheshelf
forsaleinaretailenvironment?
a. Directmaterials
b. Indirectmaterials
c. EDI
d. Noneoftheabove
Answer:A
Whatarematerialsthatarenecessaryforrunningamoderncorporation,butdonotrelateto
thecompany'sprimarybusinessactivities?
a. Directmaterials
b. Indirectmaterials
c. EDI
d. Noneoftheabove

20.

21.

22.

23.

24.

25.

26.

Answer:B
Whatareballpointpenspurchasedbyaclothingcompany?
a. Directmaterials
b. Indirectmaterials
c. EDI
d. Noneoftheabove
Answer:B
Whatisanothernamefor?
a. Directmaterials
b. Indirectmaterials
c. EDI
d. Noneoftheabove
Answer:B
Whatistheprocessinwhichabuyerpostsitsinterestinbuyingacertainquantityofitems,and
sellerscompeteforthebusinessbysubmittingsuccessivelylowerbidsuntilthereisonlyone
sellerleft?
a. B2Bmarketplace
b. Intranet
c. Reverseauction
d. Internet
Answer:C
Whatareplasticcardsthesizeofacreditcardthatcontainsanembeddedchiponwhichdigital
informationcanbestored?
a. Customerrelationshipmanagementsystemscards
b. Egovernmentidentitycards
c. FEDIcards
d. Smartcards
Answer:D
Mostindividualsarefamiliarwithwhichformofecommerce?
a. B2B
b. B2C
c. C2B
d. C2C
Answer:B
Whichformofecommercecurrentlyaccountsforabout97%ofallecommercerevenues?
a. B2B
b. B2C
c. C2B
d. C2C
Answer:A
WhichofthefollowingareadvantagesnormallyassociatedwithB2Becommerce?
a. Shortercycletimes

27.

28.

29.

30.

31.

32.

33.

b. Reductionincosts
c. Reacheswideraudiences
d. alloftheabove
Answer:D
Ifthethreatofsubstituteproductsorservicesislowitisa(n):
a. Disadvantagetothesupplier
b. Advantagetothebuyer
c. Advantagetothesupplier
d. Noneoftheabove
Answer:C
Thethreatofnewentrantsishighwhenitis:
a. Hardforcustomerstoenterthemarket
b. Hardforcompetitorstoenterthemarket
c. Easyforcompetitorstoenterthemarket
d. Easyforcustomerstoenterthemarket
Answer:C
Ifitiseasyforcompetitorstoenterthemarket,thethreatofnewentrantsisconsidered:
a. High
b. Low
c. More
d. Less
Answer:A
Anindustryislessattractiveforsupplierswhentherivalryamongexistingcompetitorsis:
a. High
b. Low
c. More
d. Less
Answer:A
Uniquevalueauctionismainlyappliesto?
a. Newproducts
b. Secondhandproducts
c. Engineeringproducts
d. Noneoftheabove
i. Answer:B
Paisapayisfacilitatedin
a. eBay.co.in
b. amazon.com
c. flipkart.com
d. noneoftheabove
Answer:A
Whichofthefollowingisausefulsecuritymechanismwhenconsideringbusinessstrategyand
IT?

encryption
decryption
firewall
alltheabove
Answer:D
34. Whichofthefollowingisnotrelatedtosecuritymechanism
a. encryption
b. decryption
c. ecash
d. alltheabove
a.
b.
c.
d.

35.

36.

37.

38.

39.

Answer:C
Aproductorservicethatcustomershavecometoexpectfromanindustry,whichmustbe
offeredbynewentrantsiftheywishtocompeteandsurvive,isknownasa(n)?
a. Switchingcosts
b. Loyaltyprograms
c. Entrybarriers
d. Affiliateprograms
Answer:C
Whichofthefollowingstatementsaccuratelyreflecttheimpactoftechnology?
a. Technologyhascausedbuyerpowertoincrease
b. Technologyhaslessenedtheentrybarriersformanyindustries
c. Technologyhasincreasedthethreatofsubstituteproductsandservices
d. alloftheabove
Answer:D
Abusinesscannotbeallthingstoallpeople.Instead,abusinessmust:
a. Identifytargetcustomers
b. Identifythevalueofproducts/servicesasperceivedbycustomers
c. alloftheabove
d. Noneoftheabove
Answer:C
Howthetransactionsoccurinecommerce?
a. Usingemedias
b. Using computers only
c. Usingmobilephonesonly
d. Noneoftheabove
Answer:A
Whichtypeofproductsislesserpurchasedusingecommerce?
a. automobiles
b. books
c. softwares
d. none

40.

41.

