You are on page 1of 31

ECommerce

BCom

IIISem
MultipleChoiceQuestions

1. Whichofthefollowingdescribesecommerce?
a. Doingbusinesselectronically
b. Doingbusiness
c. Saleofgoods
d. Alloftheabove
Answer:A
2. Whichofthefollowingispartofthefourmaintypesforecommerce?
a. B2B
b. B2C
c. C2B
d. Alloftheabove
Answer:D
3. WhichsegmentdoeBay,Amazon.combelong?
a. B2Bs
b. B2Cs
c. C2Bs
d. C2Cs
Answer:B
4. Whichtypeofecommercefocusesonconsumersdealingwitheachother?
a. B2B
b. B2C
c. C2B
d. C2C
Answer:D
5. WhichsegmentiseBayanexample?
a. B2B
b. C2B
c. C2C
d. Noneoftheabove
Answer:D
6. Whichtypedealswithauction?
a. B2B
b. B2C
c. C2B
d. C2C
Answer:D
7. InwhichwebsiteGlobalEasyBuyisfacilitated?
a. Ebay.com
b. Amazon.com
c. Yepme.com
d. Noneofthese
Answer:A
8. ThebestproductstosellinB2Cecommerceare:
a. Smallproducts
b. Digitalproducts
c. Specialtyproducts
d. Freshproducts
Answer:B
9. WhichproductsarepeoplemostlikelytobemoreuncomfortablebuyingontheInternet?
a. Books
b. Furniture
c. Movies
d. Alloftheabove
Answer:B
10. WhichproductsarepeoplemostlikelytobecomfortablebuyingontheInternet?
a. Books
b. PCs
c. CDs
d. Alloftheabove
Answer:D
11. DigitalproductsarebestsuitedforB2Cecommercebecausethey:
a. Arecommoditylikeproducts
b. Canbemasscustomizedandpersonalized
c. Canbedeliveredatthetimeofpurchase
d. Alloftheabove
Answer:D
12. Thesolutionforallbusinessneedsis
a. EDI
b. ERP
c. SCM
d. Noneoftheabove
Answer:B
13. AllofthefollowingaretechniquesB2Cecommercecompaniesusetoattractcustomers,
except:
a. Registeringwithsearchengines
b. Viralmarketing
c. Onlineads
d. Virtualmarketing
Answer:D
14. WhichisafunctionofEcommerce
a. marketing
b. advertising
c. warehousing
d. alloftheabove
Answer:D
15. WhichisnotafunctionofEcommerce
a. marketing
b. advertising
c. warehousing
d. noneoftheabove
Answer:C
16. Whichtermrepresentsacountofthenumberofpeoplewhovisitonesite,clickonanad,and
aretakentothesiteoftheadvertiser?
a. Affiliateprograms
b. Clickthrough
c. Spam
d. Alloftheabove
Answer:B
17. WhatisthepercentageofcustomerswhovisitaWebsiteandactuallybuysomethingcalled?
a. Affiliateprograms
b. Clickthrough
c. Spam
d. Conversionrate
Answer:D
18. Whatarematerialsusedinproductioninamanufacturingcompanyorareplacedontheshelf
forsaleinaretailenvironment?
a. Directmaterials
b. Indirectmaterials
c. EDI
d. Noneoftheabove
Answer:A
19. Whatarematerialsthatarenecessaryforrunningamoderncorporation,butdonotrelateto
thecompany'sprimarybusinessactivities?
a. Directmaterials
b. Indirectmaterials
c. EDI
d. Noneoftheabove
Answer:B
20. Whatareballpointpenspurchasedbyaclothingcompany?
a. Directmaterials
b. Indirectmaterials
c. EDI
d. Noneoftheabove
Answer:B
21. Whatisanothernamefor?
a. Directmaterials
b. Indirectmaterials
c. EDI
d. Noneoftheabove
Answer:B
22. Whatistheprocessinwhichabuyerpostsitsinterestinbuyingacertainquantityofitems,and
sellerscompeteforthebusinessbysubmittingsuccessivelylowerbidsuntilthereisonlyone
sellerleft?
a. B2Bmarketplace
b. Intranet
c. Reverseauction
d. Internet
Answer:C
23. Whatareplasticcardsthesizeofacreditcardthatcontainsanembeddedchiponwhichdigital
informationcanbestored?
a. Customerrelationshipmanagementsystemscards
b. Egovernmentidentitycards
c. FEDIcards
d. Smartcards
Answer:D
24. Mostindividualsarefamiliarwithwhichformofecommerce?
a. B2B
b. B2C
c. C2B
d. C2C
Answer:B
25. Whichformofecommercecurrentlyaccountsforabout97%ofallecommercerevenues?
a. B2B
b. B2C
c. C2B
d. C2C
Answer:A
26. WhichofthefollowingareadvantagesnormallyassociatedwithB2Becommerce?
a. Shortercycletimes
b. Reductionincosts
c. Reacheswideraudiences
d. alloftheabove
Answer:D
27. Ifthethreatofsubstituteproductsorservicesislowitisa(n):
a. Disadvantagetothesupplier
b. Advantagetothebuyer
c. Advantagetothesupplier
d. Noneoftheabove
Answer:C
28. Thethreatofnewentrantsishighwhenitis:
a. Hardforcustomerstoenterthemarket
b. Hardforcompetitorstoenterthemarket
c. Easyforcompetitorstoenterthemarket
d. Easyforcustomerstoenterthemarket
Answer:C
29. Ifitiseasyforcompetitorstoenterthemarket,thethreatofnewentrantsisconsidered:
a. High
b. Low
c. More
d. Less
Answer:A
30. Anindustryislessattractiveforsupplierswhentherivalryamongexistingcompetitorsis:
a. High
b. Low
c. More
d. Less
Answer:A
31. Uniquevalueauctionismainlyappliesto?
a. Newproducts
b. Secondhandproducts
c. Engineeringproducts
d. Noneoftheabove
i. Answer:B
32. Paisapayisfacilitatedin
a. eBay.co.in
b. amazon.com
c. flipkart.com
d. noneoftheabove
Answer:A
33. Whichofthefollowingisausefulsecuritymechanismwhenconsideringbusinessstrategyand
IT?
a.encryption
b.decryption
c.firewall
d.alltheabove
Answer:D
34. Whichofthefollowingisnotrelatedtosecuritymechanism
a. encryption
b. decryption
c. ecash
d. alltheabove

