M Mr. Dubey π Coach β 102.92K Points π E-Commerce Management Q. Information sent over the internet commonly uses the set of rules called (A) ftp (B) tcp/ip (C) http (D) gopher ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (B) tcp/ip
M Mr. Dubey π Coach β 102.92K Points π E-Commerce Management Q. Customers are concerned about (A) privacy and security of information (B) how things are managed (C) business practices (D) none ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) privacy and security of information
M Mr. Dubey π Coach β 102.92K Points π E-Commerce Management Q. SATAN is an example (A) unauthorized disclosures (B) unauthorized actions (C) snooping (D) spoofing ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (C) snooping
M Mr. Dubey π Coach β 102.92K Points π E-Commerce Management Q. ………………… can catch the transmissions to obtain customers sensitive information (A) fire wall (B) anti virus (C) hackers (D) none ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (C) hackers
M Mr. Dubey π Coach β 102.92K Points π E-Commerce Management Q. The organization has to ensure that the …………… are sent to the customers (A) ordered goods (B) unordered goods (C) good quality goods (D) none ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) ordered goods
M Mr. Dubey π Coach β 102.92K Points π E-Commerce Management Q. ……………….. techniques make use of secret codes (or) keys to encrypt information (A) cryptography (B) encryption (C) digital certificate (D) none ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) cryptography
M Mr. Dubey π Coach β 102.92K Points π E-Commerce Management Q. ………………… are electronic files that are used to uniquely identify people and resources over the internet (A) digital signature (B) digital certificate (C) encryption recourse (D) none ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (B) digital certificate
M Mr. Dubey π Coach β 102.92K Points π E-Commerce Management Q. There are different types of risks connected with information protection such as disruption, disaster. (A) unauthorized access (B) publicity (C) consumer (D) none ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) unauthorized access
M Mr. Dubey π Coach β 102.92K Points π E-Commerce Management Q. …………………….is designed to protect a persons personal information (A) data integrity (B) cyber law (C) private legislation (D) none ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (C) private legislation
M Mr. Dubey π Coach β 102.92K Points π E-Commerce Management Q. Privacy laws of their host Coventry effect (A) domestic companies (B) overseas companies (C) neighboring companies (D) none ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (B) overseas companies