Well-structured Std 12 Computer Textbook MCQ Answers and Std 12 Computer MCQ Answers Ch 5 Introduction to M-Commerce can serve as a valuable review tool before computer exams.
GSEB Std 12 Computer Chapter 5 MCQ Introduction to M-Commerce
Question 1.
What is M-Commerce ?
(A) Master-Commerce
(B) Mobile-Commerce
(C) Market-Commerce
(D) Main-Commerce
Answer:
(B) Mobile-Commerce
Question 2.
M-Commerce stands for ………………. .
(A) Mobile Commerce
(B) Metropolitan Commerce
(C) Modern Commerce
(D) Mutual Commerce
Answer:
(A) Mobile Commerce
Question 3.
Sale or purchase using wireless device on internet is called ………………… .
(A) M-Banking
(B) WWW
(C) Internet
(D) M-Commerce
Answer:
(D) M-Commerce
Question 4.
M-Commerce can be done through ………………. device.
(A) Mobile Phone, Smart phone
(B) Personal Digital Assistant – PDAs
(C) Tablet, palmtop
(D) All of these
Answer:
(D) All of these
Question 5.
What is represented by Mobile Commerce via internet ?
(A) purchase of product or service
(B) sale of product or service
(C) (A) and (B) both
(D) none of these
Answer:
(C) (A) and (B) both
Question 6.
PDA stands for ………………… .
(A) Personal Database Assistant
(B) Personal Digital Assistant
(C) Personal Download Assistant
(D) Personal Donate Assistant
Answer:
(B) Personal Digital Assistant
Question 7.
………………… advantage is given to user through mobile commerce.
(A) Flexibility
(B) Ubiquity
(C) (A) and (B) both
(D) None of these
Answer:
(C) (A) and (B) both
Question 8.
If the customer is not present at ……………………, still he can make transaction using mobile phone in
e-commerce.
(A) at the computer terminal
(B) in the shop
(C) (A) or (B)
CD) none of these
Answer:
(C) (A) or (B)
Question 9.
Due to ………………. reason, mobile commerce can be used through internet from any location.
(A) if user has the devices related to mobile commerce wherever he goes
(B) if user hasn’t the devices related to mobile commerce wherever he goes
(C) due to the danger lying in mobile commerce related to devices
(D) as the mobile commerce devices are popular and famous
Answer:
(A) if user has the devices related to mobile commerce wherever he goes
Question 10.
Due to …………………. reason, more and more users are turned towards mobile commerce.
(A) availability of mobile commerce in smart phones and tablets
(B) availability of smart phones and tablets at lower rates
(C) popularity of smart phones and tablets
(D) availability of free internet in smart phones and tablets
Answer:
(C) popularity of smart phones and tablets
Question 11.
…………….. is the example of mobile commerce.
(A) Air ticket booking and hotel booking
(B) Purchase of mobile tickets
(C) Restaurant booking and reservation
(D) All of these
Answer:
(D) All of these
Question 12.
……………… uses the mobile commerce most to keep the business secured.
(A) Banks
(B) Financial institutes
(C) (A) and (B) both
(D) None of these
Answer:
(C) (A) and (B) both
Question 13.
Bank and financial institutes give ………………… features to customers.
(A) to know the balance in account
(B) to see the ups and downs of Share market
(C) sale and purchase
(D) all of these
Answer:
(D) all of these
Question 14.
The services provided to users in their phones are called ………………….. .
(A) Mobile Banking
(B) Metro Banking
(C) Market Banking
(D) Message Banking
Answer:
(A) Mobile Banking
Question 15.
The share market services available in mobile devices are called ……………….. .
(A) market brokerage
(B) electronic brokerage
(C) mobile brokerage
(D) mail brokerage
Answer:
(C) mobile brokerage
Question 16.
……………… fields have developed under the demand of mobile related services.
(A) News, Information, Purchase
(B) Sports, Reservation
(C) Entertainment
(D) All of these
Answer:
(D) All of these
Question 17.
Smart phones give ………………… features to users.
(A) easy to use
(B) flexibility
(C) security
(D) all of these
Answer:
(D) all of these
Question 18.
Why mobile commerce become more popular ?
(A) Easily available
(B) Mobility
(C) (A) and (B) both
(D) None of these
Answer:
(C) (A) and (B) both
Question 19.
What care is taken by the web development companies about the mobile devices ?
(A) Website is displayed properly
(B) Web server is displayed properly
(C) Website is displayed differently
(D) Website is displayed in secured manner
Answer:
(A) Website is displayed properly
Question 20.
Mobile commerce is conducted through ………………. .
(A) wireless network
(B) internet
(C) (A) and (B) both
(D) none of these
Answer:
(C) (A) and (B) both
Question 21.
Advantages of ……………….. are also available through mobile commerce.
(A) Internet
(B) E-Commerce
(C) (A) and (B) both
(D) None of these
Answer:
(C) (A) and (B) both
Question 22.
…………………. is the advantage of mobile commerce.
(A) Contact can be done globally
(B) Reduces the transaction cost
(C) It takes less time give order to the merchant
(D) All of these
OR
(A) Business activities are done in arranged » manner
(B) Business is possible 24 × 7.
(C) Any time contact can be done
(D) All of these
OR
(A) For mobile commerce PC (Personal Computer) or laptop is not required.
(B) Payment is possible through mobile commerce
(C) It gives the flexibility to get information anytime
(D) All of these
Answer:
(D) All of these
Question 23.
Mobile commerce provide ………………… feature.
(A) convenience
(B) inconvenience
(C) publishing
(D) programming
Answer:
(A) convenience
Question 24.
…………….. type of work can be done through mobile device.
(A) Purchase
(B) Banking
(C) To download the media file
(D) All of these
Answer:
(D) All of these
Question 25.
For sending ………………. details mobile commerce is useful.
(A) time critical
(B) emergency type
(C) (A) and (B) both
(D) none of these
Answer:
(C) (A) and (B) both
Question 26.
Due to ……………. mobile commerce is more useful.
(A) immediate connection
(B) speedy 3G (3rd Generation) service
(C) (A) and (B) both
(D) none of these
Answer:
(C) (A) and (B) both
Question 27.
…………………. is the limitation of mobile commerce.
(A) Handheld devices have limited screen size
(B) It has problems with some types of files as well as transfer
(C) Difficult to display all types of videos
(D) All of these
OR
(A) Interface is not that convenient compared to PC
(B) Computing abilities and storage is an issue in Mobile commerce
(C) Wireless network is not as secured as wired network.
(D) All of these
OR
(A) Bandwidth is less
(B) To establish mobile and wireless broadband requires more cost
(C) It has problems with some types of files as well as transfer
(D) All of these
Answer:
(D) All of these
Question 28.
What type of screen is there in today’s handheld device ?
(A) Limited
(B) Unlimited
(C) Desirable
(D) Can’t say
Answer:
(A) Limited
Question 29.
……………….. is the limitation of mobile device.
(A) File type
(B) Data transfer
(C) (A) and (B) Both
(D) None of these
Answer:
(C) (A) and (B) Both
Question 30.
…………….. is the limitation of mobile device.
(A) Computing abilities
(B) Memory
(C) Storage
(D) All of these
Answer:
(D) All of these
Question 31.
Mobile commerce is more secured compared to wired network.
Choose the appropriate option.
(A) True
(B) False
(C) Can’t say
(D) None of these
Answer:
(B) False
Question 32.
……………….. shows the mobile commerce application.
(A) Mobile marketing and advertisements
(B) Ticket through mobiles
(C) Mobile auction
(D) All of these
OR
(A) Entertainment through mobile
(B) Purchase through mobile
(C) Financial service and information service through mobile
(D) All of these
Answer:
(D) All of these
Question 33.
Different institutes use mobile commerce for ………………. .
(A) marketing
(B) advertisement
(C) (A) and (B) both
(D) none of these
Answer:
(C) (A) and (B) both
Question 34.
………………. ticket can be purchased through mobiles.
(A) Air
(B) Railway
(C) Film
(D) All of these
Answer:
(D) All of these
Question 35.
Ticket achieved through mobile device is called ……………….. .
(A) E-Ticket
(B) M-Ticket
(C) Mobile Ticket
(D) Master Ticket
Answer:
(A) E-Ticket
Question 36.
……………… is the advantage of booking tickets through mobile.
(A) No problems related to parking or transportation
(B) User needs to visit the location
(C) Tickets can be cancelled easily.
(D) All of these
Answer:
(D) All of these
Question 37.
Through ……………….. website railway reservation is done.
(A) wwrw.irctc.com
(B) www.irctc.in
(C) www.irctc.co.in
(D) www.irctc.gov.in
Answer:
(C) www.irctc.co.in
Question 38.
IRCTC stands for ………………. .
(A) Indian Railway Catering and Tourism Campus Limited
(B) Indian Railway Catering and Tourism Corporation Limited
(C) Indian Railway Catering and Tourism Co-operative Limited
(D) Indian Railway Catering and Tourism Communication Limited
Answer:
(B) Indian Railway Catering and Tourism Corporation Limited
Question 39.
What is done in the website for online ticket booking of railways ?
(A) Registration
(B) Cash deposit
(C) Form to be filled up
(D) Mobile to get recharged
Answer:
(A) Registration
Question 40.
What is given at the end of online ticket booking in IRCTC ?
(A) Log-in name and password
(B) Master name and password
(C) Username and password
(D) Registration name and password
Answer:
(C) Username and password
Question 41.
When user logs in though mobile commerce in IRCTC, he is asked to enter ……………….. .
(A) Source location name
(B) Destination location name
(C) Date of travel and type of ticket
(D) All of these
Answer:
(D) All of these
Question 42.
In what way auction can be done by user ?
(A) Using website of auction at any time and any place
(B) Make bidding and keep an eye on bidding
(C) He can be active regularly
(D) All of these
Answer:
(D) All of these
Question 43.
…………….. is the auction website.
(A) eBay
(B) IRCTC
(C) amazon
(D) flipkart
Answer:
(A) eBay
Question 44.
For ……………… feature mobile device is widely used.
(A) to listen to audio
(B) to watch video
(C) to play games
(D) all of these
Answer:
(D) all of these
Question 45.