Answer:C
35. Aproductorservicethatcustomershavecometoexpectfromanindustry,whichmustbe
offeredbynewentrantsiftheywishtocompeteandsurvive,isknownasa(n)?
a. Switchingcosts
b. Loyaltyprograms
c. Entrybarriers
d. Affiliateprograms
Answer:C
36. Whichofthefollowingstatementsaccuratelyreflecttheimpactoftechnology?
a. Technologyhascausedbuyerpowertoincrease
b. Technologyhaslessenedtheentrybarriersformanyindustries
c. Technologyhasincreasedthethreatofsubstituteproductsandservices
d. alloftheabove
Answer:D
37. Abusinesscannotbeallthingstoallpeople.Instead,abusinessmust:
a. Identifytargetcustomers
b. Identifythevalueofproducts/servicesasperceivedbycustomers
c. alloftheabove
d. Noneoftheabove
Answer:C
38. Howthetransactionsoccurinecommerce?
a. Usingemedias
b. Using computers only
c. Usingmobilephonesonly
d. Noneoftheabove
Answer:A
39. Whichtypeofproductsislesserpurchasedusingecommerce?
a. automobiles
b. books
c. softwares
d. none
Answer:A
40. Abusinesscompetinginacommoditylikeenvironmentmustfocusonwhichofthefollowing?
a. Price
b. Ease/speedofdelivery
c. Easeofordering
d. alloftheabove
Answer:D
41. Whichofthefollowingreferstocreatingproductstailoredtoindividualcustomers?
a. customization
b. aggregation
c. Directmaterials
d. Reverseauction
Answer:A
42. Materialsusedinthenormaloperationofabusinessbutnotrelatedtoprimarybusiness
operationsarecalledwhat?
a. Supplies
b. Directmaterials
c. Indirectmaterials
d. Dailystuff
Answer:C
43. Amazon.comiswellknownforwhichecommercemarketingtechnique?
a. Bannerads
b. Popupads
c. Affiliateprograms
d. Viralmarketing
Answer:C
44. Whatisthenamegiventoaninteractivebusinessprovidingacentralizedmarketwheremany
buyersandsupplierscancometogetherforecommerceorcommercerelatedactivities?
a. Directmarketplace
b. B2B
c. B2C
d. Electronicmarketplace
Answer:D
45. Whichformofemarketplacebringstogetherbuyersandsellersfrommultipleindustries,often
forMROmaterials?
a. horizontal
b. Vertical
c. Integrated
d. Inclined
Answer:A
46. Whichformofemarketplacebringstogetherbuyersandsellersfromthesameindustry?
a. horizontal
b. Vertical
c. Integrated
d. Inclined
Answer:B
47. Whichtypeofaddappearsonawebpage?
a. popunderad
b. Popupad
c. Bannerad
d. Discountad
Answer:C
48. Whattypeofadappearsontopofawebpage?
a. popunderad
b. popupad
c. bannerad
d. discountad
Answer:B
49. Whattypeofadappearsunderawebpage?
a. popunderad
b. popupad
c. bannerad
d. discountad
Answer:A
50. Which,ifany,ofthefollowingtypesofadsarepeoplemostwillingtotolerate?
a. popunderad
b. popupad
c. bannerad
d. noneoftheabove
Answer:D
51. WhichofthefollowingisanInternetbasedcompanythatmakesiteasyforonepersontopay
anotherovertheInternet?
a. electroniccheck
b. electronicbillpresentmentandpayment
c. conversionrates
d. financialcybermediary
Answer:D
52. Whichofthefollowingisamethodoftransferringmoneyfromoneperson'saccountto
another?
a. electroniccheck
b. creditcard
c. etransfer
d. noneoftheabove
Answer:A
53. Anelectroniccheckisoneformofwhat?
a. ecommerce
b. onlinebanking
c. ecash
d. check
54. Ifyouneedtotransfermoneytoanotherpersonviatheinternet,whichofthefollowing
methodscouldyouuse?
a. financialcybermediary
b. electroniccheck
c. electronicbillpresentmentandpayment
d. alloftheabove
Answer:D
