New ! Computer Applications MCQ Practise Tests

E-Commerce Security Systems Model Question Paper 1

12th Standard

    Reg.No. :
  •  
  •  
  •  
  •  
  •  
  •  

Computer Applications

Time : 01:00:00 Hrs
Total Marks : 50
    5 x 1 = 5
  1. Which of the following is not a security element involved in E-Commerce?

    (a)

    Authenticity

    (b)

    Confidentiality

    (c)

    Fishing

    (d)

    Privacy

  2. Secure Electronic Transaction (SET) was developed in

    (a)

    1999

    (b)

    1996

    (c)

    1969

    (d)

    1997

  3. Which of the following is true about Ransomware

    (a)

    Ransomware is not a subset of malware

    (b)

    Ransomware deletes the file instantly

    (c)

    Typopiracy is a form of ransomware

    (d)

    Hackers demand ransom from the victim

  4. _________is a process of taking down an E-Commerce site by sendlng continuous overwhelming request to its server.

    (a)

    RSA

    (b)

    DES

    (c)

    DDoS

    (d)

    CA

  5. ________is a set of protocols that safely guide E-Commerce transactions through the Internet.

    (a)

    E-Commerce security

    (b)

    Tampering

    (c)

    Payment Frauds

    (d)

    Cybersquatting

  6. 5 x 2 = 10
  7. Write a short note on typopiracy

  8. Write about digital signature

  9. Who introduced DES?

  10. Who is 3D-Secure?

  11. By whom was SSL standard developed?

  12. 5 x 3 = 15
  13. Write a note on certification authorities (CA)

  14. List some E-Commerce Security Threats?

  15. Explain 3D secure payment protocols

  16. Define E-commerce security.

  17. What Is the use of digital signature?

  18. 4 x 5 = 20
  19. Explain encryption technology.

  20. Briefly explain SSL.

  21. What are the subsets of Payment frauds?

  22. What is Distributed Denial of Service (DDoS) Attacks? Or What is network flooding?

*****************************************

TN 12th Standard Computer Applications free Online practice tests

Reviews & Comments about 12th Standard Computer Applications - E-Commerce Security Systems Model Question Paper 1

Write your Comment