πŸ“Š Digital Business
Q. is a person who breaks in or trespasses a computer system
  • (A) Hacker
  • (B) Snooper
  • (C) operator
  • (D) spoofer
πŸ’¬ Discuss
βœ… Correct Answer: (A) Hacker
πŸ“Š Digital Business
Q. A is an electronic file that uniquely identifies individuals and websites on the internet and enables secure confidential communications
  • (A) Digital signature
  • (B) Digital certificates
  • (C) SSL
  • (D) none of these
πŸ’¬ Discuss
βœ… Correct Answer: (B) Digital certificates
πŸ“Š Digital Business
Q. A provides a way to associate the message with the sender and is the equivalent of an ordinary signature.
  • (A) cyber signature
  • (B) Digital signature
  • (C) SSL
  • (D) none of these
πŸ’¬ Discuss
βœ… Correct Answer: (B) Digital signature
πŸ“Š Digital Business
Q. is the reverse process of encryption, to make the information readable once again
  • (A) Spoofing
  • (B) Decryption
  • (C) Sniffing
  • (D) Cryptography
πŸ’¬ Discuss
βœ… Correct Answer: (B) Decryption
πŸ“Š Digital Business
Q. is the process of making information unintelligible to the unauthorized user.
  • (A) Spoofing
  • (B) Snooping
  • (C) Sniffing
  • (D) Cryptography
πŸ’¬ Discuss
βœ… Correct Answer: (D) Cryptography
πŸ“Š Digital Business
Q. attacks are difficult and are only successful if the attacker knows something about the shopper
  • (A) Spoofing
  • (B) Snooping
  • (C) Sniffing
  • (D) Guessing passwords
πŸ’¬ Discuss
βœ… Correct Answer: (D) Guessing passwords
πŸ“Š Digital Business
Q. The verification of credit card is done by using… with a communications link to the merchants acquiring bank
  • (A) Credit card payment terminal
  • (B) Point of Sale
  • (C) All of these
  • (D) none of these
πŸ’¬ Discuss
βœ… Correct Answer: (C) All of these
πŸ“Š Digital Business
Q. Prevents unauthorized communication into and out of the network, allowing the organization to enforce a security policy on traffic between its network and the internet.
  • (A) Network firewall
  • (B) Antivirus
  • (C) both of these
  • (D) none of these
πŸ’¬ Discuss
βœ… Correct Answer: (A) Network firewall
πŸ“Š Digital Business
Q. acts like a gate keeper that examines each users identification before allowing them to enter to the organization’s internal networks.
  • (A) Network firewall
  • (B) Antivirus
  • (C) both of these
  • (D) none of these
πŸ’¬ Discuss
βœ… Correct Answer: (A) Network firewall
πŸ“Š Digital Business
Q. A is a person who gains unauthorized access to a computer network for profit, criminal mischief or personal pleasure.
  • (A) Hacker
  • (B) spoofer
  • (C) operator
  • (D) none of these
πŸ’¬ Discuss
βœ… Correct Answer: (A) Hacker