55. Whichofthefollowingpermitsthetransmissionofabill,alongwithpaymentofthatbill,tobe
conductedovertheInternet?
a. financialcybermediary
b. electroniccheck
c. electronicbillpresentmentandpayment
d. alloftheabove
Answer:C
56. Acombinationofsoftwareandinformationdesignedtoprovidesecurityandinformationfor
paymentiscalledawhat?
a. digitalwallet
b. popupad
c. shoppingcart
d. encryption
Answer:A
57. Whatisthenamefordirectcomputertocomputertransferoftransactioninformation
containedinstandardbusinessdocuments?
a. internetcommerce
b. ecommerce
c. transactioninformationtransfer
d. electronicdatainterchange
Answer:D
58. WhichofthefollowingisusedinB2Btopayforpurchases?
a. ecommerce
b. financialelectronicdatainterchange
c. electronicdataexchange
d. electronicchecks
Answer:B
59. Publickeyencryptionusesmultiplekeys.Onekeyisusedtoencryptdata,whileanotherisused
todecryptdata.Thekeyusedtoencryptdataiscalledthe_____key,whilethekeyusedto
decryptdataiscalledthe_____key.
a. encryption,decryption
b. private,public
c. encryption,public
d. public,private
Answer:D
60. SecureSocketsLayersdoeswhichofthefollowing?
a. createsasecure,privateconnectiontoawebserver
b. encryptsinformation
c. sendsinformationovertheinternet
d. alloftheabove
Answer:D
61. Whenatransactionisprocessedonline,howcanthemerchantverifythecustomer'sidentity?
a. usesecuresocketslayers
b. usesecureelectronictransactions
c. useelectronicdatainterchange
d. usefinancialelectronicdatainterchange
Answer:B
62. Thepracticeofforgingareturnaddressonanemailsothattherecipientisfooledinto
revealingprivateinformationistermed?
a. hacking
b. cracking
c. dumpsterdiving
d. spoofing
Answer:D
63. Whatisamodelofaproposedproduct,service,orsystem?
a. Prototyping
b. Prototype
c. Proofofconceptprototype
d. Sellingprototype
Answer:B
64. WhatisaninternalorganizationalInternetthatisguardedagainstoutsideaccessbyaspecial
securityfeaturecalledafirewall(whichcanbesoftware,hardware,oracombinationofthe
two)?
a. Client/servernetwork
b. Intranet
c. Extranet
d. Thinclient
Answer:B
65. Whatisanintranetthatisrestrictedtoanorganizationandcertainoutsiders,suchascustomers
andsuppliers?
a. Client/servernetwork
b. Intranet
c. Extranet
d. Thinclient
Answer:C
66. WhatisadetailedprocessforrecoveringinformationoranITsystemintheeventofa
catastrophicdisastersuchasafireorflood?
a. Disasterrecoveryplan
b. Hotsite
c. Coldsite
d. Disasterrecoverycostcurve
Answer:A
67. Whatisaseparatefacilitythatdoesnothaveanycomputerequipmentbutisaplacewherethe
knowledgeworkerscanmoveafterthedisaster?
a. Disasterrecoveryplan
b. Hotsite
c. Coldsite
d. Disasterrecoverycostcurve
Answer:C
68. Whatisaseparateandfullyequippedfacilitywherethecompanycanmoveimmediatelyafter
thedisasterandresumebusiness?
a. Disasterrecoveryplan
b. Hotsite
c. Coldsite
d. Disasterrecoverycostcurve
Answer:B
69. Whatcharts(1)thecosttoyourorganizationoftheunavailabilityofinformationandtechnology
and(2)thecosttoyourorganizationofrecoveringfromadisasterovertime?
a. Disasterrecoveryplan
b. Hotsite
c. Coldsite
d. Disasterrecoverycostcurve
Answer:D
70. WhichfactordetermineswhenyourITsystemwillbeavailableforknowledgeworkersto
access?
a. Availability
b. Accessibility
c. Reliability
d. Noneoftheabove

