IT430 - up to date ONLINE Quizzes

No Comments
Question # 1 of 10 ( Start time: 01:37:47 PM ) Total Marks: 1
Characterization and Clustering belong to which of the following types of Data Mining?
Select correct option:

Predictive
Selective
Descriptive
Additive



Question # 2 of 10 ( Start time: 01:39:09 PM ) Total Marks: 1
When customer life cycle is used to create different groups of customers, it is called?
Select correct option:

Targeting Customers
Dynamic groups
Customer Life Cycle Segmentation
Group Development


Question # 3 of 10 ( Start time: 01:40:10 PM ) Total Marks: 1
Which statement is most appropriate description of the term “Interactive-advertisement”?
Select correct option:

By making an advertisement message using flash animation.
Putting an audio or video message on the website to attract customer.
By avoiding customer’s involvement in the advertisement process.
By involving the customer in the advertisement process itself(not confirm)


Question # 4 of 10 ( Start time: 01:41:32 PM ) Total Marks: 1
While designing a website, which of the following factors an internet marketer should pay attention to?
Select correct option:

Easy site navigation (i.e. Site map)
Frequently asked questions (FAQs) section
Privacy policy
All of above


Question # 5 of 10 ( Start time: 01:42:25 PM ) Total Marks: 1
Which of these is an algorithm used in clustering?
Select correct option:

K-means
L-means
C-means
F-means


Question # 6 of 10 ( Start time: 01:43:23 PM ) Total Marks: 1
Many search engines rank the site by using a program called
Select correct option:

Spider
Scorpion
Moon
Cobweb


Question # 7 of 10 ( Start time: 01:44:39 PM ) Total Marks: 1
In which type of approach, we further dig the data for retrieving information from data warehouse?
Select correct option:

Slice
Dice
Drill down
Roll up


Question # 8 of 10 ( Start time: 01:45:23 PM ) Total Marks: 1
Let us, suppose that you have hosted early your e-commerce website to sell sweets online: Your customers are acquaint with the name of your company and “DesiGhee Burfi ”. They have never interacted with your company. Which of following loyalty stages they are?
Select correct option:

Awareness
Exploration(in doubt)
Familiarity
Commitment


Question # 9 of 10 ( Start time: 01:47:04 PM ) Total Marks: 1
Log files consist on information about each visitor's _________.
Select correct option:

Location
IP address
Time of visit
All of above


Question # 10 of 10 ( Start time: 01:47:27 PM ) Total Marks: 1
CPM is an advertising payment mode. CPM stands for ________.
Select correct option:

Cost Per Month
Cost Per Minute
Cost Per Megabyte
Cost Per Message


In which type of data mining, ID3 algorithms is used?
Select correct option:
Classification
Association
Characterization
Clustering
Classification = Answer
Objective of any marketing strategy is to bring the customers quickly to the ___________.
Select correct option:
Familiarity stage
Exploration stage
Separation stage
Commitment stage
Commitment stage = answer
Which of these can be used for advertisement purpose?
Select correct option:
Telephone
Newspapers
Magazines
All of above
All of above = Answer
In Frequent-Flyer Miles marketing, customer of the business earns specific miles free of charge from _______.
Select correct option:
Bus service
Train service
Airline
None of above
Which of following marketing campaigns are cheap an effective way to target potential customers?
Select correct option:
Sale forces
E-mail
Media promotion
Marketing software
E-mail = answer
Let us, suppose that you have hosted your e-commerce website, Promotion messages can be sent when potential client is
Select correct option:
online
offline
both online and offline
visiting head office

Which of the following is NOT an advertising payment mode?
Select correct option:
Pay-per-sale
Pay-per-click
Pay-per-keypress
Pay-per-lead
Pay-per-keypress = Answer

Question # 2 of 10 ( Start time: 06:15:09 PM ) Total Marks: 1
Which of these can be used for advertisement purpose?
Select correct option:

Telephone

Newspapers

Magazines

All of above
Question # 3 of 10 ( Start time: 06:15:42 PM ) Total Marks: 1
Traditionally Marketer use the market segmentation(s) like
Select correct option:

Geo-graphic Segmentation

Demographic Segmentation

Psychographic Segmentation

All of the above
Question # 4 of 10 ( Start time: 06:17:00 PM ) Total Marks: 1
Which statement is most appropriate description of the term “Interactive-advertisement”?
Select correct option:

By making an advertisement message using flash animation.