42.

43.

44.

45.

46.

Answer:A
Abusinesscompetinginacommoditylikeenvironmentmustfocusonwhichofthefollowing?
a. Price
b. Ease/speedofdelivery
c. Easeofordering
d. alloftheabove
Answer:D
Whichofthefollowingreferstocreatingproductstailoredtoindividualcustomers?
a. customization
b. aggregation
c. Directmaterials
d. Reverseauction
Answer:A
Materialsusedinthenormaloperationofabusinessbutnotrelatedtoprimarybusiness
operationsarecalledwhat?
a. Supplies
b. Directmaterials
c. Indirectmaterials
d. Dailystuff
Answer:C
Amazon.comiswellknownforwhichecommercemarketingtechnique?
a. Bannerads
b. Popupads
c. Affiliateprograms
d. Viralmarketing
Answer:C
Whatisthenamegiventoaninteractivebusinessprovidingacentralizedmarketwheremany
buyersandsupplierscancometogetherforecommerceorcommercerelatedactivities?
a. Directmarketplace
b. B2B
c. B2C
d. Electronicmarketplace
Answer:D
Whichformofemarketplacebringstogetherbuyersandsellersfrommultipleindustries,often
forMROmaterials?
a. horizontal
b. Vertical
c. Integrated
d. Inclined
Answer:A
Whichformofemarketplacebringstogetherbuyersandsellersfromthesameindustry?
a. horizontal

47.

48.

49.

50.

51.

52.

b. Vertical
c. Integrated
d. Inclined
Answer:B
Whichtypeofaddappearsonawebpage?
a. popunderad
b. Popupad
c. Bannerad
d. Discountad
Answer:C
Whattypeofadappearsontopofawebpage?
a. popunderad
b. popupad
c. bannerad
d. discountad
Answer:B
Whattypeofadappearsunderawebpage?
a. popunderad
b. popupad
c. bannerad
d. discountad
Answer:A
Which,ifany,ofthefollowingtypesofadsarepeoplemostwillingtotolerate?
a. popunderad
b. popupad
c. bannerad
d. noneoftheabove
Answer:D
WhichofthefollowingisanInternetbasedcompanythatmakesiteasyforonepersontopay
anotherovertheInternet?
a. electroniccheck
b. electronicbillpresentmentandpayment
c. conversionrates
d. financialcybermediary
Answer:D
Whichofthefollowingisamethodoftransferringmoneyfromoneperson'saccountto
another?
a. electroniccheck
b. creditcard
c. etransfer
d. noneoftheabove
Answer:A

53. Anelectroniccheckisoneformofwhat?
a. ecommerce
b. onlinebanking
c. ecash
d. check
54. Ifyouneedtotransfermoneytoanotherpersonviatheinternet,whichofthefollowing
methodscouldyouuse?
a. financialcybermediary
b. electroniccheck
c. electronicbillpresentmentandpayment
d. alloftheabove
Answer:D
55. Whichofthefollowingpermitsthetransmissionofabill,alongwithpaymentofthatbill,tobe
conductedovertheInternet?
a. financialcybermediary
b. electroniccheck
c. electronicbillpresentmentandpayment
d. alloftheabove
Answer:C
56. Acombinationofsoftwareandinformationdesignedtoprovidesecurityandinformationfor
paymentiscalledawhat?
a. digitalwallet
b. popupad
c. shoppingcart
d. encryption
Answer:A
57. Whatisthenamefordirectcomputertocomputertransferoftransactioninformation
containedinstandardbusinessdocuments?
a. internetcommerce
b. ecommerce
c. transactioninformationtransfer
d. electronicdatainterchange
Answer:D
58. WhichofthefollowingisusedinB2Btopayforpurchases?
a. ecommerce
b. financialelectronicdatainterchange
c. electronicdataexchange
d. electronicchecks
Answer:B
59. Publickeyencryptionusesmultiplekeys.Onekeyisusedtoencryptdata,whileanotherisused
todecryptdata.Thekeyusedtoencryptdataiscalledthe_____key,whilethekeyusedto
decryptdataiscalledthe_____key.