Answer:A

71. WhichfactordetermineswhohastherighttoaccessdifferenttypesofITsystemsand
information?
a. Availability
b. Accessibility
c. Reliability
d. Scalability

Answer:B

72. WhichfactorensuresyourITsystemsarefunctioningcorrectlyandprovidingaccurate
information?
a. Availability
b. Accessibility
c. Reliability
d. Scalability

Answer:C

73. Whichfactorrepresentshowwellyoursystemcanadapttoincreaseddemands?
a. Availability
b. Accessibility
c. Reliability
d. Scalability

Answer:D

74. Whichfactorrepresentsasystem'sabilitytochangequickly?
a. Flexibility
b. Performance
c. Capacityplanning
d. Benchmark
Answer:A
75. Whatisasetofconditionsusedtomeasurehowwellaproductorsystemfunctions?
a. Flexibility
b. Performance
c. Capacityplanning
d. Benchmark
Answer:D
76. WhatdeterminesthefutureITinfrastructurerequirementsfornewequipmentandadditional
networkcapacity?
a. Flexibility
b. Performance
c. Capacityplanning
d. Benchmark
Answer:C
77. Whatautomatesbusinessprocesses?
a. Workflow
b. ASP
c. Workflowsystem
d. EIP
Answer:C
78. Whatdefinesallofthestepsorbusinessrules,frombeginningtoend,requiredforaprocessto
runcorrectly?
a. Workflow
b. EIP
c. Workflowsystem
d. SLA
Answer:A
79. Whatsendsworkassignmentsthroughanemailsystem?
a. Databasebasedenterpriseinformationportal
b. Messagingbasedenterpriseinformationportal
c. Databasebasedworkflowsystem
d. Messagingbasedworkflowsystem
Answer:D
80. Whichwillnotharmcomputerresources
a. firewall
b. Virus
c. Trojanhorse
d. Noneoftheabove
Answer:A
81. WhichisnotafunctionofERP?
a. Warehousing
b. sales
c. scheduling
d. Noneoftheabove
Answer:D
82. WhichisafunctionofERP?
a. Warehousing
b. sales
c. scheduling
d. alloftheabove
Answer:D
83. Whichofthefollowingistheprimarycharacteristicofanintranet?
a. Peopleoutsidetheorganizationcanaccessit
b. Peopleinsidetheorganizationcan'taccessit
c. Peopleoutsidetheorganizationcan'taccessit
d. Noneoftheabove
Answer:C
84. Whichconceptsuggeststhatdifferentapplicationsandcomputersystemsshouldbeableto
communicatewithoneanother?
a. Integration
b. Webservices
c. Scalability
d. Interoperability
Answer:D
85. Whichserviceencompassesalltechnologiesusedtotransmitandprocessinformationonan
acrossanetwork?
a. Interoperability
b. Scalability
c. Benchmarking
d. Webservices
Answer:D
86. Whichprocesscanpreventdatafromloseduetocomputerproblemsorhumanerrors?
a. backup
b. recovery
c. benchmarking
d. datacleansing
Answer:A
87. Whichprocessisusedtoreinstalldatafromacopywhentheoriginaldatahasbeenlost?
a. backup
b. recovery
c. benchmarking
d. datacleansing
Answer:B
88. Whatdescribesaprocessofcontinuouslymeasuringresultsandcomparingthoseresultsto
optimalperformancesothatactualperformancemaybeimproved?
a. Performance
b. Capacityplanning
c. Benchmarking
d. Datacleansing
Answer:C
89. Whoprotectssystemfromexternalthreats?
a. firewall
b. EDI
c. ERP
d. Scriptkiddies
Answer:A
90. Whobreaksintootherpeople'scomputersystemsandstealsanddestroysinformation?
a. Hackers
b. softwares
c. Hacktivists
d. Scriptkiddies
Answer:a
91. Whatissoftwarethatcomeshiddeninfreedownloadablesoftwareandtracksyouronline
movements,minestheinformationstoredonyourcomputer,orusesyourcomputer'sCPUand
storageforsometaskyouknownothingabout?
a. Weblog
b. Clickstream
c. AnonymousWebbrowsingservice
d. Noneoftheabove
Answer:D
92. ERPstandsfor
a. Enterpriseresolutionplanning
b. Enterprisereverseplanning
c. Enterpriseresourceplanning
d. Noneoftheabove
Answer:C
93. WhichisnotacomponentofERP?
a. Legacysystems
b. Boltonapplications
c. Operationaldatabase
d. Cybersoft
Answer:D
94. WhichisnotafunctionofERP?
a. Humanresourcemanagement
b. financial
c. warehousing
d. Noneoftheabove
Answer:D
95. Whatisatypeofvirusthatspreadsitself,notjustfromfiletofile,butfromcomputerto
computerviaemailandotherInternettraffic?
a. Computervirus
b. Worm
c. Denialofserviceattack
d. Noneoftheabove
Answer:B
96. WhatfloodsaWebsitewithsomanyrequestsforservicethatitslowsdownorcrashes?
a. Computervirus
b. Worm
c. Denialofserviceattack
d. Noneoftheabove
Answer:C
97. WhatharnessesfarflungcomputerstogetherbywayoftheInternetoravirtualprivatenetwork
toshareCPUpower,databases,anddatabasestorage?
a. Computervirus
b. Worm
c. Denialofserviceattack
d. Noneoftheabove
Answer:D
98. Whatconsistsoftheidentificationofrisksorthreats,theimplementationofsecuritymeasures,
andthemonitoringofthosemeasuresforeffectiveness?
a. Riskmanagement
b. Riskassessment
c. Security
d. Noneoftheabove
Answer:A
99. WhatistheprocessofevaluatingITassets,theirimportancetotheorganization,andtheir
susceptibilitytothreats,tomeasuretheriskexposureoftheseassets?
a. Riskmanagement