Putting an audio or video message on the website to attract customer.

By avoiding customer’s involvement in the advertisement process.

By involving the customer in the advertisement process itself.
Question # 5 of 10 ( Start time: 06:18:33 PM ) Total Marks: 1
Let us, suppose that you have hosted your e-commerce website, When you provide “opt-in e-mail” option to your customers on your website and customer opt for it , what does it mean to receive ?
Select correct option:

Information about product through advertisement

Information about product through e-mail

Information about services available on it

Information about News through e-mail.
Question # 6 of 10 ( Start time: 06:19:48 PM ) Total Marks: 1
Where there are quite a few erroneous or missing values in a row then that row can be deleted or discarded. This process is called...............
Select correct option:

Data Deletion

Data Selection

Data Integration

Data Transformation
Question # 7 of 10 ( Start time: 06:21:11 PM ) Total Marks: 1
Creation of separate experiences for customers based on their behavior is called
Select correct option:

Demographic segmentation

Behavioral segmentation

Geo-Graphic Segmentation

None of the above
Question # 8 of 10 ( Start time: 06:22:42 PM ) Total Marks: 1
Customer Loyalty model is also called
Select correct option:

Customer Life Cycle

Customer Segmentation

Customer Awareness

All
Question # 9 of 10 ( Start time: 06:24:15 PM ) Total Marks: 1
Advertising Subscription Mixed Revenue Model includes
Select correct option:

Online journals

Sports information services

Business week online

All of the above
Question # 10 of 10 ( Start time: 06:25:24 PM ) Total Marks: 1
Which of these is an algorithm used in clustering?
Select correct option:

K-means

L-means

C-means

F-means

Fee for Transaction Models include
Select correct option:



Travel Agents and Insurance brokers

Automobile Sales and event tickets

Stock brokers and online banking

All of the above

Which one of the followings is an example of Banner advertising?
Select correct option:


Branding

Affiliate programs

Partnership

All of these







Question # 3 of 10 ( Start time: 12:37:26 PM ) Total Marks: 1
Log files consist on information about each visitor's _________.
Select correct option:


Location

IP address

Time of visit

All of above








Question # 4 of 10 ( Start time: 12:39:08 PM ) Total Marks: 1
In which type of approach, we further dig the data for retrieving information from data warehouse?
Select correct option:


Slice

Dice

Drill down

Roll up








Question # 5 of 10 ( Start time: 12:40:48 PM ) Total Marks: 1
Dividing potential customers on the basis of variables such as social class, personality, or lifestyle is called____________.
Select correct option:


Demographic Segmentation

Geographic Segmentation

Psychographic segmentation

Behavioral segmentation








Question # 7 of 10 ( Start time: 12:44:30 PM ) Total Marks: 1
If a company's marketing stretegy is focusing on customers having age less than 30, which of the following marketing segmentation technique is being used by company?
Select correct option:


Demographic Segmentation

Geographic Segmentation

Psychographic segmentation

Behavioral segmentation




Question # 8 of 10 ( Start time: 12:45:07 PM ) Total Marks: 1
Which of following marketing campaigns are cheap an effective way to target potential customers?
Select correct option:


Sale forces

E-mail

Media promotion

Marketing software








Question # 9 of 10 ( Start time: 12:45:58 PM ) Total Marks: 1
OLAP stands for……………
Select correct option:


Online Analytical Program

Online Analytical Processing

Online Application Program

Online Analysis Performance







Question # 10 of 10 ( Start time: 12:46:36 PM ) Total Marks: 1
Press release can provide information about current events and news to, which of following, via a internet?
Select correct option:


Print media

T.v commercial

Press or media

T.v program.