encryption,decryption
private,public
encryption,public
public,private
Answer:D
SecureSocketsLayersdoeswhichofthefollowing?
a. createsasecure,privateconnectiontoawebserver
b. encryptsinformation
c. sendsinformationovertheinternet
d. alloftheabove
Answer:D
Whenatransactionisprocessedonline,howcanthemerchantverifythecustomer'sidentity?
a. usesecuresocketslayers
b. usesecureelectronictransactions
c. useelectronicdatainterchange
d. usefinancialelectronicdatainterchange
Answer:B
Thepracticeofforgingareturnaddressonanemailsothattherecipientisfooledinto
revealingprivateinformationistermed?
a. hacking
b. cracking
c. dumpsterdiving
d. spoofing
Answer:D
Whatisamodelofaproposedproduct,service,orsystem?
a. Prototyping
b. Prototype
c. Proofofconceptprototype
d. Sellingprototype
Answer:B
WhatisaninternalorganizationalInternetthatisguardedagainstoutsideaccessbyaspecial
securityfeaturecalledafirewall(whichcanbesoftware,hardware,oracombinationofthe
two)?
a. Client/servernetwork
b. Intranet
c. Extranet
d. Thinclient
Answer:B
Whatisanintranetthatisrestrictedtoanorganizationandcertainoutsiders,suchascustomers
andsuppliers?
a. Client/servernetwork
b. Intranet
a.
b.
c.
d.

60.

61.

62.

63.

64.

65.

66.

67.

68.

69.

70.

c. Extranet
d. Thinclient
Answer:C
WhatisadetailedprocessforrecoveringinformationoranITsystemintheeventofa
catastrophicdisastersuchasafireorflood?
a. Disasterrecoveryplan
b. Hotsite
c. Coldsite
d. Disasterrecoverycostcurve
Answer:A
Whatisaseparatefacilitythatdoesnothaveanycomputerequipmentbutisaplacewherethe
knowledgeworkerscanmoveafterthedisaster?
a. Disasterrecoveryplan
b. Hotsite
c. Coldsite
d. Disasterrecoverycostcurve
Answer:C
Whatisaseparateandfullyequippedfacilitywherethecompanycanmoveimmediatelyafter
thedisasterandresumebusiness?
a. Disasterrecoveryplan
b. Hotsite
c. Coldsite
d. Disasterrecoverycostcurve
Answer:B
Whatcharts(1)thecosttoyourorganizationoftheunavailabilityofinformationandtechnology
and(2)thecosttoyourorganizationofrecoveringfromadisasterovertime?
a. Disasterrecoveryplan
b. Hotsite
c. Coldsite
d. Disasterrecoverycostcurve
Answer:D
WhichfactordetermineswhenyourITsystemwillbeavailableforknowledgeworkersto
access?
a. Availability
b. Accessibility
c. Reliability
d. Noneoftheabove
Answer:A

71. WhichfactordetermineswhohastherighttoaccessdifferenttypesofITsystemsand
information?

a.
b.
c.
d.

Availability
Accessibility
Reliability
Scalability
Answer:B

72. WhichfactorensuresyourITsystemsarefunctioningcorrectlyandprovidingaccurate
information?
a. Availability
b. Accessibility
c. Reliability
d. Scalability
Answer:C
73. Whichfactorrepresentshowwellyoursystemcanadapttoincreaseddemands?
a. Availability
b. Accessibility
c. Reliability
d. Scalability
Answer:D
74. Whichfactorrepresentsasystem'sabilitytochangequickly?
a. Flexibility
b. Performance
c. Capacityplanning
d. Benchmark
Answer:A
75. Whatisasetofconditionsusedtomeasurehowwellaproductorsystemfunctions?
a. Flexibility
b. Performance
c. Capacityplanning
d. Benchmark
Answer:D
76. WhatdeterminesthefutureITinfrastructurerequirementsfornewequipmentandadditional
networkcapacity?
a. Flexibility
b. Performance
c. Capacityplanning
d. Benchmark
Answer:C
77. Whatautomatesbusinessprocesses?

Workflow
ASP
Workflowsystem
EIP
Answer:C
Whatdefinesallofthestepsorbusinessrules,frombeginningtoend,requiredforaprocessto
runcorrectly?
a. Workflow
b. EIP
c. Workflowsystem
d. SLA
Answer:A
Whatsendsworkassignmentsthroughanemailsystem?
a. Databasebasedenterpriseinformationportal
b. Messagingbasedenterpriseinformationportal
c. Databasebasedworkflowsystem
d. Messagingbasedworkflowsystem
Answer:D
Whichwillnotharmcomputerresources
a. firewall
b. Virus
c. Trojanhorse
d. Noneoftheabove
Answer:A
WhichisnotafunctionofERP?
a. Warehousing
b. sales
c. scheduling
d. Noneoftheabove
Answer:D
WhichisafunctionofERP?
a. Warehousing
b. sales
c. scheduling
d. alloftheabove
Answer:D
Whichofthefollowingistheprimarycharacteristicofanintranet?
a. Peopleoutsidetheorganizationcanaccessit
b. Peopleinsidetheorganizationcan'taccessit
c. Peopleoutsidetheorganizationcan'taccessit
d. Noneoftheabove
Answer:C
a.
b.
c.
d.

