New ! Computer Applications MCQ Practise Tests



E-Commerce Security Systems Book Back Questions

12th Standard

    Reg.No. :
  •  
  •  
  •  
  •  
  •  
  •  

Computer Applications

Time : 00:45:00 Hrs
Total Marks : 30
    5 x 1 = 5
  1. In E-Commerce, when a stolen credit card is used to make a purchase it is termed as

    (a)

    Friendly fraud

    (b)

    Clean fraud

    (c)

    Triangulation fraud

    (d)

    Cyber squatting

  2. __________ protocol is used for securing credit cards transactions via the Internet

    (a)

    Secure Electronic Transaction (SET)

    (b)

    Credit Card Verification

    (c)

    Symmetric Key Encryption

    (d)

    Public Key Encryption

  3. The websites secured by Secure Socket Layer protocols can be identified using

    (a)

    html://

    (b)

    http://

    (c)

    htmls://

    (d)

    https://

  4. 3-D Secure, a protocol was developed by

    (a)

    Visa

    (b)

    Master

    (c)

    Rupay

    (d)

    PayTM

  5. Which of the following is true about Ransomware

    (a)

    Ransomware is not a subset of malware

    (b)

    Ransomware deletes the file instantly

    (c)

    Typopiracy is a form of ransomware

    (d)

    Hackers demand ransom from the victim

  6. 3 x 2 = 6
  7. Write about information leakage in E-Commerce

  8. Define non-repudiation.

  9. What is digital signature?

  10. 3 x 3 = 9
  11. Write a note on certification authorities (CA).

  12. Differentiate asymmetric and symmetric algorithms.

  13. Explain 3D secure payment protocols

  14. 2 x 5 = 10
  15. Write about dimensions of E-Commerce Security.

  16. Briefly explain SSL.

*****************************************

Reviews & Comments about 12th Computer Applications - E-Commerce Security Systems Book Back Questions

Write your Comment