b. Riskassessment
c. Security
d. Noneoftheabove
Answer:B
100. Whatistheprocessofmakingacopyoftheinformationstoredonacomputer?
a. Backup
b. Antivirus
c. Firewall
d. Biometrics
Answer:A
101. Whatsoftwaredetectsandremovesorquarantinescomputerviruses?
a. Backup
b. Antivirus
c. Firewall
d. Biometrics
Answer:B
102. Whatishardwareand/orsoftwarethatprotectscomputersfromintruders?
a. Backup
b. Antivirus
c. Firewall
d. Biometrics
Answer:C
103. Whatistheuseofphysicalcharacteristicssuchasyourfingerprint,thebloodvessels
intheretinaofyoureye,thesoundofyourvoice,orperhapsevenyourbreathtoprovide
identification?
a. Backup
b. Antivirus
c. Firewall
d. Biometrics
Answer:D
104. Allofthefollowingareconsideredbiometrics,except:
a. Fingerprint
b. Retina
c. Password
d. Voice
Answer:C
105. Whatscramblesthecontentsofafilesoyoucan'treaditwithouthavingtheright
decryptionkey?
a. Encryption
b. Intrusiondetectionsoftware
c. Securityauditingsoftware
d. Alloftheabove
Answer:A
106. Whatisanencryptionsystemthatusestwokeys:apublickeythateveryonecanhave
andaprivatekeyforonlytherecipient?
a. Encryption
b. Publickeyencryption
c. Intrusiondetectionsoftware
d. Securityauditingsoftware
Answer:B
107. Whatlooksforpeopleonthenetworkwhoshouldn'tbethereorwhoareacting
suspiciously?
a. Encryption
b. Publickeyencryption
c. Intrusiondetectionsoftware
d. Securityauditingsoftware
Answer:C
108. Whatchecksoutyourcomputerornetworkforpotentialweaknesses?
a. Encryption
b. Publickeyencryption
c. Securityauditingsoftware
d. Noneoftheabove
Answer:C
109. Whichofthefollowingtovirusesharm?
a. Yourkeyboard
b. Yourmonitor
c. Yourprocessor
d. Virusesdonotharmanyoftheabove
Answer:D
110. Whichofthefollowingcanavirusdo?
a. Hurtyourhardware
b. Hurtanyfilestheyweren'tdesignedtoattack
c. Infectfilesonwriteprotecteddisks
d. Noneoftheabove
Answer:D
111. Insimpleterms,whatdoesriskassessmentask?
a. Whatcangowrong?
b. Howlikelyisittogowrong?
c. Whatarethepossibleconsequencesifitdoesgowrong?
d. Alloftheabove
Answer:D
112. Whichofthefollowingisacharacteristicofafirewall?
a. Examineseachmessageasitseeksentrancetothenetwork
b. Blocksmessageswithoutthecorrectmarkingsfromenteringthenetwork
c. DetectscomputerscommunicatingwiththeInternetwithoutapproval
d. Alloftheabove
Answer:D
113. Whichofthefollowingarewaystoproveaccessrights?
a. Whatyouknow,likeapassword
b. Whatyouhave,likeanATMcard
c. Whatyoulooklike
d. Alloftheabove
Answer:D
114. Whichitemcanapasswordbeusedtoprotect?
a. Network
b. File
c. Folder
d. Alloftheabove
Answer:D
115. WhichisthemostimportantcomponentofIT?
a. Information
b. People
c. Informationtechnology
d. Computers
Answer:B
116. Whichofthefollowingappliestotheimplementationofanidea?
a. Copyright
b. Intellectualproperty
c. Patent
d. Denialofserviceattack
Answer:C
117. Whenyoupurchasecopyrightedsoftware,whatactuallyareyoupayingfor?
a. ThecostoftheCDs,manuals,anddevelopmentofthesoftware
b. ThecostoftheCDs,manuals,andashareofthecostofthesoftwaredevelopment
c. Ashareofthecostofsoftwaredevelopment
d. Alloftheabove
Answer:D
118. Whichofthefollowingisnotadimensionofprivacy?
a. Needforpersonalspace
b. Needtofeelincontrolofourpossessions
c. Needtofeelincontrolofourpersonalinformation
d. Alloftheabovearedimensionsofprivacy
Answer:D
119. Whichofthefollowingcapturesscreenimages?
a. Keylogger
b. Packetsniffer
c. Loganalysistools
d. Screencapturesoftware
Answer:D
120. Whichofthefollowingexaminesinformationpassingthroughswitches,hubs,or
routers?
a. Keylogger
b. Packetsniffer
c. Loganalysistools
d. Screencaptures
Answer:B
121. Whichofthefollowingrecordslogonsanddeletions?
a. Keylogger
b. Packetsniffer
c. Loganalysistools
d. Screencaptures
Answer:C
122. Emailmessagesmaybestoredonwhichofthefollowingcomputers?
a. Sender'scomputer
b. Sender'sserver
c. Recipient'sserver
d. Alloftheabove
Answer:D
123. Whatmightidentitythievesdowithyouridentity?
a. Applyforandusecreditcards
b. Applyforaloan
c. Changetheiridentity
d. Alloftheabove
Answer:D
124. Whichofthefollowingisnotacommonapproachtophishing?
a. Sendanofficiallookingemailaskingforconfidentialinformation
b. Askpeopletofilloutandreturnafakeletterusingpostalmail
c. Askpeopletoclickalinkinanemailtoopenasubmissionformonawebpage
d. Alloftheaboveareuncommonapproachestophishing
Answer:B
125. Atechniqueusedtogainpersonalinformationforthepurposeofidentitytheft,oftenby
email,iscalled?
a. Phishing
b. Carding
c. Brandspoofing
d. Alloftheabove
Answer:D
126. Companiescangatherinformationaboutemployeesandpotentialemployeesfrom
whichofthefollowingplaces?
a. Jobapplications
b. Creditreports
c. CompaniesthattrackWebsurfers
d. Alloftheabove

