New ! Computer Applications MCQ Practise Tests

E-Commerce Security Systems Model Question Paper

12th Standard

    Reg.No. :
  •  
  •  
  •  
  •  
  •  
  •  

Computer Applications

Time : 02:00:00 Hrs
Total Marks : 50
    6 x 1 = 6
  1. In E-Commerce, when a stolen credit card is used to make a purchase it is termed as

    (a)

    Friendly fraud

    (b)

    Clean fraud

    (c)

    Triangulation fraud

    (d)

    Cyber squatting

  2. PGP stands for

    (a)

    Pretty Good Privacy

    (b)

    Pretty Good Person

    (c)

    Private Good Privacy

    (d)

    Private Good Person

  3. __________ protocol is used for securing credit cards transactions via the Internet

    (a)

    Secure Electronic Transaction (SET)

    (b)

    Credit Card Verification

    (c)

    Symmetric Key Encryption

    (d)

    Public Key Encryption

  4. 3-D Secure, a protocol was developed by

    (a)

    Visa

    (b)

    Master

    (c)

    Rupay

    (d)

    PayTM

  5. Which of the following is true about Ransomware

    (a)

    Ransomware is not a subset of malware

    (b)

    Ransomware deletes the file instantly

    (c)

    Typopiracy is a form of ransomware

    (d)

    Hackers demand ransom from the victim

  6. Typoplracy Is variant of__________

    (a)

    Payment Frauds

    (b)

    Tampering

    (c)

    Cybersquatting

    (d)

    All of the above

  7. 2 x 2 = 4
  8. Assertion (A): Digital signatures are used to verify the trust worthiness of the data being sent.
    Reason (R): A digital signature is a mechanism that is used to verify that a particular digital document, message or transaction is authentic.
    Codes:
    a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
    b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
    c) (A) is true and (R) is false
    d) (A) is false and (R) is true

  9. Assertion (A): A digital certificate is created using a Digital Signature Standard (DSS). It uses a SHA-l1 or SHA-2 algorithm for encrypting and decrypting the message.
    Reason(R): A digital certificate consist of certificate's owner name and public key, expiration date, a Certificate Authority's name, a Certificate Authority's digital signature.
    Codes:
    a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
    b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
    c) (A) is true and (R) is false
    d) (A) is false and (R) is true

  10. 3 x 2 = 6
  11. a) Cyber Squatting
    b) Integrity
    c) Non-repudiation
    d) Privacy

  12. a) Information leakage
    b) Confidentiality
    c) Payment frauds
    d) Tampering

  13. a) Malicious code threats
    b) DDoS
    c) Cyber Squatting
    d) Confidentiality

  14. 5 x 2 = 10
  15. Write a short note on typopiracy

  16. Define non-repudiation.

  17. Write about digital signature

  18. What is DES?

  19. What is SET?

  20. 3 x 3 = 9
  21. Write a note on certification authorities (CA)

  22. Differentiate asymmetric and symmetric algorithms.

  23. Write a note on PGP

  24. 3 x 5 = 15
  25. Explain encryption technology.

  26. Differenticate digital signatures and digital certificates.

  27. Briefly explain SSL.

*****************************************

TN 12th Standard Computer Applications free Online practice tests

Reviews & Comments about 12th Standard Computer Applications - E-Commerce Security Systems Model Question Paper

Write your Comment