78.

79.

80.

81.

82.

83.

84. Whichconceptsuggeststhatdifferentapplicationsandcomputersystemsshouldbeableto
communicatewithoneanother?
a. Integration
b. Webservices
c. Scalability
d. Interoperability
Answer:D
85. Whichserviceencompassesalltechnologiesusedtotransmitandprocessinformationonan
acrossanetwork?
a. Interoperability
b. Scalability
c. Benchmarking
d. Webservices
Answer:D
86. Whichprocesscanpreventdatafromloseduetocomputerproblemsorhumanerrors?
a. backup
b. recovery
c. benchmarking
d. datacleansing
Answer:A
87. Whichprocessisusedtoreinstalldatafromacopywhentheoriginaldatahasbeenlost?
a. backup
b. recovery
c. benchmarking
d. datacleansing
Answer:B
88. Whatdescribesaprocessofcontinuouslymeasuringresultsandcomparingthoseresultsto
optimalperformancesothatactualperformancemaybeimproved?
a. Performance
b. Capacityplanning
c. Benchmarking
d. Datacleansing
Answer:C
89. Whoprotectssystemfromexternalthreats?
a. firewall
b. EDI
c. ERP
d. Scriptkiddies
Answer:A
90. Whobreaksintootherpeople'scomputersystemsandstealsanddestroysinformation?
a. Hackers
b. softwares

91.

92.

93.

94.

95.

96.

c. Hacktivists
d. Scriptkiddies
Answer:a
Whatissoftwarethatcomeshiddeninfreedownloadablesoftwareandtracksyouronline
movements,minestheinformationstoredonyourcomputer,orusesyourcomputer'sCPUand
storageforsometaskyouknownothingabout?
a. Weblog
b. Clickstream
c. AnonymousWebbrowsingservice
d. Noneoftheabove
Answer:D
ERPstandsfor
a. Enterpriseresolutionplanning
b. Enterprisereverseplanning
c. Enterpriseresourceplanning
d. Noneoftheabove
Answer:C
WhichisnotacomponentofERP?
a. Legacysystems
b. Boltonapplications
c. Operationaldatabase
d. Cybersoft
Answer:D
WhichisnotafunctionofERP?
a. Humanresourcemanagement
b. financial
c. warehousing
d. Noneoftheabove
Answer:D
Whatisatypeofvirusthatspreadsitself,notjustfromfiletofile,butfromcomputerto
computerviaemailandotherInternettraffic?
a. Computervirus
b. Worm
c. Denialofserviceattack
d. Noneoftheabove
Answer:B
WhatfloodsaWebsitewithsomanyrequestsforservicethatitslowsdownorcrashes?
a. Computervirus
b. Worm
c. Denialofserviceattack
d. Noneoftheabove
Answer:C

97. WhatharnessesfarflungcomputerstogetherbywayoftheInternetoravirtualprivatenetwork
toshareCPUpower,databases,anddatabasestorage?
a. Computervirus
b. Worm
c. Denialofserviceattack
d. Noneoftheabove
Answer:D
98. Whatconsistsoftheidentificationofrisksorthreats,theimplementationofsecuritymeasures,
andthemonitoringofthosemeasuresforeffectiveness?
a. Riskmanagement
b. Riskassessment
c. Security
d. Noneoftheabove
Answer:A
99. WhatistheprocessofevaluatingITassets,theirimportancetotheorganization,andtheir
susceptibilitytothreats,tomeasuretheriskexposureoftheseassets?
a. Riskmanagement
b. Riskassessment
c. Security
d. Noneoftheabove
Answer:B
100.
Whatistheprocessofmakingacopyoftheinformationstoredonacomputer?
a. Backup
b. Antivirus
c. Firewall
d. Biometrics
Answer:A
101.
Whatsoftwaredetectsandremovesorquarantinescomputerviruses?
a. Backup
b. Antivirus
c. Firewall
d. Biometrics
Answer:B
102.
Whatishardwareand/orsoftwarethatprotectscomputersfromintruders?
a. Backup
b. Antivirus
c. Firewall
d. Biometrics
Answer:C
103.
Whatistheuseofphysicalcharacteristicssuchasyourfingerprint,thebloodvessels
intheretinaofyoureye,thesoundofyourvoice,orperhapsevenyourbreathtoprovide
identification?