Answer:D

127. Cyberslackingconsistsofwhatactivities?
a. Visitinginappropriatewebsites
b. Visitingnewssites
c. Chattingonlinewithothersaboutnonworktopics
d. Alloftheabove
Answer:D
128. Cookiesareusedtodowhichofthefollowing?
a. StoreyourIDandpasswordforsubsequentlogonstothesite
b. Storecontentsofelectronicshoppingcarts
c. Totrackwebactivity
d. Alloftheaboveandmore
Answer:D
129. Unsolicitedemailiscalledwhat?
a. Junkmail
b. Spam
c. Extramail
d. Noneoftheabove
Answer:B
130. WhatisthenameofthenewantiSpambill?
a. NoSpam
b. CANSpam
c. SpamAway
d. StopSpam

Answer:B

131. Whatisthelegalprotectionaffordedanexpressionofanidea,suchasasong,video
game,andsometypesofproprietarydocuments?
a. Ethics
b. Intellectualproperty
c. Copyright
d. FairUseDoctrine
Answer:C
132. Whatistheunauthorizeduse,duplication,distributionorsaleofcopyrightedsoftware?
a. FairUseDoctrine
b. Piratedsoftware
c. Counterfeitsoftware
d. Privacy
Answer:B
133. Whatisaprogram,wheninstalledonacomputer,recordseverykeystrokeandmouse
click?
a. Keyloggersoftware
b. Hardwarekeylogger
c. Cookie
d. Adware
Answer:A
134. Whatissoftwareyoudon'twanthiddeninsidesoftwareyoudowant?
a. Adware
b. Trojanhorsesoftware
c. Spyware
d. Alloftheabove
Answer:D
135. Whatisanelectronicrepresentationofcash?
a. Digitalcash
b. Electroniccash
c. Ecash
d. Alloftheabove
Answer:D
136. Whatisafullyequippedcomputerthatyouwearasapieceofclothingorattachedtoa
pieceofclothingsimilartothewayyouwouldcarryyourcellphoneonyourbelt?
a. Wearablecomputer
b. GPS
c. Implantchip
d. Noneoftheabove
Answer:A
137. Whatisatechnologyenabledmicrochipimplantedintothehumanbody?
a. Wearablecomputer
b. GPS
c. Implantchip
d. Noneoftheabove
Answer:C

