New ! Computer Applications MCQ Practise Tests



E-Commerce Security Systems 1 Mark Book Back Question Paper With Answer Key

12th Standard

    Reg.No. :
  •  
  •  
  •  
  •  
  •  
  •  

Computer Applications

Time : 00:15:00 Hrs
Total Marks : 10

    Multiple Choice Question

    10 x 1 = 10
  1. In E-Commerce, when a stolen credit card is used to make a purchase it is termed as

    (a)

    Friendly fraud

    (b)

    Clean fraud

    (c)

    Triangulation fraud

    (d)

    Cyber squatting

  2. Which of the following is not a security element involved in E-Commerce?

    (a)

    Authenticity

    (b)

    Confidentiality

    (c)

    Fishing

    (d)

    Privacy

  3. Asymmetric encryption is also called as

    (a)

    Secure Electronic Transaction

    (b)

    Certification Authority

    (c)

    RSA algorithm

    (d)

    Payment Information

  4. The security authentication technology does not include
    i) Digital Signatures
    ii) Digital Time Stamps
    iii) Digital Technology
    iv) Digital Certificates

    (a)

    i, ii & iv

    (b)

    ii & iii

    (c)

    i, ii & iii

    (d)

    all the above

  5. PGP stands for

    (a)

    Pretty Good Privacy

    (b)

    Pretty Good Person

    (c)

    Private Good Privacy

    (d)

    Private Good Person

  6. __________ protocol is used for securing credit cards transactions via the Internet

    (a)

    Secure Electronic Transaction (SET)

    (b)

    Credit Card Verification

    (c)

    Symmetric Key Encryption

    (d)

    Public Key Encryption

  7. Secure Electronic Transaction (SET) was developed in

    (a)

    1999

    (b)

    1996

    (c)

    1969

    (d)

    1997

  8. The websites secured by Secure Socket Layer protocols can be identified using

    (a)

    html://

    (b)

    http://

    (c)

    htmls://

    (d)

    https://

  9. 3-D Secure, a protocol was developed by

    (a)

    Visa

    (b)

    Master

    (c)

    Rupay

    (d)

    PayTM

  10. Which of the following is true about Ransomware

    (a)

    Ransomware is not a subset of malware

    (b)

    Ransomware deletes the file instantly

    (c)

    Typopiracy is a form of ransomware

    (d)

    Hackers demand ransom from the victim

*****************************************

Reviews & Comments about 12th Standard Computer Applications English Medium - E-Commerce Security Systems 1 Mark Book Back Question Paper and Answer Key 2022 - 2023

Write your Comment