Answers of above quiz are:
1
: All of the above (not sure) pg # 130
2: Affiliate programs pg # 138
3: All of above pg # 136
4: Drill down pg # 146
5: Psychographic segmentation pg # 131
7: Demographic Segmentation pg # 131
8: E-mail pg # 133
9: Online Analytical Processing pg # 145
10: Press or media pg # 135
Chech out hadsout pages AND SORRY quiz # 6 is missing

Question # 1 of 10 ( Start time: 05:24:12 PM )
Total Marks: 1

The length of a message digest is ________.

Select correct option:

32 to 64 bits


64 to 128 bits


128 to 256 bits


256 to 512 bit


Virtual PIN Payment System requires both merchant and buyer to register with _______________.

Select correct option:


Auto Clearing House (ACH)


First Virtual (FV)


DSS (Digital Signature


is necessary for both buyer and seller to have their account in the ---------E-bank.

Select correct option:

Same


Separate


Key version represents public key by

Select correct option:

Buyer


Seller


E-Bank (page 116)


Certification Authority

If a key is 4 bit in length, how many unique key values are possible?

Select correct option:

4


8


16

32


Which of the following represents correct sequence of steps for electronic check payment system?

Select correct option:
Payer’s bank ? Payee ? Payee’s bank ? Payer


The serial # generated by the cyberwallet gets multiplied by blinding factor ‘r’ which is known only to the ___________.

Select correct option:

Bank


Merchant


Client


None


What is basic advantage of symmetric algorithms?

Select correct option:

Symmetric key does not use any encryption


Symmetric algorithms are faster


Symmetric


Attacker attempts to decrypt the message with every possible key in ______.

Select correct option:


Key Search Attacks


Cryptanalysis

Quiz Start Time: 11:56 PM
Time Left 75sec(s)


Question # 1 of 10 ( Start time: 11:56:22 PM ) Total Marks: 1
DES, IDEA, RC2, RC4 and Rinjdael are examples of _________.
Select correct option:

Symmetric key algorithms
Asymmetric key algorithms
Public key algorithms
Private key algorithms








Question # 2 of 10 ( Start time: 11:56:55 PM ) Total Marks: 1
Using SSL, we type in URL as :


https
httpc
httpc
httpi







Question # 3 of 10 ( Start time: 11:57:40 PM ) Total Marks: 1
If a key is 4 bit in length, how many unique key values are possible?


4
8
16
32







Question # 4 of 10 ( Start time: 11:58:46 PM ) Total Marks: 1
SSL stands for


Secure Socket Layer
Security Service Layer
Sub Secured Length
None of these







Question # 5 of 10 ( Start time: 11:59:06 PM ) Total Marks: 1
SETSET(secure Electronic Transaction) was developed by


Microsoft
Netscape Navigator
Master Cards and VISA
All of the options







Question # 6 of 10 ( Start time: 12:00:02 AM ) Total Marks: 1
Currency used in E-Cash Payment system is called _________.


Coin
Penny
Cent
Dollar







Question # 7 of 10 ( Start time: 12:00:39 AM ) Total Marks: 1
The serial # generated by the cyberwallet gets multiplied by blinding factor ‘r’ which is known only to the ___________.


Bank
Merchant
Client
None





Question # 8 of 10 ( Start time: 12:01:25 AM ) Total Marks: 1
User generates blank electronic check by using his checkbook device.


True
False









Question # 9 of 10 ( Start time: 12:01:44 AM ) Total Marks: 1
EFT stands for _____________.


Electronic Film Transmission
Electronic Funds Transfer
Electronic File Translation
None of above







Question # 10 of 10 ( Start time: 12:02:52 AM ) Total Marks: 1
What is basic advantage of symmetric algorithms?


Symmetric key does not use any encryption
Symmetric algorithms are faster
Symmetric algorithms are easy to understand
All of above


Question # 1 of 10 ( Start time: 05:24:12 PM )


Total Marks: 1

The length of a message digest is ________.

Select correct option:





32 to 64 bits



64 to 128 bits



128 to 256 bits



256 to 512 bit

Virtual PIN Payment System requires both merchant and buyer to register with _______________.

Select correct option:





Auto Clearing House (ACH)



First Virtual (FV)



DSS (Digital Signature





is necessary for both buyer and seller to have their account in the ---------E-bank.