138. Whichofthefollowingisnotareasonwhydigitalcashhasturnedouttobeextremely
difficult?
a. Ifyoursystemcrashesyouloseyourmoney
b. Thereisonlyonestandard
c. Digitalcashmakesmoneylaunderingeasy
d. DigitalcashtravelsacrossthevastInternetandissusceptibletobeginstolen
Answer:B
139. Smartcardisbetterprotectedthanothercardsusing
a. Encryption
b. Firewall
c. Hub
d. Alltheabove
Answer:A
140. Trustcardisintroducedby
a. BSNLanditzcash
b. BSNLandoxicash
c. BSNLonly
d. None
Answer:A
141. PaisaPayisofferedonlyby
a. Homeshop18.com
b. eBay.in
c. amazon.com
d. none
Answer:B
142. TheEpaymentmechanismwidelyusedinB2Bis
a. Creditcard
b. Debitcard
c. Mastercard
d. Echeque
Answer:D
143. Whichtypeoftechnologywillincreaseportabilityandmobility?
a. Implantchips
b. Micropayments
c. Internetphonecalls
d. Alloftheabove
Answer:D
144. Whichofthefollowinganaccuratestatementaboutinternetphonecalls?
a. Theyarepossiblebutnotyetfree
b. Theyarenotpossible
c. Theyarecurrentlystandardpractice
d. Noneoftheaboveisanaccuratestatementaboutinternetphonecalls
Answer:A
145. Whatarethemostcommonlyusedinputdevicestoday?
a. Keyboard
b. Mouse
c. Alloftheabove
d. Noneoftheabove
Answer:C
146. Whichofthefollowingcanbeusedtohelpidentifypeopleinacrowd?
a. Biochip
b. Implantchip
c. Facialrecognitionsoftware
d. Visionchip
Answer:C
147. Whichoneisalsoknownasplasticmoney?
a. Creditcard
b. Debitcard
c. Papercash
d. Alloftheabove
Answer:A
148. Echequesare
a. Prepaid
b. Postpaid
c. Bothprepaidandpostpaid
Answer:A
149. Digitalsignatureisa
a. Digitalid,sendasanattachmenttoawebpage/email/message
b. Isusedforverifyingtheattachmentssendusingweb
c. Bothaandb
d. Noneofthese
Answer:C

150. Whichoneisthecomponentofcybercashpaymentsystem
a. CCusersoftware
b. CCmerachantsoftware
c. CCServerSoftware
d. Alloftheabove
Answer:D
151. Thepresenceofmakethesmartcardsmart.
a. Memory
b. Microchip
c. Ecash
d. Noneoftheabove
Answer:B
152. Thesmartcardwhichuseantennaforreadingandwritingdata
a) Contactsmartcard
b) Contactlesssmartcard
c) Proximitysmartcard
d) BothBandC
Answer:D
153. cardisreadonly.
a) Contactsmartcard
b) Contactlesssmartcard
c) Proximitysmartcard
d) BothBandC
Answer:C
154. Whichofthesmartcardusesasimlikestructureforreadingandwritingdata
a) Contactsmartcard
b) Contactlesssmartcard
c) Proximitysmartcard
d) BothBandC

Answer:A

155. Whichisnotafeatureofecommerce
a. SCM
b. EDI
c. WWW
d. BPR
Answer:D
156. WhatisIstandsinCIAofsmartcard?
a. International
b. Integrity
c. Identity
d. Noneoftheabove
Answer:B

157. WhatisAstandsinCIAofsmartcard?
a. auditing
b. authenticity
c. authorized
d. Noneoftheabove
Answer:B
158. WhatisCstandsinCIAofsmartcard?
a. confidentiality
b. conference
c. congress
d. Noneoftheabove
Answer:A
159. WhichoneisthethirdpartypaymentproviderswhoofferdigitalwalletsforE
merchants
a. Oxicash
b. PayMate
c. PayPass
d. Alltheabove
Answer:D
160. Whichisusedtoidentifymobilemoney
a. MCID
b. MMID
c. RSID
d. NONEOFTHEABOVE
Answer:B
161. isanactthatposesdangertocomputerassets.
a. Threat
b. Danger
c. Error
d. Noneoftheabove
Answer:A
162. Whichoneisnotaencryptiontechnique
a. RSA
b. DES
c. AES
d. NONEOFTHEABOVE
Answer:D

163. Whichoneisnotusedasasecuritymechanism?
a. Encryption
b. Cryptography
c. Wallets
d. Digitalsignature
Answer:C
164. Whichegovernmentarenaisbeingusedwhengovernmentalagenciessendoutand
acceptbidsforwork?
a) G2G
b) G2B
c) G2C
d) G2G