What can user do through online library ?
(A) Search songs, videos, games
(B) Store songs, videos, games
(C) Download songs, videos, games
(D) All of these
Answer:
(D) All of these
Question 46.
If there are more mobile users for online library, they are provided …………….. .
(A) payment based on download
(B) payment based on programs
(C) services based on charges
(D) all of these
Answer:
(D) all of these
Question 47.
How the purchase is done through mobile commerce ?
(A) At any time
(B) From any location
(C) (A) and (B) Both
(D) None of these
Answer:
(C) (A) and (B) Both
Question 48.
…………….. website provides online purchase of products.
(A) mobile
(B) IRCTC
(C) onlinesbi
(D) flipkart
Answer:
(D) flipkart
Question 49.
……………….. feature is common while purchasing through mobile.
(A) Selection of product category
(B) Selection of product
(C) Information and order of product
(D) All of these
Answer:
(D) All of these
Question 50.
…………. features are provided by banks and financial institutes.
(A) Account information
(B) Trading of shares
(C) No return of debt
(D) All of these
Answer:
(D) All of these
Question 51.
………………. ervice is available through mobile.
(A) News service , sports news
(B) Share trading, financial notes
(C) Traffic information
(D) All of these
Answer:
(D) All of these
Question 52.
…………….. location based information is provided by the information of mobile location..
(A) Local map
(B) Local information
(C) Local weather
(D) All of these
Answer:
(D) All of these
Question 53.
…………….. type of information can be achieved by mobile device.
(A) Restaurant
(B) Theatres
(C) Hospitals
(D) All of these
Answer:
(D) All of these
Question 54.
Due to …………….. mobile devices, use of E-commerce has increased.
(A) PDA (Personal Digital Assistant)
(B) Cellular Phones
(C) Pocket PCs
(D) All of these
Answer:
(D) All of these
Question 55.
Mobile commerce has proved to be effective in what type of necessities ?
(A) Product related information from customer and vendor
(B) information of customer and vendor for services
(C) (A) and (B) Both
(D) None of these
Answer:
(C) (A) and (B) Both
Question 56.
The technique provided for business purchase to know the location is called ……………… .
(A) E-Commerce
(B) L-Commerce
(C) M-Commerce
(D) I-Commerce
Answer:
(B) L-Commerce
Question 57.
L-Commerce stands for ……………. .
(A) Location based – Commerce
(B) Local – Commerce
(C) Logical – Commerce
(D) Lifetime – Commerce
Answer:
(A) Location based – Commerce
Question 58.
…………… is the feature which is location based.
(A) E-Commerce
(B) L-Commerce
(C) M-Commerce
(D) I-Commerce
Answer:
(B) L-Commerce
Question 59.
Through the physical location of mobile device, which process can be done by user based on technical application ?
(A) Can log-in as per his location
(B) Can find the location of other person
(C) Can find the location of hospitals, theatres etc.
(D) All of these
Answer:
(D) All of these
Question 60.
Location based technique works on signals based on ……………….. type of source.
(A) GPS (Global Positioning System)
(B) Wi-Fi (Wireless Fidelity)
(C) Cellular
(D) All of these
Answer:
(D) All of these
Question 61.
GPS stands for ……………….. .
(A) Global Pointing System
(B) Global Positioning System
(C) Global Plus System
(D) Global Part System
Answer:
(B) Global Positioning System
Question 62.
Wi-Fi Stands for …………… .
(A) Wireless Fidelity
(B) Wired Fidelity
(C) Worldwide Fidelity
(D) Web Fidelity
Answer:
(A) Wireless Fidelity
Question 63.
………………… is the most accurate method to know mobile location.
(A) GPS (Global Positioning System)
(B) Wi-Fi (Wireless Fidelity)
(C) Cellular
(D) Any of these
Answer:
(A) GPS (Global Positioning System)
Question 64.
………………. system works on global satellite tracking.
(A) Cellular
(B) GPS (Global Positioning System)
(C) Wi-Fi (Wireless Fidelity)
(D) All of these
Answer:
(B) GPS (Global Positioning System)
Question 65.
…………….. uses the intersection of signals using the satellites to find out the location of device.
(A) GPS (Global Positioning System)
(B) Wi-Fi (Wireless Fidelity)
(C) Cellular
(D) All of these
Answer:
(A) GPS (Global Positioning System)
Question 66.
In how much range GPS system decides the location of device ?
(A) 500
(B) 1000
(C) 1500
(D) 2000
Answer:
(A) 500
Question 67.
GPS decides the location of devices for the range of 500 meters, this method is known as ………………… .
(A) triangulation
(B) quadrangulation
(C) transactional
(D) trirational
Answer:
(A) triangulation
Question 68.
If the GPS signal is poor or weak the mobile device can use the signals from …………………. .
(A) Cell towers
(B) Wi-Fi Hot spots
(C) (A) and (B) Both
(D) None of these
Answer:
(C) (A) and (B) Both
Question 69.
The signals of ……………… do not broadcast their own locations.
(A) Cell towers
(B) MMS
(C) Wi-Fi
(D) (A) and (B) both
Answer:
(D) (A) and (B) both
Question 70.
………… is required in mobile device if the location based system is to be used.
(A) GPS
(B) MMS
(C) Wi-Fi
(D) USB
Answer:
(A) GPS
Question 71.
The location can be indicated using ………………. in location based M-Commerce.
(A) By typing
(B) By speaking
(C) (A) or (B)
(D) None of these
Answer:
(C) (A) or (B)
Question 72.
……………. option shows the example of location based service.
(A) Information service
(B) Maps, Navigation
(C) Emergency services, advertisements
(D) All of these
Answer:
(D) All of these
Question 73.
……………… option of ‘Yellow Page’ allows the users to search banks, traffic information etc.
(A) Information or directory service
(B) Tracking services
(C) Emergency services
(D) Advertising promotion
Answer:
(A) Information or directory service
Question 74.
……………. option shows the tracking service.
(A) Search of lost car
(B) Physical location search of a person
(C) Children search of parents
(D) All of these
Answer:
(D) All of these
Question 75.
………………. is the example of emergency service.
(A) Ambulance service
(B) Help in road accident
(C) Police and Fire Brigade help
(D) All of these
Answer:
(D) All of these
Question 76.
………………… is the example of advertising promotion.
(A) Targeted ads
(B) Promotional messages
(C) Customer identification
(D) All of these
Answer:
(D) All of these
Question 77.
Using ……………… we can plot route from one place to the other.
(A) Tracking service
(B) Map
(C) Navigation
(D) Information service
Answer:
(C) Navigation
Question 78.
………………… type of network is internet.
(A) Public
(B) Private
(C) Limited
(D) Separate
Answer:
(A) Public
Question 79.
…………… types of networks are connected in internet.
(A) Limited computers
(B) Public computers
(C) Personal computers
(D) None of these
Answer:
(C) Personal computers
Question 80.
……………….. is the danger for putting information on internet.
(A) Data can be misused
(B) Data can be stolen
(C) Data can be modified
(D) All of these
Answer:
(D) All of these
Question 81.
……………….. information is to be provided by the user to purchase online.
(A) Credit card number
(B) Other personal information
(C) (A) and (B) Both
(D) Not required
Answer:
(C) (A) and (B) Both
Question 82.
Where the customer’s data is sent on internet ?
(A) Server of merchant
(B) Bank’s servers
(C) User’s server
(D) All of these
Answer:
(A) Server of merchant
Question 83.
The merchant server sends the data to the issuer bank for authorization through ………………. .
(A) customer gate-way
(B) business gate-way
(C) online gate-way
(D) payment gate-way
Answer:
(D) payment gate-way
Question 84.
All the transactions of e-commerce occur on ……………… .
(A) public network of internet
(B) private network of internet
(C) secured network of internet
(D) encrypted network of internet
Answer:
(A) public network of internet
Question 85.
Hacker can do ………………. with the data lying on internet.
(A) steal the data
(B) modify the data
(C) delete the data
(D) all of these
Answer:
(D) all of these
Question 86.
……………… is the mode of payment in e-commerce.
(A) Online banking
(B) Electronic transaction
(C) Credit card, Debit card
(D) All of these
Answer:
(D) All of these
Question 87.
………………… is much important on internet.
(A) Security of data
(B) Visibility of data
(C) Modification of data
(D) Formatting of data
Answer:
(A) Security of data
Question 88.
How many security aspects are there on internet ?
(A) 2
(B) 3
(C) 4
(D) 5
Answer:
(C) 4
Question 89.
………………. is the security aspect of e-commerce.
(A) Confidentiality
(B) Integrity
(C) Authorization and Non-repudiation
(D) All of these
Answer:
(D) All of these
Question 90.
Unauthorized users cannot read the data is the ……………….. security aspect.
(A) confidentiality
(B) integrity
(C) authorization
(D) non-repudiation
Answer:
(A) confidentiality
Question 91.
To keep the data unreadable for unauthorized user is the ………………… security aspect.
(A) confidentiality
(B) integrity
(C) non-repudiation
(D) authorization
Answer:
(A) confidentiality
Question 92.
Using ……………… process confidentiality of information can be achieved.
(A) protocol
(B) digital certificate
(C) cryptography
(D) transformation
Answer:
(C) cryptography
Question 93.
In ………………… data is transferred in coded form.
(A) encryption
(B) decryption
(C) firewall
(D) digital certificate
Answer:
(A) encryption
Question 94.
Using …………………. encrypted data is decrypted.
(A) digital certificate
(B) key
(C) protocol
(D) layer
Answer:
(B) key
Question 95.
Who can read the data in encryption ?
(A) Person who receives the data
(B) Mediator who helps to send the data
(C) User who has send the data from the web server
(D) All of these
Answer:
(A) Person who receives the data
Question 96.
……………….. method keeps the data seemed during transmission.
(A) Cryptography
(B) Spoofing
(C) Digital certificate
(D) Sniffer
Answer:
(C) Digital certificate
Question 97.
…………. ensures that the data is not revealed or leaked during transmission.
(A) Confidentiality
(B) Integrity
(C) Non-repudiation
(D) Authorization
Answer:
(A) Confidentiality
Question 98.