Backup
Antivirus
Firewall
Biometrics
Answer:D
104.
Allofthefollowingareconsideredbiometrics,except:
a. Fingerprint
b. Retina
c. Password
d. Voice
Answer:C
105.
Whatscramblesthecontentsofafilesoyoucan'treaditwithouthavingtheright
decryptionkey?
a. Encryption
b. Intrusiondetectionsoftware
c. Securityauditingsoftware
d. Alloftheabove
Answer:A
106.
Whatisanencryptionsystemthatusestwokeys:apublickeythateveryonecanhave
andaprivatekeyforonlytherecipient?
a. Encryption
b. Publickeyencryption
c. Intrusiondetectionsoftware
d. Securityauditingsoftware
Answer:B
107.
Whatlooksforpeopleonthenetworkwhoshouldn'tbethereorwhoareacting
suspiciously?
a. Encryption
b. Publickeyencryption
c. Intrusiondetectionsoftware
d. Securityauditingsoftware
Answer:C
108.
Whatchecksoutyourcomputerornetworkforpotentialweaknesses?
a. Encryption
b. Publickeyencryption
c. Securityauditingsoftware
d. Noneoftheabove
Answer:C
109.
Whichofthefollowingtovirusesharm?
a. Yourkeyboard
b. Yourmonitor
c. Yourprocessor
a.
b.
c.
d.

110.

111.

112.

113.

114.

115.

116.

d. Virusesdonotharmanyoftheabove
Answer:D
Whichofthefollowingcanavirusdo?
a. Hurtyourhardware
b. Hurtanyfilestheyweren'tdesignedtoattack
c. Infectfilesonwriteprotecteddisks
d. Noneoftheabove
Answer:D
Insimpleterms,whatdoesriskassessmentask?
a. Whatcangowrong?
b. Howlikelyisittogowrong?
c. Whatarethepossibleconsequencesifitdoesgowrong?
d. Alloftheabove
Answer:D
Whichofthefollowingisacharacteristicofafirewall?
a. Examineseachmessageasitseeksentrancetothenetwork
b. Blocksmessageswithoutthecorrectmarkingsfromenteringthenetwork
c. DetectscomputerscommunicatingwiththeInternetwithoutapproval
d. Alloftheabove
Answer:D
Whichofthefollowingarewaystoproveaccessrights?
a. Whatyouknow,likeapassword
b. Whatyouhave,likeanATMcard
c. Whatyoulooklike
d. Alloftheabove
Answer:D
Whichitemcanapasswordbeusedtoprotect?
a. Network
b. File
c. Folder
d. Alloftheabove
Answer:D
WhichisthemostimportantcomponentofIT?
a. Information
b. People
c. Informationtechnology
d. Computers
Answer:B
Whichofthefollowingappliestotheimplementationofanidea?
a. Copyright
b. Intellectualproperty
c. Patent

d. Denialofserviceattack
Answer:C
117.
Whenyoupurchasecopyrightedsoftware,whatactuallyareyoupayingfor?
a. ThecostoftheCDs,manuals,anddevelopmentofthesoftware
b. ThecostoftheCDs,manuals,andashareofthecostofthesoftwaredevelopment
c. Ashareofthecostofsoftwaredevelopment
d. Alloftheabove
Answer:D
118.
Whichofthefollowingisnotadimensionofprivacy?
a. Needforpersonalspace
b. Needtofeelincontrolofourpossessions
c. Needtofeelincontrolofourpersonalinformation
d. Alloftheabovearedimensionsofprivacy
Answer:D
119.
Whichofthefollowingcapturesscreenimages?
a. Keylogger
b. Packetsniffer
c. Loganalysistools
d. Screencapturesoftware
Answer:D
120.
Whichofthefollowingexaminesinformationpassingthroughswitches,hubs,or
routers?
a. Keylogger
b. Packetsniffer
c. Loganalysistools
d. Screencaptures
Answer:B
121.
Whichofthefollowingrecordslogonsanddeletions?
a. Keylogger
b. Packetsniffer
c. Loganalysistools
d. Screencaptures
Answer:C
122.
Emailmessagesmaybestoredonwhichofthefollowingcomputers?
a. Sender'scomputer
b. Sender'sserver
c. Recipient'sserver
d. Alloftheabove
Answer:D
123.
Whatmightidentitythievesdowithyouridentity?
a. Applyforandusecreditcards
b. Applyforaloan

