E-Commerce Security Systems Book Back Questions

12th Standard EM

    Reg.No. :
  •  
  •  
  •  
  •  
  •  
  •  

Computer Applications

Time : 00:45:00 Hrs
Total Marks : 30
    5 x 1 = 5
  1. In E-Commerce, when a stolen credit card is used to make a purchase it is termed as

    (a)

    Friendly fraud

    (b)

    Clean fraud

    (c)

    Triangulation fraud

    (d)

    Cyber squatting

  2. __________ protocol is used for securing credit cards transactions via the Internet

    (a)

    Secure Electronic Transaction (SET)

    (b)

    Credit Card Verification

    (c)

    Symmetric Key Encryption

    (d)

    Public Key Encryption

  3. The websites secured by Secure Socket Layer protocols can be identified using

    (a)

    html://

    (b)

    http://

    (c)

    htmls://

    (d)

    https://

  4. 3-D Secure, a protocol was developed by

    (a)

    Visa

    (b)

    Master

    (c)

    Rupay

    (d)

    PayTM

  5. Which of the following is true about Ransomware

    (a)

    Ransomware is not a subset of malware

    (b)

    Ransomware deletes the file instantly

    (c)

    Typopiracy is a form of ransomware

    (d)

    Hackers demand ransom from the victim

  6. 3 x 2 = 6
  7. Write about information leakage in E-Commerce

  8. Define non-repudiation.

  9. Write about digital signature

  10. 3 x 3 = 9
  11. Write a note on certification authorities (CA)

  12. Differentiate asymmetric and symmetric algorithms.

  13. Explain 3D secure payment protocols

  14. 2 x 5 = 10
  15. Write about dimensions of E-Commerce Security

  16. Briefly explain SSL.

*****************************************

TN 12th Standard EM Computer Applications free Online practice tests

Reviews & Comments about 12th Computer Applications - E-Commerce Security Systems Book Back Questions

Write your Comment