For ……………. type of data security, confidentiality is helpful.
(A) digital signature
(B) cyber crime
(C) credit card
(D) sniffer
Answer:
(C) credit card
Question 99.
……………… ensures that information accidentally or
maliciously not altered.
(A) Confidentiality
(B) Integrity
(C) Non-repudiation
(D) Authorization
Answer:
(B) Integrity
Question 100.
Receiver receives the ……………… message.
(A) Which is sent by the sender
(B) Which is sent by the mediator
(C) Which is received by the sender
(D) Which is received by the mediator
Answer:
(A) Which is sent by the sender
Question 101.
If the data is altered during ……………….., it should be detected.
(A) online
(B) offline
(C) transmission
(D) purchase
Answer:
(C) transmission
Question 102.
Only authorized users are allowed to use the system is the ………………. security aspect.
(A) confidentiality
(B) integrity
(C) non-repudiation
(D) authorization
Answer:
(D) authorization
Question 103.
………………. is the way of authentication.
(A) Log-in
(B) Password
(C) (A) and (B) Both
(D) Digital certificate
Answer:
(C) (A) and (B) Both
Question 104.
The sender cannot deny of sending a message, is the ……………….. security aspect.
(A) online
(B) offline
(C) payment
(D) purchase
Answer:
(D) purchase
Question 105.
Order sent by customer is authorized by ………………. .
(A) digital signatures
(B) trusted third party-TTP
(C) (A) or (B)
(D) user
Answer:
(C) (A) or (B)
Question 106.
TTP stands for ……………… .
(A) Trusted Transfer Party
(B) Trusted Third Party
(C) Trusted Terminal Party
(D) Trusted Truth Party
Answer:
(B) Trusted Third Party
Question 107.
………………… is a threat in using internet.
(A) Malicious code, sniffing
(B) Cyber vandalism
(C) Denial of service attack
(D) All of these
Answer:
(D) All of these
Question 108.
The code damaging computer or system is called …………… .
(A) malicious code
(B) master code
(C) sniffer code
(D) garbage code
Answer:
(A) malicious code
Question 109.
How does Malicious code become active ?
(A) It activates itself.
(B) When user clicks some specific link
(C) When user opens the e-mail account
(D) Any of these
Answer:
(D) Any of these
Question 110.
Malicious code works like …………….. .
(A) trojan horse
(B) vims
(C) worms
(D) all of these
Answer:
(B) vims
Question 111.
What is done by malicious code ?
(A) Steals the information
(B) Damage or delete a file
(C) (A) or (B)
(D) None of these
Answer:
(C) (A) or (B)
Question 112.
The program used to record information that passes through router is called …………….. .
(A) sniffer
(B) malicious code
(C) cyber vandalism
(D) spoofing
Answer:
(A) sniffer
Question 113.
Sniffer program is like ……………… .
(A) to record the communication on TV
(B) to record the communication of friends
(C) to record the communication on telephone
(D) to record the communication on computers
Answer:
(C) to record the communication on telephone
Question 114.
Sniffer program can read ……………… type of information.
(A) e-mail message
(B) user’s login
(C) credit card number and password
(D) all of these
Answer:
(D) all of these
Question 115.
To shut down a machine or network by making it inaccessible is called …………………. .
OR
……………… is the name of attack which is to shut down a machine or network by making it inaccessible.
(A) Denial of service attack
(B) Sniffer
(C) Malicious code
(D) Cyber vandalism
Answer:
(A) Denial of service attack
Question 116.
What can attacker do by targeting the user’s computer and its network connection ?
(A) Prevent accessing email
(B) Prevent from using websites
(C) Prevent online accounts like banking
(D) All of these
Answer:
(D) All of these
Question 117.
What can happen due to denial of service attack ?
(A) Flooded with thousands of messages
(B) Create traffic problem on network
(C) (A) and (B) both
(D) None of these
Answer:
(C) (A) and (B) both
Question 118.
………………… is the electronic defacing of an existing webpage.
OR
To modify the webpage, using electronic method is called
(A) Cyber vandalism
(B) Denial of service attack
(C) Sniffer
(D) Malicious code
Answer:
(A) Cyber vandalism
Question 119.
In ……………… , attacker replaces the website’s original content with his/her own content.
(A) denial of service attack
(B) sniffer
(C) malicious code
(D) cyber vandalism
Answer:
(D) cyber vandalism
Question 120.
………………. is the integrity violation.
(A) Cyber vandalism
(B) Denial of service attack
(C) Sniffer
(D) Malicious code
Answer:
(A) Cyber vandalism
Question 121.
……………… is the electronic equivalent of destroying property of someone’s photograph.
(A) Denial of service attack
(B) Sniffer
(C) Malicious code
(D) Cyber vandalism
Answer:
(A) Denial of service attack
Question 122.
In …………… business content is replaced by offensive material.
(A) cyber vandalism
(B) denial of service attack
(C) sniffer
(D) malicious code
Answer:
(A) cyber vandalism
Question 123.
…………… can represent a website as authentic when it is actually a fake.
(A) Cyber vandalism
(B) Malicious code
(C) Denial of service attack
(D) Spoofing
Answer:
(D) Spoofing
Question 124.
……………… is the technique where the attacker tries to assume the identity of other person.
(A) Spoofing
(B) Masquerading
(C) (A) or (B)
(D) None of these
Answer:
(C) (A) or (B)
Question 125.
What can attacker do in spoofing technique ?
(A) Assumes the identity of other person
(B) System for transacting the victim site
(C) (A) or (B)
(D) None of these
Answer:
(C) (A) or (B)
Question 126.
…………….. is to prevent various security threats in internet.
(A) Antivirus software or digital certificate
(B) Firewall
(C) Secure socket layer
(D) All of these
Answer:
(D) All of these
Question 127.
…………………. is the program taking an action to remove malicious code like viruses.
(A) Antivirus software
(B) Antiviral software
(C) Antisystem software
(D) Anticode software
Answer:
(A) Antivirus software
Question 128.
In which option there can be a malicious code.
(A) Virus
(B) Worm
(C) Trojan Horse
(D) All of these
Answer:
(D) All of these
Question 129.
What type of work is done by antivirus software ?
(A) To search malicious code
(B) To prevent malicious code
(C) To remove malicious code
(D) All of these
Answer:
(A) Antivirus software
Question 130.
……………….. should be installed for secured computer system.
(A) High quality operating system
(B) High quality antivirus software
(C) High quality application software
(D) High quality system software
Answer:
(B) High quality antivirus software
Question 131.
……………. is the effect of malicious code.
(A) Strange sound
(B) Raising pop-up windows
(C) Doing irritating tricks
(D) All of these
Answer:
(D) All of these
Question 132.
Malicious code can perform ………………. task.
(A) delete files
(B) slows down the system
(C) damage computer system by affecting hardware
(D) all of these
Answer:
(D) all of these
Question 133.
Once the system is affected by virus it spreads to ……………… .
(A) other programs connected to system
(B) other files connected to system
(C) (A) and (B) both
(D) none of these
Answer:
(C) (A) and (B) both
Question 134.
Virus can replicate itself.
Choose the appropriate option.
(A) True
(B) False
(C) Can’t Say
(D) None of these
Answer:
(A) True
Question 135.
………….. can also affect the information of persons lying in the user’s contact list.
(A) Firewall
(B) Virus
(C) Sniffing
(D) All of these
Answer:
(B) Virus
Question 136.
………………… is the easiest way for attacking the system.
(A) Infected attachments to email
(B) Downloaded games
(C) Downloaded files
(D) Information available on internet
Answer:
(A) Infected attachments to email
Question 137.
can be attached to email.
(A) Pictures
(B) Video
(C) Sound
(D) All of these
Answer:
(D) All of these
Question 138.
For ……………….., antivirus software is available in the market.
(A) computer
(B) mobile
(C) (A) and (B) both
(D) none of these
Answer:
(C) (A) and (B) both
Question 139.
…………………… is the very important aspect for security.
(A) Install antivirus software
(B) Update the antivirus software
(C) (A) and (B) both
(D) None of these
Answer:
(C) (A) and (B) both
Question 140.
Network protection barrier between the company’s network and outside world is called …………….. .
(A) firewall
(B) antivirus software
(C) sniffing
(D) all of these
Answer:
(A) firewall
Question 141.
Firewall works as barrier for ………………. .
(A) company’s network
(B) outside world
(C) (A) and (B) both
(D) none of these
Answer:
(C) (A) and (B) both
Question 142.
………………… is the device placed between the network and the internet to monitor and control the traffic between company’s network and outside world.
(A) Computer
(B) Router
(C) (A) and (B) both
(D) None of these
Answer:
(C) (A) and (B) both
Question 143.
The purpose of ……………….. is to keep intruders away from the e-commerce infrastructure.
(A) encryption
(B) firewall
(C) sniffing
(D) antivirus software
Answer:
(B) firewall
Question 144.
………….. ensures the company’s crucial data safe and not accessed by the intruders.
(A) Antivirus software
(B) Sniffing
(C) Firewall
(D) Encryption
Answer:
(C) Firewall
Question 145.
Firewall gives protection against ……………… .
(A) e-mail service which sometimes create trouble
(B) to prevent unwanted pictures, videos etc
(C) to stop unauthorized user from using local network
(D) all of these
OR
(A) to stop information going out from the network unauthorizedly
(B) to stop traffic entering the network from outside world
(C) protection against any network attack
(D) all of these
Answer:
(D) all of these
Question 146.
The certificate used for identification in electronic transaction is called ……………… .
(A) digital certificate
(B) master certificate
(C) electronic certificate
(D) user certificate
Answer:
(A) digital certificate
Question 147.
……………… used for identification in electronic transaction.
(A) Digital Certificate
(B) Digital ID
(C) (A) and (B) Both
(D) None of these
Answer:
(C) (A) and (B) Both
Question 148.
In the real world, …………………. is used for the identification of a person.
(A) driving license
(B) passport
(C) election card
(D) any of these
Answer:
(D) any of these
Question 149.
Who gives the digital certificate in electronic medium ?
(A) Trusted Third Party
(B) Trusted Mediator Party
(C) Trusted Professional party
(D) Trusted User Party
Answer:
(A) Trusted Third Party
Question 150.