c. Changetheiridentity
d. Alloftheabove
Answer:D
124.
Whichofthefollowingisnotacommonapproachtophishing?
a. Sendanofficiallookingemailaskingforconfidentialinformation
b. Askpeopletofilloutandreturnafakeletterusingpostalmail
c. Askpeopletoclickalinkinanemailtoopenasubmissionformonawebpage
d. Alloftheaboveareuncommonapproachestophishing
Answer:B
125.
Atechniqueusedtogainpersonalinformationforthepurposeofidentitytheft,oftenby
email,iscalled?
a. Phishing
b. Carding
c. Brandspoofing
d. Alloftheabove
Answer:D
126.
Companiescangatherinformationaboutemployeesandpotentialemployeesfrom
whichofthefollowingplaces?
a. Jobapplications
b. Creditreports
c. CompaniesthattrackWebsurfers
d. Alloftheabove
Answer:D
127.
a.
b.
c.
d.
128.
a.
b.
c.
d.
129.
a.
b.
c.
d.

Cyberslackingconsistsofwhatactivities?
Visitinginappropriatewebsites
Visitingnewssites
Chattingonlinewithothersaboutnonworktopics
Alloftheabove
Answer:D
Cookiesareusedtodowhichofthefollowing?
StoreyourIDandpasswordforsubsequentlogonstothesite
Storecontentsofelectronicshoppingcarts
Totrackwebactivity
Alloftheaboveandmore
Answer:D
Unsolicitedemailiscalledwhat?
Junkmail
Spam
Extramail
Noneoftheabove

130.
a.
b.
c.
d.

Answer:B
WhatisthenameofthenewantiSpambill?
NoSpam
CANSpam
SpamAway
StopSpam
Answer:B

131.
Whatisthelegalprotectionaffordedanexpressionofanidea,suchasasong,video
game,andsometypesofproprietarydocuments?
a. Ethics
b. Intellectualproperty
c. Copyright
d. FairUseDoctrine
Answer:C
132.
Whatistheunauthorizeduse,duplication,distributionorsaleofcopyrightedsoftware?
a. FairUseDoctrine
b. Piratedsoftware
c. Counterfeitsoftware
d. Privacy
Answer:B
133.
Whatisaprogram,wheninstalledonacomputer,recordseverykeystrokeandmouse
click?
a. Keyloggersoftware
b. Hardwarekeylogger
c. Cookie
d. Adware
Answer:A
134.
Whatissoftwareyoudon'twanthiddeninsidesoftwareyoudowant?
a. Adware
b. Trojanhorsesoftware
c. Spyware
d. Alloftheabove
Answer:D
135.
Whatisanelectronicrepresentationofcash?
a. Digitalcash
b. Electroniccash
c. Ecash
d. Alloftheabove
Answer:D
136.
Whatisafullyequippedcomputerthatyouwearasapieceofclothingorattachedtoa

pieceofclothingsimilartothewayyouwouldcarryyourcellphoneonyourbelt?
a. Wearablecomputer
b. GPS
c. Implantchip
d. Noneoftheabove
Answer:A
137.
Whatisatechnologyenabledmicrochipimplantedintothehumanbody?
a. Wearablecomputer
b. GPS
c. Implantchip
d. Noneoftheabove
Answer:C
138.
Whichofthefollowingisnotareasonwhydigitalcashhasturnedouttobeextremely
difficult?
a. Ifyoursystemcrashesyouloseyourmoney
b. Thereisonlyonestandard
c. Digitalcashmakesmoneylaunderingeasy
d. DigitalcashtravelsacrossthevastInternetandissusceptibletobeginstolen
Answer:B
139.
Smartcardisbetterprotectedthanothercardsusing
a. Encryption
b. Firewall
c. Hub
d. Alltheabove
Answer:A
140.
Trustcardisintroducedby
a. BSNLanditzcash
b. BSNLandoxicash
c. BSNLonly
d. None
Answer:A
141.
PaisaPayisofferedonlyby
a. Homeshop18.com
b. eBay.in
c. amazon.com
d. none
Answer:B
142.
TheEpaymentmechanismwidelyusedinB2Bis
a. Creditcard
b. Debitcard
c. Mastercard

d. Echeque
143.

144.

145.

146.

147.

148.

149.