Answer:B

165. Secretkeyisusedfor
a. Publickeycryptography
b. Privatekeycryptography
c. Asymmetrickeycryptography
d. Noneofthese
Answer:B
166. Whichoneisacommunicationchannelthreat?
a. Snifferprograms
b. Cybervandalism
c. Integritythreats
d. Alloftheabove
Answer:D
167. Whichoneisacommunicationchannelsecurityprotocol?
a. SSL
b. SHTTP
c. SET
d. ALLOFTHEABOVE
Answer:D
168. Theprotocolwhichallowsthefiletransferbetweencomputersis
a. TCP/IP
b. FTP
c. HTTP
d. SOA
Answer:B
169. EBankingisalsoknownas
a. ATMs
b. Netbanking
c. Traditionalbanking
d. Noneofthese
Answer:B
170. isbackboneofallEpaymentsinEcommerce
a. EFT
b. EPS
c. PayPal
d. Noneofthese
Answer:B
171. Whichoneisaclientlevelthreat?
a. Maliciouscode
b. Viruses
c. Activecontents
d. Alltheabove
Answer:D
172. Whichoneisnotanencryptiontechnique?
a. RSA
b. DES
c. AES
d. FTP
Answer:D
173. Whichoneisanencryptiontechnique?
a. RSA
b. DES
c. AES
d. Alloftheabove
Answer:D
174. Whichoneisnotaserverlevelthreat?
a. Maliciouscode
b. CGIthreats
c. Databasethreats
d. Bufferoverflows
Answer:A
175. Whichoneisnotaphysicalthreat?
a. Hacking
b. Storm
c. Phishing
d. Noneoftheabove
Answer:A
176. Whichoneisaphysicalthreat?
a. Phishing
b. Storm
c. Earthquake
d. Alltheabove
Answer:D
177. Whichoneisalogicalthreat?
a. Hacking
b. Storm
c. Phishing
d. Noneoftheabove
Answer:A
178. Thebasicelementsofwebsiteis
a. Homepage
b. Webpages
c. Linksandbanners
d. Alltheabove
Answer:D
179. WhichoneisathreatforEcommerce
a. Trojanhorse
b. firewall
c. encryption
d. None
Answer:A
180. Securecommunicationmeans
a. Protecttransmissionofcreditcardnumber
b. Guaranteeprivacyofcustomer
c. Unauthorizedaccessofpaymentdetails
d. Alltheabove
Answer:D
181. Whichoneisnotanofflinepaymentmode?
a. Cashondelivery
b. Cashbeforedelivery
c. Demanddrafts
d. echeque
Answer:D
182. Whichoneisanofflinepaymentmode?
a. Cashondelivery
b. Cashbeforedelivery
c. Creditcard
d. Bothaandb
Answer:D
183. Whichoneisnotanonlinepaymentmode?
a. Cashondelivery
b. Debitcard
c. Creditcard
d. echeque
Answer:A
184. Whichoneisanonlinepaymentmode?
a. Cashondelivery
b. Cashbeforedelivery
c. Demanddrafts
d. echeque
Answer:D
185. whichoneisnotanEpaymentmethodusedinIndia
a. Debitcard
b. Creditcard
c. echeque
d. none
Answer:D
186. OTPstandsfor
a. OnTimePassword
b. OnTimeprocessing
c. Onetimeprocessor
d. None
Answer:A
187. WhichoneisnotathreatforEcommerce
a. Trojanhorse
b. Viruses
c. Worm
d. None
Answer:D
188. PrivateKeycryptographyisalsoknownascryptography.
a. Publickey
b. Symmetric
c. Asymmetric
d. None
Answer:B
189. Publickeycryptographyisalsoknownascryptography.
a. Privatekey
b. Symmetric
c. Asymmetric
d. None
Answer:C
190. Whatisthelegalprotectionaffordedanexpressionofanidea,suchasasong,video
game,andsometypesofproprietarydocuments?
a. Ethics
b. Intellectualproperty
c. Copyright
d. FairUseDoctrine
Answer:C
191. Cyberslackingconsistsofwhatactivities?
a. Visitinginappropriatewebsites
b. Visitingnewssites
c. Chattingonlinewithothersaboutnonworktopics
d. Alloftheabove
Answer:D
192. Whatisanarrangementmadebetweenecommercesitesthatdirectusersfromone
sitetotheother?
a. Spam
b. Viralmarketing
c. Affiliateprograms
d. Noneoftheabove
Answer:C
193. Whichtypedealswithauction?
a. B2B
b. B2C
c. C2B
d. C2C
Answer:D
194. WhichoneisnotalayerofEcommerceinfrastructure
a. Physicallayer
b. Productlayer
c. Servicelayer
d. None

Answer:D

195. Whichwillharmcomputerresources
a. Worm
b. Virus
c. Trojanhorse
d. Alltheabove

Answer:D

196. Thestudyofencryptioniscalled
a. Decryption
b. Cryptography
c. Firewall
d. Alltheabove
Answer:B
197. DuringEcommercetransactionweshouldensure
a. Integrity
b. Security
c. Confidentiality
d. Alltheabove
Answer:D
198. Thevirusthatarecommonlyfoundinworddocumentsarecalled
a. Macro
b. Trojanhorse
c. Scriptvirus
d. Noneoftheabove

Answer:A

199. Thevirusthatareattachedwithvbandjavafilesarecalled
a. Macro
b. Trojanhorse
c. Scriptvirus
d. Noneoftheabove

Answer:C

200. Thevirusesspreadsthrough
a. Mails
b. Pendrivesandcds
c. Websites
d. Alltheabove
Answer:D

You might also like