TTP stands for ………………. .
(A) Trusted Transaction Party
(B) Trusted Terminal Party
(C) Trusted Third Party
(D) Trusted Teamwork Party
Answer:
(C) Trusted Third Party
Question 151.
The third party giving digital certificate is called ………………. .
(A) digital authority
(B) certification authority
(C) binary authority
(D) master authority
Answer:
(B) certification authority
Question 152.
CA stands for ………………. .
(A) Certification Authority
(B) Communication Authority
(C) Conversation Authority
(D) Capture Authority
Answer:
(A) Certification Authority
Question 153.
……………….. is included in digital certificate.
(A) Holder name, signature and expiry date
(B) Public key of the holder of digital certificate
(C) Signature of authorized party giving the certificate
(D) All of these
Answer:
(D) All of these
Question 154.
What is given for encrypted message ?
(A) Public key of the holder
(B) Holder’s signature
(C) Signature of authorized party giving the certificate
(D) All of these
Answer:
(D) All of these
Question 155.
Using ………………… truthfulness of digital certificate is proved.
(A) public key of digital certificate holder
(B) holder’s signature
(C) signature of authorized party giving the certificate
(D) all of these
Answer:
(D) all of these
Question 156.
To keep the data secured by making it unreadable is called ………………. .
(A) cryptography
(B) firewall
(C) secure Socket Layer
(D) digital Certificate
Answer:
(A) cryptography
Question 157.
………………… is the way to keep the message secured and make it unreadable.
(A) Digital Certificate
(B) Secure Socket Layer
(C) Cryptography
(D) Firewall
Answer:
(C) Cryptography
Question 158.
Using the algorithm when plain text is converted to cipher text is called ………………. .
(A) firewall
(B) encryption
(C) antivirus software
(D) digital certificate
Answer:
(B) encryption
Question 159.
To convert cipher text to the plain text is called ……………… .
(A) firewall
(B) digital certificate
(C) decryption
(D) virus
Answer:
(C) decryption
Question 160.
In encryption which text is converted to what ?
(A) Plain text to Cipher text
(B) Cipher text to Plain text
(C) Plain text to Hidden text
(D) Hidden text to Plain text
Answer:
(A) Plain text to Cipher text
Question 161.
………………… is used for encryption or decryption.
(A) Secret image
(B) Secret text
(C) Secret symbol
(D) Secret key
Answer:
(D) Secret key
Question 162.
Encryption makes the text hidden.
Choose the appropriate option.
(A) True
(B) False
(C) Can’t say
(D) None of these
Answer:
(B) False
Question 163.
Encryption converts the text …………….. .
(A) to meaningless format
(B) to meaningful format
(C) to invisible format
(D) to visible format
Answer:
(A) to meaningless format
Question 164.
The purpose of …………….. is to keep the data secured.
(A) digital certificate
(B) encryption
(C) secure socket layer
(D) firewall
Answer:
(B) encryption
Question 165.
Before transmitting the data to ………………….. , encryption is done.
(A) internet
(B) network
(C) (A) or (B)
(D) any of these
Answer:
(C) (A) or (B)
Question 166.
…………….. process is important to convert cipher text to plain text.
(A) Original
(B) Secret
(C) Visible
(D) Invisible
Answer:
(A) Original
Question 167.
The process which is used to convert the secret text to original text is called ……………… .
(A) encryption
(B) decryption
(C) hidden
(D) secret
Answer:
(B) decryption
Question 168.
In decryption which text is converted to which text ?
(A) Cipher text to plain text
(B) Plain text to cipher text
(C) Plain text to visible text
(D) Invisible text to plain text
Answer:
(A) Cipher text to plain text
Question 169.
What is available in the market for encryption ?
(A) Code
(B) Function
(C) Algorithm
(D) All of these
Answer:
(C) Algorithm
Question 170.
In ………………… type of network, encryption is used for security.
(A) internet, e-commerce
(B) mobiles, bluetooth devices
(C) ATM machines of banks
(D) all of these
Answer:
(D) all of these
Question 171.
ATM stands for ………………. .
(A) Automatic Teller Machines
(B) Automatic Talking Machines
(C) Automatic Terminal Machines
(D) Automatic Transaction Machines
Answer:
(A) Automatic Teller Machines
Question 172.
……………… is used for the security of e-commerce.
(A) Protocode
(B) Prototype
(C) Protocol
(D) Protolayer
Answer:
(C) Protocol
Question 173.
protocol is used for the security of web transactions on internet.
(A) HTTP
(B) SSL
(C) FTP
(D) All of these
Answer:
(B) SSL
Question 174.
SSL stands for …………… .
(A) Secure Socket Layer
(B) Section Socket Layer
(C) Secure Setup Layer
(D) Secure Standard Layer
Answer:
(A) Secure Socket Layer
Question 175.
………………… developed the SSL.
(A) Microsoft
(B) IBM
(C) Netscape
(D) Bell Laboratories
Answer:
(C) Netscape
Question 176.
Using …………….. , data is transmitted securely in e-commerce.
(A) HTTP
(B) SSL
(C) FTP
(D) All of these
Answer:
(B) SSL
Question 177.
……………… protocol establishes the authorization of the merchant in SSL.
(A) SSL
(B) FTP
(C) HTTP
(D) All of these
Answer:
(A) SSL
Question 178.
Using …………………. logo , we can come to know whether the website is secured or not.
(A) VeriSide
(B) VeriSize
(C) VeriScan
(D) VeriSign
Answer:
(D) VeriSign
Question 179.
Clicking the logo of VeriSign we can get ………………. information.
(A) owner’s information
(B) suthority of certificate
(C) (A) and (B) both
(D) none of these
Answer:
(C) (A) and (B) both
Question 180.
What does the digital certificate suggest ?
(A) Whether the transaction is secured or not ?
(B) Website’s owner is authorized or not ?
(C) Whether the website is authorized by verisign or not ?
(D) All of these
Answer:
(D) All of these
Question 181.
The secured website address starts with ……………..
OR
……………. starting word suggests that the website is secured by SSL.
(A) http://
(B) https://
(C) ssl://
(D) secure://
Answer:
(B) https://
Question 182.
………….. option shows the secured website.
(A) Logo of veriSign
(B) Website name begins with https://
(C) (A) and (B) both
(D) None of these
Answer:
(C) (A) and (B) both
Question 183.
……………. provides the feature of online shopping with global market.
(A) E-Commerce
(B) M-Commerce
(C) (A) and (B) Both
(D) None of these
Answer:
(C) (A) and (B) Both
Question 184.
How the business is available in E-commerce and M-Commerce ?
(A) Without any national boundaries
(B) With some national boundaries
(C) Locally only without any national boundaries
(D) Locally only with some national boundaries
Answer:
(A) Without any national boundaries
Question 185.
Why there are some legal issues in E-Commerce and M-Commerce ?
(A) As it is available on local internet without considering the national boundaries
(B) As it is available on local internet considering the national boundaries
(C) As it is available on global internet without considering the national boundaries
(D) As it is available on global internet considering the national boundaries
Answer:
(C) As it is available on global internet without considering the national boundaries
Question 186.
………………. is the challenge against E-Commerce and M-Commerce.
(A) Intellectual Property Rights
(B) Copyrights and Privacy
(C) Legal issues between parties
(D) All of these
Answer:
(D) All of these
Question 187.
What is necessary for the problems of E-commerce and M-Commerce ?
(A) Legal Structure
(B) Challenge Structure
(C) Electronic Structure
(D) Online Structure
Answer:
(A) Legal Structure
Question 188.
What Indian Government has established under Information Technology ?
(A) Web Laws
(B) Techno Laws
(C) IT Laws
(D) Indian Laws
Answer:
(C) IT Laws
Question 189.
IT Laws stands for ………………. .
(A) Indian Technology Laws
(B) Information Technology Laws
(C) Internetwork Technology Laws
(D) International Technology Laws
Answer:
(B) Information Technology Laws
Question 190.
Customers are trusted with ……………… as they get the information of legal issues and rules of E-commerce.
(A) User’s personal information remains safe
(B) User’s personal information is not misused
(C) (A) and (B) Both
(D) None of these
Answer:
(C) (A) and (B) Both
Question 191.
With what reasons security is essential in E-Commerce and M-Commerce ?
(A) Some confidential information of credit card is provided
(B) Some confidential information of E-mail is provided
(C) Some confidential information of online communication is provided
(D) Some confidential information of cash information is provided
Answer:
(A) Some confidential information of credit card is provided
Question 192.
For what legal protection is given to the websites doing business online ?
(A) Logo
(B) Copyright
(C) Digital Information
(D) All of these
Answer:
(D) All of these
Question 193.
What is included in intellectual property ?
(A) Books, Software
(B) Music, Video
(C) Copyright, trademark, webpage
(D) All of these
Answer:
(D) All of these
Question 194.
……………….. is for the protection of the intellectual property.
(A) Copyright
(B) Trademark
(C) Domain Name Disputes
(D) All of these
Answer:
(D) All of these
Question 195.
………….. provides the author with a tool to protect original work from being used by others without permission.
(A) Copyright
(B) Trademark
(C) Domain Name Disputes
(D) Steganography
Answer:
(A) Copyright
Question 196.
Copyright is applicable to ……………. .
(A) text
(B) books
(C) software program
(D) all of these
Answer:
(D) all of these
Question 197.
………………. rule provide many protection to the intellectual property.
(A) Steganography
(B) Copyright
(C) Trademark
(D) Domain
Answer:
(B) Copyright
Question 198.
Intellectual property can not be used ……………….. .
(A) freely
(B) through bidding
(C) through selling
(D) none of these
Answer:
(A) freely
Question 199.
It is difficult to protect intellectual property in ……………… .
(A) E-Commerce
(B) M-Commerce
(C) (A) and (B) both
(D) None of these
Answer:
(C) (A) and (B) both
Question 200.
……………….. right is given with the software after purchasing it.
(A) Using a software
(B) Distributing a software
(C) (A) and (B) both
(D) None of these
Answer:
(A) Using a software
Question 201.
……………. right is not given with the software after purchasing it.