Select correct option:





Same



Separate





Key version represents public key by

Select correct option:





Buyer



Seller



E-Bank



Certification Authority











If a key is 4 bit in length, how many unique key values are possible?

Select correct option:





4



8



16







Which of the following represents correct sequence of steps for electronic check payment system?

Select correct option:





Payer’s bank ? Payee ? Payee’s bank ? Payer









The serial # generated by the cyberwallet gets multiplied by blinding factor ‘r’ which is known only to the ___________.

Select correct option:





Bank



Merchant



Client



None





What is basic advantage of symmetric algorithms?

Select correct option:





Symmetric key does not use any encryption



Symmetric algorithms are faster



Symmetric





Attacker attempts to decrypt the message with every possible key in ______.

Select correct option:





Key Search Attacks



Cryptanalysis



ALL


FVIPSS stands for _________.

Select correct option:





First Virtual Internet Payment System Server



First Virtual International Payment System Server



First Virtual International Payment System Services



First Virtual Internal Payment System Services

Which entity does not include in SET(secure Electronic Transaction)?

Select correct option:





Seller



Buyer



Payment gateway



Bank

Which of these payment systems does not involve the use of encryption?

Select correct option:





Electronic check



Electronic cash



Virtual PIN



None

A unique large number, generated as a result of applying hash function on a message is called ________.

Select correct option:





Hash message



Message digest



Digitally singed message



Secret message

Which of these attacks have been reported on symmetric key algorithms?

Select correct option:





Key Search Attacks



Cryptanalysis



System-Based Attacks



All

Attacker attempts to decrypt the message with every possible key in ______.

Select correct option:





Key Search Attacks



Cryptanalysis



System-Based Attacks



None

What is basic advantage of symmetric algorithms?

Select correct option:





Symmetric key does not use any encryption



Symmetric algorithms are faster not sure



Symmetric algorithms are easy to understand



All of above

How many elements an e-coin has?

Select correct option:





1



2



3



4

Suppose you want to buy diamonds. Which of the following payment system you should give LEAST preference for this purpose?

Select correct option:





Virtual PIN payment system



Electronic checks



Electronic Cash



Credit card

By whom a payer secret code is generated, for proving the payment?

Select correct option:





Client



E-bank not sure



Seller



Merchant and client

A paper signature is believed to be more reliable than a digital signature.

Select correct option:





True



False

At deposit stage, the serial number is ……………..by E-Cashbank

Select correct option:





Known



Unknown



Kept Secret not sure



Informed

The serial # generated by the cyberwallet gets multiplied by blinding factor ‘r’ which is known only to the ___________.

Select correct option:





Bank



Merchant



Client not zsure



None

Virtual PIN Payment System requires both merchant and buyer to register with _______________.

Select correct option:





Auto Clearing House (ACH)



First Virtual (FV)



DSS (Digital Signature Standard)



DES (Data Encryption Standard)

Using SSL, we type in URL as :

Select correct option:





https



httpc



httpc



httpi

User generates blank electronic check by using his checkbook device.

Select correct option:





True



False not sure

Most of the electronic payment systems on internet use cryptography.

Select correct option:





True



False

What is added in message digest to create digital signatures?

Select correct option:





Sender's private key



Sender's public key



Sender's symmetric key



None of above

Key version represents public key by

Select correct option:





Buyer



Seller



E-Bank



Certification Authority not sure

Virtual PIN payment system needs a special software at front end.

Select correct option:





True



False

Which of these payment systems does not involve the use of encryption?

Select correct option:





Electronic check



Electronic cash



Virtual PIN



None

DES, IDEA, RC2, RC4 and Rinjdael are examples of _________.

Select correct option:





Symmetric key algorithms



Asymmetric key algorithms



Public key algorithms



Private key algorithms

Most of the electronic payment systems on internet use cryptography.

Select correct option:





True



False

Symmetric algorithms are faster than asymmetric.

Select correct option:





True



False

EFT stands for _____________.

Select correct option:





Electronic Film Transmission



Electronic Funds Transfer



Electronic File Translation



None of above

In Virtual Payment system , Four kinds of information is provided to e-bank. Identify which one is NOT included:

Select correct option:





Buyer Accounts identifier



Buyer password not sure



Address of Merchant



Actual amount of money in favor of merchant

Currency used in E-Cash Payment system is called _________.