Answer:D
Whichtypeoftechnologywillincreaseportabilityandmobility?
a. Implantchips
b. Micropayments
c. Internetphonecalls
d. Alloftheabove
Answer:D
Whichofthefollowinganaccuratestatementaboutinternetphonecalls?
a. Theyarepossiblebutnotyetfree
b. Theyarenotpossible
c. Theyarecurrentlystandardpractice
d. Noneoftheaboveisanaccuratestatementaboutinternetphonecalls
Answer:A
Whatarethemostcommonlyusedinputdevicestoday?
a. Keyboard
b. Mouse
c. Alloftheabove
d. Noneoftheabove
Answer:C
Whichofthefollowingcanbeusedtohelpidentifypeopleinacrowd?
a. Biochip
b. Implantchip
c. Facialrecognitionsoftware
d. Visionchip
Answer:C
Whichoneisalsoknownasplasticmoney?
a. Creditcard
b. Debitcard
c. Papercash
d. Alloftheabove
Answer:A
Echequesare
a. Prepaid
b. Postpaid
c. Bothprepaidandpostpaid
Answer:A
Digitalsignatureisa
a. Digitalid,sendasanattachmenttoawebpage/email/message
b. Isusedforverifyingtheattachmentssendusingweb
c. Bothaandb
d. Noneofthese

Answer:C
150.
a.
b.
c.
d.
151.
a.
b.
c.
d.
152.
a)
b)
c)
d)

Whichoneisthecomponentofcybercashpaymentsystem
CCusersoftware
CCmerachantsoftware
CCServerSoftware
Alloftheabove
Answer:D
Thepresenceofmakethesmartcardsmart.
Memory
Microchip
Ecash
Noneoftheabove
Answer:B
Thesmartcardwhichuseantennaforreadingandwritingdata
Contactsmartcard
Contactlesssmartcard
Proximitysmartcard
BothBandC
Answer:D

153.

cardisreadonly.
a) Contactsmartcard

154.

b) Contactlesssmartcard
c) Proximitysmartcard
d) BothBandC
Answer:C
Whichofthesmartcardusesasimlikestructureforreadingandwritingdata
a) Contactsmartcard
b) Contactlesssmartcard
c) Proximitysmartcard
d) BothBandC

155.
a.
b.
c.
d.
156.

Answer:A

Whichisnotafeatureofecommerce
SCM
EDI
WWW
BPR
Answer:D
WhatisIstandsinCIAofsmartcard?

a.
b.
c.
d.

International
Integrity
Identity
Noneoftheabove
Answer:B

157.

WhatisAstandsinCIAofsmartcard?
a. auditing
b. authenticity
c. authorized
d. Noneoftheabove
Answer:B
158.
WhatisCstandsinCIAofsmartcard?
a. confidentiality
b. conference
c. congress
d. Noneoftheabove
Answer:A
159.
WhichoneisthethirdpartypaymentproviderswhoofferdigitalwalletsforE
merchants
a. Oxicash
b. PayMate
c. PayPass
d. Alltheabove
Answer:D
160.
Whichisusedtoidentifymobilemoney
a. MCID
b. MMID
c. RSID
d. NONEOFTHEABOVE
Answer:B
161.
isanactthatposesdangertocomputerassets.
a. Threat
b. Danger
c. Error
d. Noneoftheabove
Answer:A
162.
Whichoneisnotaencryptiontechnique
a. RSA
b. DES
c. AES
d. NONEOFTHEABOVE

Answer:D

163.

Whichoneisnotusedasasecuritymechanism?
a. Encryption
b. Cryptography
c. Wallets
d. Digitalsignature
Answer:C
164.
Whichegovernmentarenaisbeingusedwhengovernmentalagenciessendoutand
acceptbidsforwork?
a) G2G
b) G2B
c) G2C
d) G2G
Answer:B
165.
a.
b.
c.
d.
166.
a.
b.
c.
d.
167.
a.
b.
c.
d.
168.
a.
b.
c.
d.

Secretkeyisusedfor
Publickeycryptography
Privatekeycryptography
Asymmetrickeycryptography
Noneofthese
Answer:B
Whichoneisacommunicationchannelthreat?
Snifferprograms
Cybervandalism
Integritythreats
Alloftheabove
Answer:D
Whichoneisacommunicationchannelsecurityprotocol?
SSL
SHTTP
SET
ALLOFTHEABOVE
Answer:D
Theprotocolwhichallowsthefiletransferbetweencomputersis
TCP/IP
FTP
HTTP
SOA
Answer:B

169.
a.
b.
c.
d.
170.
a.
b.
c.
d.
171.
a.
b.
c.
d.
172.
a.
b.
c.
d.
173.
a.
b.
c.
d.
174.
a.
b.
c.
d.
175.
a.
b.
c.
d.