(A) Using a software
(B) Distributing a software
(C) (A) and (B) both
(D) None of these
Answer:
(B) Distributing a software
Question 202.
The distribution rights of software are with ……………….. .
(A) copyright holder
(B) user
(C) customer
(D) with everyone
Answer:
(A) copyright holder
Question 203.
Most of the WebPages have …………….. protection.
(A) reading
(B) printing
(C) copyright
(D) all of these
Answer:
(C) copyright
Question 204.
Copying contents from the websites violate ……………… .
(A) selfrespect
(B) copyright
(C) (A) and (B) both
(D) none of these
Answer:
(B) copyright
Question 205.
……………… is a specific logo, mark, word, symbol which is used by the company to distinguish a producer or service from that of other in the market.
(A) Steganography
(B) Copyright
(C) Trademark
(D) Domain Name Dispute
Answer:
(C) Trademark
Question 206.
What is included in Trademark ?
(A) Logo, Picture
(B) Word, Phrase
(C) Sign, Symbol
(D) All of these
Answer:
(D) All of these
Question 207.
Trademark is displayed with …………….. .
(A) TM (Trademark)
(B) SM (Service Mark)
(C) ® (Registration Mark)
(D) All of these
Answer:
(D) All of these
Question 208.
What is the symbol of a trademark ?
(A) TM, MT and ©
(B) TM, MS and ®
(C) TM, SM and ®
(D) TM, SM and ©
Answer:
(C) TM, SM and ®
Question 209.
TM stands for …………….. .
(A) Trademark
(B) Trademark
(C) Topmark
(D) Teammark
Answer:
(A) Trademark
Question 210.
SM stands for ………………. .
(A) Source Mark
(B) Section Mark
(C) Service Mark
(D) Solution Mark
Answer:
(C) Service Mark
Question 211.
® stands for ……………. .
(A) Remark Mark
(B) Registration Mark
(C) Rearrange Mark
(D) Resource Mark
Answer:
(B) Registration Mark
Question 212.
……………. type of an issue is the competition of getting domain name.
(A) Legal
(B) Common
(C) Famous
(D) Attractive
Answer:
(A) Legal
Question 213.
Earlier, the domain names were given on ………………. .
(A) free of cost
(B) through registration
(C) first come first basis
(D) through bidding
Answer:
(C) first come first basis
Question 214.
People used to register domain names and then they were sold to concerned company is known as ……………….. .
(A) cyber voting
(B) cyber squatting
(C) cyber squat
(D) cyber swat
Answer:
(B) cyber squatting
Question 215.
……………… is the problem with Domain Name.
(A) Registration of Domain Name which is not used.
(B) To change the domain name
(C) (A) and (B) both
(D) None of these
Answer:
(C) (A) and (B) both
Question 216.
What is possible with Domain Names ?
(1) Registration of Domain Name which is not used then selling it on high price.
(2) Registration of purposely misspelled variations of well known domain names.
(3) It can mislead the consumers who generally make typographical errors while entering URL.
(A) 1, 2
(B) 2, 3
(C) 3, 1
(D) 1, 2, 3
Answer:
(D) 1, 2, 3
Question 217.
……………….. is the method of protection of intellectual property.
(A) Steganography
(B) Stekanography
(C) (A) and (B) both
(D) None of these
Answer:
(C) (A) and (B) both
Question 248.
……………… is the process of hiding information within information.
(A) Steganography
(B) Stekanography
(C) Stenography
(D) Cryptography
Answer:
(A) Steganography
Question 219.
If the information is not protected it can be used …………….. .
(A) for healthy purpose
(B) for welfare purpose
(C) for malicious purpose
(D) none of these
Answer:
(C) for malicious purpose
Question 220.
What is the use of steganography ?
(A) It works by replacing unused data in computer files such as images, sound or text with invisible information
(B) It works by replacing used data in computer files such as images, sound or text with invisible information
(C) It works by replacing unused data in computer files such as images, sound or text with visible information
(D) It works by replacing used data in computer files such as images, sound or text with visible information
Answer:
(A) It works by replacing unused data in computer files such as images, sound or text with invisible information
Question 221.
Steganography replaces which file with the invisible information ?
(A) Unused data in computer folders
(B) Used data in computer folders
(C) Used data in computer files
(D) Unused data in computer files
Answer:
(D) Unused data in computer files
Question 222.
………………. type of file is replaced with invisible information in steganography.
(A) Image
(B) Sound
(C) Text
(D) All of these
Answer:
(D) All of these
Question 223.
In steganography invisible information can be in ……………….. form.
(A) simple text
(B) cipher text
(C) image
(D) any of these
Answer:
(D) any of these
Question 224.
What is necessary for steganography ?
(A) Special Software
(B) Special Hardware
(C) (A) and (B) Both
(D) None of these
Answer:
(A) Special Software
Question 225.
Steganograhy software can be downloaded from ……………. .
(A) user’s computer
(B) administrator’s computer
(C) internet
(D) none of these
Answer:
(C) internet
Question 226.
………………… is a digital code inserted into a digital image or audio.
(A) Master watermarking
(B) Digital watermarking
(C) Cryptographically watermarking
(D) User display watermarking
Answer:
(B) Digital watermarking
Question 227.
Digital watermarking allows hiding information in a ……………… manner.
(A) totally invisible
(B) completely visible
(C) completely Formatted
(D) totally visible
Answer:
(A) totally invisible
Question 228.
Earlier artists used to ……………. to claim a copyright.
(A) creatively sign their painting with a marker pen
(B) creatively sign their painting with an ink pen
(C) creatively sign their painting with a brush
(D) creatively sign their painting with a computer
Answer:
(C) creatively sign their painting with a brush
Question 229.
In the digital world, artists can …………….. their work by hiding their name within an image.
(A) mastermark
(B) watermark
(C) objectmark
(D) graphicsmark
Answer:
(B) watermark
Question 230.
………………. is the digital code to identify the file’s copyright information.
(A) Image mark
(B) Digital mark
(C) Code mark
(D) Watermark
Answer:
(D) Watermark
Question 231.
…………….. embedded watermark helps to identify the owner of the work.
(A) Visible
(B) Invisible
(C) Complete
(D) Incomplete
Answer:
(B) Invisible
Question 232.
Digital watermark can be embedded to ……………. .
(A) digital audio
(B) digital video
(C) (A) and (B) both
(D) none of these
Answer:
(C) (A) and (B) both
Question 233.
Unauthorized distribution of digital audio over the internet in the …………….. format is a big problem.
(A) MP3
(B) WAV
(C) MPEG
(D) DAT
Answer:
(A) MP3
Question 234.
Using …………………. we can control audio distribution and provide copyrights effectively.
(A) master watermark
(B) cryptograph watermark
(C) analog watermark
(D) digital watermark
Answer:
(D) digital watermark
Question 235.
In the field of data security watermarks is used for ………………. .
(A) certificate
(B) authorization
(C) (A) and (B) both
(D) none of these
Answer:
(C) (A) and (B) both
Question 236.
What can be given to the information of document using digital watermarking ?
(A) Link
(B) Graphics
(C) Formatting
(D) Editing
Answer:
(A) Link
Question 237.
Using ……………… photo editor software we can add the visible watermark.
(A) EIMP
(B) GIMP
(C) JIMP
(D) MIMP
Answer:
(B) GIMP
Question 238.
GIMP stands for …………….. .
(A) GNU Image Manipulation Program
(B) GNU Image Multilevel Program
(C) GNU Image Management Program
(D) GNU Image Manageable Program
Answer:
(A) GNU Image Manipulation Program
Question 239.
What is the most important point for e-commerce and m-commerce ?
(A) Internet connection
(B) Product selection
(C) Payment
(D) Registration
Answer:
(C) Payment
Question 240.
………….. type of payment modes are used in traditional methods.
(A) Cash
(B) Cheque
(C) Credit card
(D) All of these
Answer:
(D) All of these
Question 241.
…………… method is proved to be more useful today for payments.
(A) Online
(B) Electronic
(C) (A) or (B)
(D) Draft
Answer:
(C) (A) or (B)
Question 242.
Due to ……………….. , online or electronic payment mode is more useful today.
(A) companies look for different ways to serve the customers faster and at low cost
(B) companies look for different ways to serve the customers faster and at high cost
(C) companies look for different ways to serve the customers slowly and at low cost
(D) companies look for different ways to serve the customers slowly and at high cost
Answer:
(A) companies look for different ways to serve the customers faster and at low cost
Question 243.
…………….. is a financial exchange that takes place online between the buyer and the seller.
(A) Electronic payment
(B) Online payment
(C) (A) or (B)
(D) Master payment
Answer:
(C) (A) or (B)
Question 244.
……………….. is the mode of online payment.
(A) Credit card, debit card, smart card
(B) Net banking, Electronic Fund Transfer (EFT)
(C) E-Wallet, Ru-pay
(D) All of these
Answer:
(D) All of these
Question 245.
What are the cards for the online payment ?
(A) Credit card
(B) Debit card
(C) Smart card
(D) All of these
Answer:
(D) All of these
Question 246.
……………. is the most popular and widely used card for online payment.
(A) Smart card
(B) Credit card
(C) Debit card
(D) Charge card
Answer:
(B) Credit card
Question 247.
Who gives the credit card to the customers ?
(A) Issuing bank
(B) Acquiring bank
(C) (A) and (B) both
(D) None of these
Answer:
(A) Issuing bank
Question 248.
Who give the assurance of credit card to the user and payment to the merchant ?
(A) Merchant
(B) Issuing Bank
(C) Acquiring Bank
(D) Customer
Answer:
(B) Issuing Bank
Question 249.
Whose credit cards are given to the customers by the issuing bank ?
(A) Established financial institutions
(B) Reputed financial institutions
(C) (A) and (B) both
(D) None of these
Answer:
(C) (A) and (B) both
Question 250.
……………. is the popular example of credit card.
(A) MasterCard ®
(B) Visa ®
(C) (A) and (B) both
(D) None of these
Answer:
(C) (A) and (B) both
Question 251.
Depending on …………….. , credit limits are given to the customers.
(A) credit history
(B) income level
(C) (A) and (B) both
(D) none of these
Answer:
(C) (A) and (B) both
Question 252.
