New ! Computer Applications MCQ Practise Tests



E-Commerce Security Systems 1 Mark Creative Question Paper With Answer Key

12th Standard

    Reg.No. :
  •  
  •  
  •  
  •  
  •  
  •  

Computer Applications

Time : 00:20:00 Hrs
Total Marks : 15

    Multiple Choice Question

    15 x 1 = 15
  1. A digital certificate also known as________

    (a)

    Public key certificate

    (b)

    Asymmetric Key

    (c)

    Symmetric Key

    (d)

    All of the above

  2. Which of the following is a process of taking down an E-Commerce site by sending continuous overwhelming request to its server?

    (a)

    RSA

    (b)

    DES

    (c)

    DDoS

    (d)

    CA

  3. The illegal practice of registering an internet is called

    (a)

    Tampering

    (b)

    Cyber squatting

    (c)

    Typopiracy

    (d)

    All of the above

  4. ________is a set of protocols that safely guide E-Commerce transactions through the Internet.

    (a)

    E-Commerce security

    (b)

    Tampering

    (c)

    Payment Frauds

    (d)

    Cybersquatting

  5. Typopiracy is variant of__________

    (a)

    Payment Frauds

    (b)

    Tampering

    (c)

    Cybersquatting

    (d)

    All of the above

  6. E-Commerce transactions based on Network Resources have been accepted by the _____.

    (a)

    Public

    (b)

    Private

    (c)

    Both public and private

    (d)

    None of the above

  7. To an E-Business security threats not only result in loss of ________ but also in reputation.

    (a)

    Internet

    (b)

    Revenue

    (c)

    Human error

    (d)

    Accidental

  8. Intercepting and stealing of online documents is called ______.

    (a)

    Phishing

    (b)

    Payment frauds

    (c)

    Information leakage

    (d)

    Malicious

  9. Destroying the authenticity and integrity of the data is called

    (a)

    Tampering

    (b)

    DDOS

    (c)

    Triangulation

    (d)

    Cyber squatting

  10. Which is a process of taking down an E-Commerce site by sending continuous overwhelming request to its server?

    (a)

    E-Commerce

    (b)

    DDOS

    (c)

    Information

    (d)

    Tampering

  11. Which of the following refers to unauthorized intrusion into a computer or a network?

    (a)

    Hacking

    (b)

    Hackers

    (c)

    Authenticity

    (d)

    Integrity

  12. Which of the following is a variant of cyber squatting?

    (a)

    Typopriracy

    (b)

    Tampering

    (c)

    Both A & B

    (d)

    None of the above

  13. Encryption technology converts _______ text into meaningless ciphertext.

    (a)

    Algorithm

    (b)

    Ciphertext

    (c)

    Plaintext

    (d)

    Protection text

  14. At present how many encryption technologies are widely used?

    (a)

    Two

    (b)

    Seven

    (c)

    One

    (d)

    Five

  15. DES uses ______ data encryption method.

    (a)

    Asymmetric key

    (b)

    Symmetric key

    (c)

    Plaintext key

    (d)

    Ciphertext key

*****************************************

Reviews & Comments about 12th Standard Computer Applications English Medium -E-Commerce Security Systems 1 Mark Creative Question Paper and Answer Key 2022 - 2023

Write your Comment