You are on page 1of 4

UNIT- IV

Q. No. Question Options Answer


a)Copyright

Which of the following applies to the b)Intellectual property


1 C
implementation of an idea c)Patent
d)Denial of service attack
a)Encryption

Which of the following is not a security b)Cryptography


2 C
mechanism c)Wallets
d)Digital Signature
a)Public Key cryptography
b)Private Key cryptography
3 Secret key is used for B
c)Asymmetric Key cryptography
d)None of the above
a)Decryption
b)Cryptography
4 The study of encryption is called B
c)Firewall
d)All of the above
a) Data protection

Trade mark, copyright, patent law etc comes b) Telecommunication laws


5 C
under the purview of…………………… c) Intellectual property laws
d) None
a) cyber signature
A………………….provides a way to b) Digital signature
6 associate the message with the sender and B
is the equivalent of an ordinary signature. c) SSL
d) none of these
a) creates a secure, private connection to
a web server
Secure Sockets Layers does which of the b) encrypts information
7 D
following?
c) sends information over the internet
d) all of the above
a)Censorship
The suppression or prohibition of any parts of
books, films, news, etc. that are considered b)Taxation
8 A
obscene, politically unacceptable, or a threat c)Contract
to security.
d)None of these
9 Play games of chance for money; bet. a)Gambling A
b)IPR
c)Encryption
d)All of the above
a)Intellectual Property Right

……….include patents, copyright, industrial b)Contract


10 A
design rights, trademarks c)Ethics
d)None of these
Public key encryption uses multiple a) encryption, decryption
keys. One key is used to encrypt data, while
another is used to decrypt data. The key b) private, public
11 D
used to encrypt data is called the _____ key, c) encryption, public
while the key used to decrypt data is called
the _____ key. d) public, private
a) RSA
b) DES
12 Which one is not a encryption technique D
c) AES
d) NONE OF THE ABOVE
a) SSL

Which one is a communication channel b) S‐ HTTP


13 D
security protocol? c) SET
d) ALL OF THE ABOVE
a) Ethics
b) Intellectual property
What is the legal protection afforded an
expression of an idea, such as a song, video c) Copyright
14 C
game, and some types of proprietary
documents?
d) Fair Use Doctrine

a) Price
A business competing in a commodity like b) Ease / speed of delivery
15 environment must focus on which of the D
following? c) Ease of ordering
d) all of the above
a) Booking

Which of the following activity is offered by b) Seats selection


16 D
online airline services? c) Automated flight status
d) All of the above

Web pages are prepared using their a) html


17 A
language as………………… b) FTP
c) HTTP
d) None of these
a) Dynamic website
…………………….website is one that b) Static Website
18 changes or customizes itself frequently and A
automatically based on certain criteria c) phish site
d) none of these
a) Biometrics
………………are automated methods of b) PIN
19 recognizing a person based on a A
physiological or behavioral characteristic. c) both of these
d) none of these
a) Network firewall
……………………are special type of b) Antivirus
20 software meant for limiting the risks of being B
hit by computer viruses c) both of these
d) none of these
a) Home page

The user reaches this page when they b) Web page


21 A
specify the address of a website c) Summary page
d) None of these
a) Network firewall

………………is basically a secure gate b) Antivirus


22 A
between our organization data and internet. c) both of these
d) none of these
a) Network firewall
…………………..are program developed by
some dishonest people to destroy the b) computer virus
23 B
computer system and the valuable c) both of these
information in it.
d) none of these
a) Spoofing
Gain entry into the user’s system and scan b) Snooping
24 your file system for personal information is B
known as………………. c) Sniffing
d) None of these
a) Hyper Text Markup Language
b) High Text Markup Language
25 HTML stands for A
c) Hyper Tabular Markup Language
d) None of these

You might also like