Credit card is linked to …………… account.
(A) bank
(B) international
(C) online
(D) offline
Answer:
(A) bank
Question 253.
For accepting the payment through credit card, merchant opens the account in a bank called …………….. .
(A) issuing bank
(B) acquiring bank
(C) (A) and (B) both
(D) none of these
Answer:
(B) acquiring bank
Question 254.
The merchant is provided with ……………. services via acquiring bank.
(A) online authorization
(B) payment
(C) (A) and (B) both
(D) none of these
Answer:
(C) (A) and (B) both
Question 255.
The checking of whether the credit card is active or not, what is the credit limit is known as …………….. .
(A) authorization
(B) right
(C) study
(D) evaluation
Answer:
(A) authorization
Question 256.
What is included in authorization ?
(A) Whether the credit card is active or not
(B) Credit limit
(C) Billing information
(D) All of these
Answer:
(D) All of these
Question 257.
The merchants are using ………………. quite widely.
(A) smart card
(B) credit card
(C) debit card
(D) charge card
Answer:
(B) credit card
Question 258.
Credit card provides trust to ………………. .
(A) customer
(B) merchant
(C) (A) and (B) both
(D) none of these
Answer:
(C) (A) and (B) both
Question 259.
Arrange the steps to purchase through credit card on internet.
(1) The customer visits the website of merchant
(2) Customer selects the product to purchase
(3) All the information of customer is sent to merchant.
(A) 1, 2, 3
(B) 1, 3, 2
(C) 2, 3, 1
(D) 3, 2, 1
Answer:
(A) 1, 2, 3
Question 260.
How many parties are involved in the purchase of credit card ?
(A) 3
(B) 4
(C) 5
(D) 6
Answer:
(B) 4
Question 261.
…………….. is the party for transaction in purchase through credit card.
(A) Credit card holder
(B) Merchant accepting payment through credit card
(C) Issuing bank, acquiring bank
(D) All of these
Answer:
(D) All of these
Question 262.
The customer who purchases through credit card is ……………… party.
(A) credit card holder
(B) merchant accepting payment through credit card
(C) issuing bank, acquiring bank
(D) all of these
Answer:
(A) credit card holder
Question 263.
The merchant who gets payment through credit card is ……………… party.
The customer who purchases through credit card is ______ party.
(A) Credit card holder
(B) Merchant accepting payment through credit card
(C) Issuing bank, acquiring bank
(D) All of these
Answer:
(B) Merchant accepting payment through credit card
Question 264.
………….. gives credit card to customer and gives the assurance to merchant about payment throug credit card is …………….. party.
(A) credit card holder
(B) merchant accepting payment through credit card
(C) issuing bank
(D) acquiring bank
Answer:
(C) issuing bank
Question 265.
………………. is the financial institution who establishes an account with merchant.
(A) Credit card holder
(B) Merchant accepting payment through credit card
(C) Issuing bank
(D) Acquiring bank
Answer:
(D) Acquiring bank
Question 266.
…………… checks the validity of credit card and credit limit.
(A) Credit card holder
(B) Merchant accepting payment through credit card
(C) Issuing bank
(D) Acquiring bank
Answer:
(D) Acquiring bank
Question 267.
How many parties are involved in online payment ?
(A) 2
(B) 3
(C) 4
(D) 5
Answer:
(A) 2
Question 268.
…………….. plays an important role in online payment.
(A) Payment gateways
(B) Payment processors
(C) (A) and (B) both
(D) None of these
Answer:
(C) (A) and (B) both
Question 269.
The service provided by the third party like PayPal is called …………….. .
(A) PayPal Gateway
(B) Payment Gateway
(C) Master Gateway
(D) User Gateway
Answer:
(B) Payment Gateway
Question 270.
………………. integrate secured network for all the parties involved in payment gateways.
(A) Authorization
(B) Authorized path
(C) Registration
(D) Process
Answer:
(A) Authorization
Question 271.
Through ………………. merchant is connected to e-commerce website.
(A) payment processors
(B) payment gateways
(C) online processors
(D) credit gateways
Answer:
(B) payment gateways
Question 272.
The data centre that completes the transactions and settles the fund to the merchant is called ……………. .
(A) credit gateways
(B) online processors
(C) payment gateways
(D) payment processors
Answer:
(D) payment processors
Question 273.
The payment process through online payment using credit card is divided into ……………… parts.
(A) 2
(B) 3
(C) 4
(D) 5
Answer:
(A) 2
Question 274.
…………… is the part of payment done through credit card.
(A) Authorization
(B) Settlement
(C) (A) and (B) both
(D) None of these
Answer:
(C) (A) and (B) both
Question 275.
………………. information is provided to the customer at the time of checkout in the website.
(A) Product Details
(B) Purchase Date
(C) Cost
(D) All of these
Answer:
(D) All of these
Question 276.
Customer checkouts, provides credit card details on website is transferred to ………………. ,
(A) payment gateways
(B) settlement
(C) (A) and (B) both
(D) none of these
Answer:
(A) payment gateways
Question 277.
he payment gateways pass the information of credit card to …………….. .
(A) user
(B) processors
(C) issuing bank
(D) acquiring bank
Answer:
(B) processors
Question 278.
The payment gateways pass the information to the processor which contacts ………………. .
(A) user
(B) merchant
(C) issuing bank
(D) acquiring bank
Answer:
(C) issuing bank
Question 279.
After verification, issuing bank sends the status of verification to ………………… .
(A) acquiring bank
(B) payment gateways
(C) processors
(D) all of these
Answer:
(B) payment gateways
Question 280.
If merchant accepts the transaction then the next step is ……………….. .
(A) settlement
(B) purchase
(C) documentation
(D) selling
Answer:
(A) settlement
Question 281.
During ……………….. , amount is transferred from customer’s account to merchant’s account.
(A) selling
(B) documentation
(C) settlement
(D) purchase
Answer:
(C) settlement
Question 282.
Arrange the following steps of authorization.
(1) Settlement is done and amount is transferred from customer’s account to merchant’s account.
(2) The verification done by issuing bank is sent to payment gateways.
(3) The payment gateways pass the information to the processor which contacts issuing bank.
(4) Customer checkouts, provides credit card details on website is transferred to payment gateways.
(A) 1, 2, 3, 4
(B) 4, 3, 2, 1
(C) 1, 3, 2, 4
(D) 2, 4, 1, 3
Answer:
(B) 4, 3, 2, 1
Question 283.
Merchant sends the transaction request with all details to the ………………… .
(A) payment gateways
(B) processors
(C) issuing bank
(D) acquiring bank
Answer:
(A) payment gateways
Question 284.
……………… sends the payment details to the issuing bank of the customer.
(A) Merchant
(B) Processors
(C) Issuing bank
(D) Acquiring bank
Answer:
(B) Processors
Question 285.
Processors send the payment details to the ………….. .
(A) issuing bank of the customer.
(B) merchant’s bank
(C) (A) and (B) both
(D) none of these
Answer:
(C) (A) and (B) both
Question 286.
Acquiring bank credits the amount to the ………………… account .
(A) merchant
(B) customer
(C) (A) and (B) both
(D) none of these
Answer:
(A) merchant
Question 287.
………………… after including the charges sends the bill to the customer .
(A) payment gateways
(B) payment processors
(C) acquiring bank
(D) issuing bank
Answer:
(D) issuing bank
Question 288.
Credit card companies use ………………. to make online transaction secure.
(A) secure online transfer
(B) secure electronic transfer
(C) secure money transfer
(D) secure payment transfer
Answer:
(B) secure electronic transfer
Question 289.
SET stands for ……………… .
(A) Secure Electronic Transfer
(B) Static Electronic Transfer
(C) Settlement Electronic Transfer
(D) Subscribe Electronic Transfer
Answer:
(A) Secure Electronic Transfer
Question 290.
……………….. is the advantage of using credit card.
(A) Customers need not to carry big amount
(B) Bank keeps the record of purchase
(C) Purchase is possible without available cash
(D) All of these
Answer:
(D) All of these
Question 291.
How many ways payment is done through credit card ?
(A) 2
(B) 3
(C) 4
(D) 5
Answer:
(A) 2
Question 292.
Which is the way of payment is through credit card ?
(A) Online payment
(B) Offline payment
(C) (A) and (B) both
(D) None of these
Answer:
(C) (A) and (B) both
Question 293.
Purchase is possible without available amount through credit card.
Choose the appropriate option.
(A) True
(B) False
(C) Can’t Say
(D) None of these
Answer:
(A) True
Question 294.
……………. is the limitation of using credit card.
(A) Unsuitable for very small payment
(B) Security issue is there
(C) Unsuitable for very large payment
(D) All of these
OR
(A) Customers tend to overspend
(B) Credit card may be lost or stolen
(C) Security is the concern
(D) All of these
Answer:
(D) All of these
Question 295.
Credit card is suitable for very small or very large payment.
Choose the appropriate option.
(A) True
(B) False
(C) Can’t Say
(D) None of these
Answer:
(B) False
Question 296.
Debit cards are similar to ……………….. .
(A) credit cards
(B) master cards
(C) user card
(D) online card
Answer:
(A) credit cards
Question 297.
In ……………… card amount is directly transferred from user’s account to merchant’s account.
(A) credit card
(B) debit card
(C) smart card
(D) charge card
Answer:
(B) debit card
Question 298.
In ……………… card amount is directly debited to user’s account.
(A) debit card
(B) credit card
(C) (A) and (B) Both
(D) none of these
Answer:
(A) debit card
Question 299.
……………… card limits the customer from high purchase and does not allow to purchase beyond the amount.
(A) Debit card
(B) Credit card
(C) (A) and (B) both
(D) None of these
Answer:
(B) Credit card
Question 300.
Using …………….. card, it is necessary to look for the available balance amount.
(A) debit card
(B) credit card
(C) (A) and (B) both
(D) none of these
Answer:
(A) debit card
Question 301.
……………… is inserted on the surface of the smart card.
(A) Microcard
(B) Microreader
(C) Microcheap
(D) Microtape
Answer:
(C) Microcheap
Question 302.
…………… has the microchip on its surface.
