Q1: Public key of the receiver is used to:
(A) Decrypt the message
(B) Encrypt the message
(C) Scramble the message
(D) None of the mentioned options
Answer: B – Encrypt the message
Q2: Most electronic payment systems on the internet use ___ to ensure confidentiality and security of payment information.
(A) Quantum computing
(B) Cryptography
(C) Both of the mentioned options
(D) None of the mentioned options
Answer: B – Cryptography
Q3: Customers can provide feedback or register complaints more conveniently in online business than offline business.
(A) True
(B) False
Answer: A – True
Q4: Physical proximity with items purchased and no inventory cost are disadvantages of e-business.
(A) True
(B) False
Answer: B – False
Q5: Online publishing is attractive because printing and distribution costs are involved.
(A) True
(B) False
Answer: B – False
Q6: In geographic segmentation, customers are divided into groups based on where they live or work.
(A) True
(B) False
Answer: A – True
Q7: Discount advertisements through websites are a form of e-marketing.
(A) True
(B) False
Answer: A – True
Q8: Interactive advertising refers to internet-based broadcasting of audio and video content.
(A) True
(B) False
Answer: A – True
Q9: One major goal of CRM is to establish a long-lasting relationship between a company and its customers.
(A) True
(B) False
Answer: A – True
Q10: In B2B, there is direct contact with the end users.
(A) True
(B) False
Answer: B – False
Q11: AltaVista and Yahoo are examples of search engines.
(A) True
(B) False
Answer: A – True
Q12: Segment information is useful for companies to develop better relationships with other companies.
(A) True
(B) False
Answer: A – True
Q13: Receiver applies ___ to the received original message.
(A) Digital signature
(B) Message digest
(C) Hash function
(D) None of the mentioned options
Answer: A – Digital signature
Q14: Symmetric key can be replaced with:
(A) Symmetric algorithms
(B) Pair of public and private keys
(C) Asymmetric key
(D) None of the mentioned options
Answer: C – Asymmetric key
Q15: In ___ attack, an attempt is made to decrypt a message using every possible key.
(A) Key search attack
(B) Cryptanalysis
(C) System based
(D) None of the mentioned options
Answer: A – Key search attack
Q16: Simplicity and ___ is the biggest advantage of Virtual PIN payment system.
(A) Full encryption
(B) Dual encryption
(C) No encryption
(D) None of the mentioned options
Answer: C – No encryption
Q17: In electronic checks, which type of cryptography is used?
(A) Both symmetric and asymmetric
(B) Symmetric
(C) Asymmetric
(D) None of the mentioned options
Answer: A – Both symmetric and asymmetric
Q18: An electronic checkbook device is a combination of:
(A) Hardware and a digital signature
(B) Software and information about the user
(C) Secure hardware and software
(D) None of the mentioned options
Answer: C – Secure hardware and software
Q19: Which of the following is a disadvantage of the Virtual PIN payment system?
(A) Bogus purchases are possible
(B) Stolen credit card numbers can be used
(C) Only some extra copies of information items are made in case of fraud
(D) All of the mentioned options
Answer: D – All of the mentioned options
Q20: FV stands for:
(A) First Virtual
(B) Forward Virtual
(C) Famous Virtual
(D) None of the mentioned options
Answer: A – First Virtual