EBankingisalsoknownas
ATMs
Netbanking
Traditionalbanking
Noneofthese
Answer:B
isbackboneofallEpaymentsinEcommerce
EFT
EPS
PayPal
Noneofthese
Answer:B
Whichoneisaclientlevelthreat?
Maliciouscode
Viruses
Activecontents
Alltheabove
Answer:D
Whichoneisnotanencryptiontechnique?
RSA
DES
AES
FTP
Answer:D
Whichoneisanencryptiontechnique?
RSA
DES
AES
Alloftheabove
Answer:D
Whichoneisnotaserverlevelthreat?
Maliciouscode
CGIthreats
Databasethreats
Bufferoverflows
Answer:A
Whichoneisnotaphysicalthreat?
Hacking
Storm
Phishing
Noneoftheabove
Answer:A

176.
a.
b.
c.
d.
177.
a.
b.
c.
d.
178.
a.
b.
c.
d.
179.
a.
b.
c.
d.
180.
a.
b.
c.
d.
181.
a.
b.
c.
d.
182.
a.
b.
c.
d.

Whichoneisaphysicalthreat?
Phishing
Storm
Earthquake
Alltheabove
Answer:D
Whichoneisalogicalthreat?
Hacking
Storm
Phishing
Noneoftheabove
Answer:A
Thebasicelementsofwebsiteis
Homepage
Webpages
Linksandbanners
Alltheabove
Answer:D
WhichoneisathreatforEcommerce
Trojanhorse
firewall
encryption
None
Answer:A
Securecommunicationmeans
Protecttransmissionofcreditcardnumber
Guaranteeprivacyofcustomer
Unauthorizedaccessofpaymentdetails
Alltheabove
Answer:D
Whichoneisnotanofflinepaymentmode?
Cashondelivery
Cashbeforedelivery
Demanddrafts
echeque
Answer:D

Whichoneisanofflinepaymentmode?
Cashondelivery
Cashbeforedelivery
Creditcard
Bothaandb
Answer:D

183.
a.
b.
c.
d.
184.
a.
b.
c.
d.
185.
a.
b.
c.
d.
186.
a.
b.
c.
d.
187.
a.
b.
c.
d.
188.
a.
b.
c.
d.
189.
a.
b.
c.
d.

Whichoneisnotanonlinepaymentmode?
Cashondelivery
Debitcard
Creditcard
echeque
Answer:A
Whichoneisanonlinepaymentmode?
Cashondelivery
Cashbeforedelivery
Demanddrafts
echeque
Answer:D
whichoneisnotanEpaymentmethodusedinIndia
Debitcard
Creditcard
echeque
none
Answer:D
OTPstandsfor
OnTimePassword
OnTimeprocessing
Onetimeprocessor
None
Answer:A
WhichoneisnotathreatforEcommerce
Trojanhorse
Viruses
Worm
None
Answer:D
PrivateKeycryptographyisalsoknownascryptography.
Publickey
Symmetric
Asymmetric
None
Answer:B
Publickeycryptographyisalsoknownascryptography.
Privatekey
Symmetric
Asymmetric
None
Answer:C

190.
Whatisthelegalprotectionaffordedanexpressionofanidea,suchasasong,video
game,andsometypesofproprietarydocuments?
a. Ethics
b. Intellectualproperty
c. Copyright
d. FairUseDoctrine
Answer:C
191.
Cyberslackingconsistsofwhatactivities?
a. Visitinginappropriatewebsites
b. Visitingnewssites
c. Chattingonlinewithothersaboutnonworktopics
d. Alloftheabove
Answer:D
192.
Whatisanarrangementmadebetweenecommercesitesthatdirectusersfromone
sitetotheother?
a. Spam
b. Viralmarketing
c. Affiliateprograms
d. Noneoftheabove
Answer:C
193.
Whichtypedealswithauction?
a. B2B
b. B2C
c. C2B
d. C2C
Answer:D
194.
WhichoneisnotalayerofEcommerceinfrastructure
a. Physicallayer
b. Productlayer
c. Servicelayer
d. None

195.

196.

Answer:D

Whichwillharmcomputerresources
a. Worm
b. Virus
c. Trojanhorse
d. Alltheabove

Answer:D

Thestudyofencryptioniscalled

a.
b.
c.
d.
197.
a.
b.
c.
d.
198.
a.
b.
c.
d.

199.
a.
b.
c.
d.

Decryption
Cryptography
Firewall
Alltheabove
Answer:B
DuringEcommercetransactionweshouldensure
Integrity
Security
Confidentiality
Alltheabove
Answer:D
Thevirusthatarecommonlyfoundinworddocumentsarecalled
Macro
Trojanhorse
Scriptvirus
Noneoftheabove

Thevirusthatareattachedwithvbandjavafilesarecalled
Macro
Trojanhorse
Scriptvirus
Noneoftheabove

200.
a.
b.
c.
d.

Answer:A

Answer:C

Thevirusesspreadsthrough
Mails
Pendrivesandcds
Websites
Alltheabove
Answer:D

You might also like