(A) Smart card
(B) Debit card
(C) Credit card
(D) Charge card
Answer:
(C) Credit card
Question 303.
…………….. type of information can be stored in smart card.
(A) Account information
(B) Information of insurance related to health
(C) Private key and user’s other information
(D) All of these
Answer:
(D) All of these
Question 304.
How many times more data can be stored on smart card compared to other card ?
(A) Hundred
(B) Thousand
(C) Lac
(D) Crore
Answer:
(A) Hundred
Question 305.
In what way data is stored on smart card ?
(A) As characters
(B) As digits
(C) (A) and (B) both
(D) Encrypted
Answer:
(D) Encrypted
Question 306.
Data on the smart card is more secured than ……………… .
(A) debit card
(B) credit card
(C) (A) and (B) both
(D) none of these
Answer:
(C) (A) and (B) both
Question 307.
Smart card can be used for ……………… purpose.
(A) to store digital cash
(B) to get medical report of patient
(C) (A) and (B) both
(D) none of these
Answer:
(C) (A) and (B) both
Question 308.
In ……………… country smart cards are very popular.
(A) U.S.
(B) European
(C) Japan
(D) All of these
Answer:
(D) All of these
Question 309.
……………… device is needed to use the data of smart card.
(A) Smart card reader
(B) Smart card computer
(C) Smart card device
(D) Smart card database
Answer:
(A) Smart card reader
Question 310.
How the smart card reader is useful ?
(A) To view the information of smart card
(B) To insert the new data on smart card
(C) (A) and (B) both
(D) None of these
Answer:
(C) (A) and (B) both
Question 311.
Charge card is the type of ……………… process.
(A) payment
(B) purchase
(C) sale
(D) banking
Answer:
(A) payment
Question 312.
In charge card, customer pays through to …………………. the merchant.
(A) online banking
(B) cash
(C) charging
(D) card
Answer:
(D) card
Question 313.
There is no purchase limit in charge card. Choose the appropriate option.
(A) True
(B) False
(C) Can’t say
(D) None of these
Answer:
(A) True
Question 314.
There is no purchase limit in credit card. Choose the appropriate option.
(A) True
(B) False
(C) Can’t say
(D) None of these
Answer:
(B) False
Question 315.
…………. is done if the payment is not done within specified period in charge card.
(A) Late fees are charged
(B) Card is being cancelled
(C) Credit limit is reduced
(D) Asks to pay through installment
Answer:
(A) Late fees are charged
Question 316.
Net banking is known as ……………. .
(A) internet banking
(B) n-banking
(C) online banking
(D) next banking
Answer:
(C) online banking
Question 317.
…………… card is included in net banking.
(A) Credit card
(B) Debit card
(C) Smart card
(D) None of these
Answer:
(D) None of these
Question 318.
………………. customer can use the net banking or online banking.
(A) Any account holder
(B) Customer must be a member of online banking
(C) Customer holding bank account with internet banking
(D) Customer must have online card
Answer:
(C) Customer holding bank account with internet banking
Question 319.
What can be done through net banking by a customer ?
(A) Online purchase
(B) Payment
(C) (A) and (B) both
(D) None of these
Answer:
(C) (A) and (B) both
Question 320.
What is to be given by customer for online purchase through net banking ?
(A) Password given by a bank
(B) Online passbook given by bank
(C) Online agreement
(D) E-money
Answer:
(A) Password given by a bank
Question 321.
…………….. gives the feature of payment through net banking.
(A) Websites of E-Commerce
(B) Websites of M-Commerce
(C) (A) and (B) both
(D) None of these
Answer:
(C) (A) and (B) both
Question 322.
Arrange the steps of online purchase through net banking.
(1) Amount is transferred from user’s account.
(2) After selecting the bank the website of bank is opened where using account number and password, customer has to log-in.
(3) Website asks for the bank to be selected
(4) Select net banking option after selecting the product on website.
(A) 4, 2, 3, 1
(B) 4, 3, 2, 1
(C) 4, 1, 3, 2
(D) 4, 3, 1, 2
Answer:
(B) 4, 3, 2, 1
Question 323.
…………… website is used for Indian railways ticket booking.
(A) www.irctc.co.in
(B) www.irctc.com
(C) www.irctc.in
(D) www.irctc.org
Answer:
(A) www.irctc.co.in
Question 324.
IRCTC stands for …………….. .
(A) Indian Railway Catering and Traveling Corporation Limited
(B) Indian Railway Catering and Territory Corporation Limited
(C) Indian Railway Catering and Tourism Corporation Limited
(D) Indian Railway Catering and Terminus Corporation Limited
Answer:
(C) Indian Railway Catering and Tourism Corporation Limited
Question 325.
……………… way railway ticket can be represented during traveling.
(A) Instead of tickets, the message which is achieved on mobile.
(B) Making the print of E-copy on the printer
(C) Providing Online registration details
(D) (A) or (B)
Answer:
(D) (A) or (B)
Question 326.
……………….. mode of payment is more secured compared to credit card.
(A) Net banking
(B) Debit card
(C) Smart cards
(D) All of these
Answer:
(A) Net banking
Question 327.
The transferring of amount is called ………………. .
(A) process fund transfer
(B) online fund transfer
(C) electronic fund transfer
(D) cash fund transfer
Answer:
(C) electronic fund transfer
Question 328.
EFT stands for ………………… .
(A) Electronic Fund Transformation
(B) Electronic Fund Transfer
(C) Electronic Fund Technology
(D) Electronic Fund Transaction
Answer:
(B) Electronic Fund Transfer
Question 329.
Electronic Fund Transfer is more secured and less costly than ………………. .
(A) cheque
(B) collections
(C) (A) and (B) both
(D) none of these
Answer:
(C) (A) and (B) both
Question 330.
How is EFT compared to paper cheque and personal collections ?
(A) Secured
(B) Definite
(C) Effective and less costly
(D) All of these
Answer:
(D) All of these
Question 331.
………………… is the example of EFT.
(A) Transactions of global banks
(B) Paying tuition fees through ATM
(C) Credit the salary of employees to their accounts
(D) All of these
Answer:
(D) All of these
Question 332.
…………….. is the benefit of EFT.
(A) Increment of effectiveness of EFT
(B) Easy naming
(C) More security
(D) All of these
OR
(A) Less costly
(B) Definite
(C) Effective
(D) All of these
Answer:
(D) All of these
Question 333.
…………….. information is to be provided in a form while purchasing through e-commerce.
(A) Name
(B) Address where product to be sent
(C) Credit card details
(D) All of these
Answer:
(D) All of these
Question 334.
Instead of filling information so many times by user, the merchant stores his details on the server which is called …………….. .
(A) E-wallet
(B) E-storage
(C) E-copy
(D) E-server
Answer:
(A) E-wallet
Question 335.
…………….. is easy in using E-wallet.
(A) Purchase
(B) Ticket registration
(C) (A) and (B) both
(D) None of these
Answer:
(C) (A) and (B) both
Question 336.
……………… provides the feature of E-wallet.
(A) Banks
(B) Online shops of grocery
(C) Telephone service
(D) All of these
Answer:
(D) All of these
Question 337.
The electronic card for secured online payment to merchant is called ……………….. .
(A) E-card
(B) E-wallet
(C) E-payment
(D) E-storage
Answer:
(B) E-wallet
Question 338.
E-wallet works like …………….. .
(A) credit card
(B) debit card
(C) (A) and (B) both
(D) net banking
Answer:
(C) (A) and (B) both
Question 339.
……………… number is not needed while making payment through e-wallet.
(A) Credit card number
(B) Debit card number
(C) (A) and (B) both
(D) None of these
Answer:
(C) (A) and (B) both
Question 340.
RuPay is a combination of ……………… .
(A) Rupee and Paying
(B) Rupee and Payment
(C) Rupee and Pay-roll
(D) Rupee and Payee
Answer:
(B) Rupee and Payment
Question 341.
RuPay is introduced by ……………….. .
(A) National Payment Corporation of India
(B) National Card Corporation of India
(C) National E-Payment Corporation of India
(D) National Payment Source of India
Answer:
(A) National Payment Corporation of India
Question 342.
here is no local bank in India which can connect the card holders, merchants and issuing banks of world to MasterCard and Visa. Choose the appropriate option.
(A) True
(B) False
(C) Can’t Say
(D) None of these
Answer:
(A) True
Question 343.
……………. is the world wide leader in the field of payment.
(A) Master card
(B) Visa card
(C) (A) and (B) both
(D) None of these
Answer:
(C) (A) and (B) both
Question 344.
By whom transactions are done globally ?
(A) Master card
(B) Visa card
(C) (A) and (B) both
(D) None of these
Answer:
(C) (A) and (B) both
Question 345.
All the processes done for RuPay card are performed in …………….. .
(A) India
(B) U.S.A.
(C) Foreign countries
(D) All of these
Answer:
(A) India
Question 346.
…………… is the reason by which transaction cost reduces in RuPay card.
(A) Very easy process of transactions
(B) Processes are done at low cost
(C) Processes are done at local level
(D) Processes are done free of cost
Answer:
(C) Processes are done at local level
Question 347.
For which reason RuPay is beneficial for customer and banks ?
(A) Available at free of cost
(B) It is less costly
(C) Processes are very easy
(D) Gives the feature of credit and installments
Answer:
(B) It is less costly
Question 348.
What are internet based activities called ?
(A) Cyber Activities
(B) Online Activities
(C) Information Activities
(D) Intranet Activities
Answer:
(A) Cyber Activities
Question 349.
Which of the following is a threat to children who use internet ?
(A) Cyber Bullying
(B) Cyber Grooming
(C) Online Gaming
(D) All of these
Answer:
(D) All of these
Question 350.
What is an aggressive and intentional act carried out by an individual or a group against a person who cannot easily defend him or herself called ?
(A) Cyber Grooming
(B) Cyber Bullying
(C) Cyber Fraud
(D) Cyber Wildness
Answer:
(B) Cyber Bullying
Question 351.
Which of the following is a threat issued using online mediums with an intention to provoke for a wrong act or to harm someone ?
(A) Cyber Wildness
(B) Cyber Grooming
(C) Cyber Bullying
(D) Cyber Phishing
Answer:
(C) Cyber Bullying
Question 352.
Which of the following is a form of virtual harassment ?
(A) Cyber Bullying
(B) Cyber Grooming
(C) Cyber Wildness
(D) All of these
Answer:
(A) Cyber Bullying
Question 353.
Through the use of which device does a threat such as cyber bullying is performed or executed ?
(A) Smartphone
(B) Tablet
(C) Computers
(D) All of these
Answer:
(D) All of these
Question 354.
Where does cyber bullying usually occurs ?
(A) Social media
(B) Chat rooms
(C) Gaming platforms
(D) All of these
Answer:
(D) All of these
Question 355.
Posting comments, photos or videos of a person, community or organization that are humiliating, embarrassing and nasty is which type of threat ?
(A) Cyber Bullying
(B) Cyber Wildness
(C) Cyber Grooming
(D) Cyber Fraud
Answer:
(A) Cyber Bullying
Question 356.
Which of the following steps can help to stop cyber bullying ?
(A) Never talk about bullying with friends, teachers and family.
(B) Decide on what personal information is appropriate for disclosure on Internet.
(C) Try to be public
(D) All of these
Answer:
(B) Decide on what personal information is appropriate for disclosure on Internet.
Question 357.
What should be taken care while interacting online ?
(A) Never reply in anger
(B) Never post information that can harm you
(C) Always take some time before doing any activity.
(D) All of these
Answer:
(D) All of these
Question 358.
What should be done if you have become a victim of cyber bullying ?
(A) Don’t reply the person
(B) Block the person and tell someone.
(C) Discuss with someone about it
(D) All of these
Answer:
(D) All of these
Question 359.
An adult befriending a child online and building an emotional connection with the child is an example of which of the following ?
(A) Cyber Bullying
(B) Cyber Grooming
(C) Cyber Wildness
(D) Cyber Fraud
Answer:
(B) Cyber Grooming
Question 360.
In which of the following cyber threats the main intention of criminal is to gain child’s trust, obtain intimate, personal and sexual information about the child ?
(A) Cyber Grooming
(B) Cyber Bullying
(C) Cyber Fraud
(D) Cyber Wildness
Answer:
(A) Cyber Grooming
Question 361.
What are the games that can be played either partially or primarily through the internet or any other computer network available called ?
(A) Cyber Games
(B) Internet games
(C) Online games
(D) Networking Games
Answer:
(C) Online games
Question 362.
Which of the following is an online game ?
(A) First-person shooters
(B) Strategy games
(C) Role-playing games
(D) All of these
Answer:
(D) All of these
Question 363.
In which environment can the online games be designed ?
(A) Simple text-based environment
(B) Complex graphics and virtual worlds
(C) (A) or (B)
(D) None of these
Answer:
(C) (A) or (B)
Question 364.
The culture of online gaming can promote which of the following ?
(A) Cyber bullying
(B) Cyber grooming
(C) Violence
(D) All of these
Answer:
(D) All of these
Question 365.
Which principal should be followed by the Internet users ?
(A) Never add any known person to ones social media or chat rooms.
(B) Never add any unknown person to ones social media or chat rooms.
(C) Never add any known person to other’s social media or chat rooms.
(D) Never add any unknown person to other’s social media or chat rooms.
Answer:
(B) Never add any unknown person to ones social media or chat rooms.
Question 366.
An E-mail system is usually made up of how many components ?
(A) 2
(B) 3
(C) 4
(D) 5
Answer:
(A) 2
Question 367.
Which of the following option shows the components of an E-mail system ?
(A) Web client and mail server
(B) Mail clients and web server
(C) Mail client and mail server
(D) Web client and web server
Answer:
(C) Mail client and mail server
Question 368.
What is used by the mail client to send the emails to a mail server ?
(A) Web infrastructure
(B) Network infrastructure
(C) Mail infrastructure
(D) Server infrastructure
Answer:
(B) Network infrastructure
Question 369.
Which of the following is a common threat that people may face when using emails ?
(A) Malware, Spam
(B) Phishing, Social engineering
(C) Unauthorized access to resources and Information leak
(D) All of these
Answer:
(D) All of these
Question 370.
What is malware ?
(A) Malicious Software
(B) Malicious Hardware
(C) Malarias Software
(D) Malarial Hardware
Answer:
(A) Malicious Software
Question 371.
In which of the following aire viruses, worms, trojan horses, and spyware included ?
(A) Spam
(B) Phishing
(C) Malware
(D) All of these
Answer:
(C) Malware
Question 372.
Which of the following activities can be done by malware ?
(A) Can be used to control machine
(B) Can access information and monitor activity
(C) Log keys and perform other malicious actions
(D) All of these
Answer:
(D) All of these
Question 373.
What are unsolicited e-mails that may be of commercial or non-commercial in nature known as ?
(A) Malware
(B) Spam
(C) Phishing
(D) Bullying
Answer:
(B) Spam
Question 374.
Which term is used to refer to the sending of unwanted commercial e-mail messages in large numbers to random people.
(A) Spying
(B) Sparking
(C) Spamming
(D) Spaining
Answer:
(C) Spamming
Question 375.
Which of the following aims at disrupting user productivity, utilizing excessive computer resource like disk space, memory or processor ?
(A) Spam
(B) Malware
(C) Bullying
(D) Phishing
Answer:
(A) Spam
Question 376.
Which of the following is used to spread malware ?
(A) Phishing
(B) Bullying
(C) E-mail
(D) Spam
Answer:
(A) Phishing
Question 377.
Which of the following folders is provided with most of the email systems ?
(A) Bullying
(B) Spam
(C) Malware
(D) All of these
Answer:
(B) Spam
Question 378.
What does the use of deceptive means usually in form of a fake website page or web link to trick individuals into responding to the e-mail and disclosing sensitive information refer to ?
(A) Phishing
(B) Malware
(C) Bullying
(D) Spam
Answer:
(A) Phishing
Question 379.
Which of the following activities are done through suspicious e-mails ?
(A) Phishing, Malware
(B) Malware, Spam
(C) Phishing, Spam
(D) All of these
Answer:
(C) Phishing, Spam
Question 380.
Which of the following is considered to be weakest link in the security chain ?
(A) Computer
(B) Human
(C) Network
(D) Internet
Answer:
(B) Human
Question 381.
What exploits the weakness of human to trick people into handing over access to ones or organization’s sensitive information ?
(A) Social Media
(B) Social Networking
(C) Social server
(D) Social Engineering
Answer:
(D) Social Engineering
Question 382.
Which of the following is a common social engineering attack ?
(A) E-mail spoofing
(B) E-mail Grooming
(C) E-mail Phishing
(D) E-mail Malware
Answer:
(A) E-mail spoofing
Question 383.
Which of the following is a common social engineering attack, where a person or a program successfully pretends to be an official user by falsifying the sender information shown in e-mail and hides its true origin ?
(A) E-mail Malware
(B) E-mail Phishing
(C) E-mail spoofing
(D) E-mail Grooming
Answer:
(C) E-mail spoofing
Question 384.
Which of the following is a point included in the general guideline for organizations and user on precautionary usage of email ?
(A) Choose an easy password
(B) Never use E-mail facility through a public Wi-Fi
(C) Don’t open any E-mail from trusted sources
(D) Open attachments attached with unwanted E-mails
Answer:
(B) Never use E-mail facility through a public Wi-Fi
Question 385.
Which of the following should be practiced on Mail server on regular basis ?
(A) User authentication
(B) Access control
(C) Resource control
(D) All of these
Answer:
(D) All of these
Question 386.
‘Mail clients poses greater risk to security than the mail server.’ Which of the following options is correct for the given statement ?
(A) The given statement is true
(B) The given statement is false
(C) May be true depending on the situation
(D) None of these
Answer:
(A) The given statement is true
Question 387.
What should be done once the e-mail activity is done ?
(A) log in the email
(B) Logging out of the email
(C) Secure the email service
(D) None of these
Answer:
(B) Logging out of the email
Question 388.
What is the best practice that should be adopted by the mail clients to send user authentication data and e-mail content ?
(A) To send in simple format
(B) to encrypt the user authentication as well as e-mail data
(C) To send in text format
(D) To send in graphic format
Answer:
(B) to encrypt the user authentication as well as e-mail data
Question 389.
Which of the following might be true for the e-mails sent by untrusted sources ?
(A) They may be spam
(B) They may be sent for phishing
(C) It is advisable not to open such mails
(D) All of these
Answer:
(D) All of these
Question 390.
Which of the following are considered as the main culprits for spreading a malware or virus on computer systems ?
(A) E-mail attachments
(B) E-mail text
(C) E-mail Password
(D) All of these
Answer:
(A) E-mail attachments
Question 391.
A combination of which of the following is best suited password in case of security aspect ?
(A) Letters, numbers
(B) Symbols
(C) Punctuation marks
(D) All of these
Answer:
(D) All of these
Question 392.
Which of the following statements is true regarding a password ?
(A) Choose a difficult password
(B) Choose a password with a mix of letters, numbers, symbols, and punctuation marks
(C) Change the password at regular interval.
(D) All of these
Answer:
(D) All of these
Question 393.
Which authentication should users apply to secure e-mail system ?
(A) One Factor Authentication
(B) Two Factor Authentication
(C) Three Factor Authentication
(D) All of these
Answer:
(B) Two Factor Authentication
Question 394.
What is two factor authentication commonly known as ?
(A) 1FA
(B) 2FA
(C) 3FA
(D) 4FA
Answer:
(B) 2FA
Question 395.
Which WiFi are good for normal Internet surfing ?
(A) Public
(B) Free
(C) Both (A) and (B)
(D) Personal
Answer:
(C) Both (A) and (B)
Question 396.
Which of the following activities should not be done using public or free WiFi ?
(A) Personal or official emails
(B) Ecommerce transactions
(C) Normal Internet surfing
(D) Both (A) and (B)
Answer:
(D) Both (A) and (B)
Question 397.
Provides an extra layer of security whenever you are away from your machine for a small period of time ?
(A) Locking the machine
(B) Switching off the machine
(C) Locking the screen
(D) Switching off the screen
Answer:
(C) Locking the screen