Select correct option:





Coin



Penny



Cent



Dollar

At which of the following stage ,Validity of coins is done?

Select correct option:





Minting stage



Deposit stage



Withdrawal



Deposit stage and Withdrawal not sure

Virtual PIN Payment system is considered suitable for __________.

Select correct option:





Low-cost items



High-cost items



Very expensive items



Every kind of items

The length of a message digest is ________.

Select correct option:



32 to 64 bits

64 to 128 bits

128 to 256 bits

256 to 512 bits





In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded signed coins from last …………………withdrawals to the E-bank.

Select correct option:



10

12

14

16




A unique large number, generated as a result of applying hash function on a message is called ________.

Select correct option:



Hash message

Message digest

Digitally singed message

Secret message



The serial # generated by the cyberwallet gets multiplied by blinding factor ‘r’ which is known only to the ___________.

Select correct option:



Bank

Merchant

Client

None



Centralized Account Payment Model uses unique _________ of users as their account identifier.

Select correct option:



Residence address

E-mail address

Office address

None

Virtual PIN Payment System requires both merchant and buyer to register with _______________.

Select correct option:



Auto Clearing House (ACH)

First Virtual (FV)

DSS (Digital Signature Standard)

DES (Data Encryption Standard)





SETSET(secure Electronic Transaction) was developed in

Select correct option:



1995

1996

1997

1999



Virtual PIN payment system needs a special software at front end.

Select correct option:



True

False



ACH is a centralized system used by different interconnected banks for clearing payment requests.

Select correct option:



True

False







IT430 Quiz # 2

Question # 1 of 10 ( Star time: 05:33:37 PM ) Total Marks: 1
At deposit stage, the serial number is ……………..by E-Cashbank

Known
Unknow
Secure
View

Question # 2 of 10 ( Start time: 05:34:37 PM ) Total Marks: 1
User generates blank electronic check by using his checkbook device.
Select correct option:

True
False

Question # 3 of 10 ( Start time: 05:36:04 PM ) Total Marks: 1
In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded signed coins from last …………………withdrawals to the E-bank.
Select correct option:

10
12
14
16

Question # 4 of 10 ( Start time: 05:36:54 PM ) Total Marks: 1
Using SSL, we type in URL as :
Select correct option:

https
httpc
httpc
httpi

Question # 5 of 10 ( Start time: 05:37:49 PM ) Total Marks: 1
Which of the following represents correct sequence of steps for electronic check payment system?
Select correct option:

Payer’s bank ? Payee ? Payee’s bank ? Payer
Payer’s bank ? Payee’s bank ? Payer ? Payee
Payer ? Payee ? Payee’s bank ? Payer’s bank
Payee’s bank ? Payer’s bank ? Payee ? Payer

Question # 6 of 10 ( Start time: 05:39:21 PM ) Total Marks: 1
Suppose you want to buy diamonds. Which of the following payment system you should give LEAST preference for this purpose?
Select correct option:

Virtual PIN payment system
Electronic checks
Electronic Cash
Credit card

Question # 7 of 10 ( Start time: 05:40:53 PM ) Total Marks: 1
It is necessary for both buyer and seller to have their account in the ---------E-bank.
Select correct option:

Same
Separate
Any
partially same

Question # 8 of 10 ( Start time: 05:42:00 PM ) Total Marks: 1
How many elements an e-coin has?
Select correct option:

1
2
3
4

Question # 9 of 10 ( Start time: 05:42:49 PM ) Total Marks: 1
ACH is a centralized system used by different interconnected banks for clearing payment requests.
Select correct option:

True
False

Question # 10 of 10 ( Start time: 05:44:06 PM ) Total Marks: 1
If a key is 4 bit in length, how many unique key values are possible?
Select correct option:

4
8
16
32

Quiz Start Time: 08:24 PM

Time Left 82

sec(s)

Question # 2 of 10 ( Start time: 08:25:38 PM ) Total Marks: 1

Symmetric algorithms are faster than asymmetric.

Select correct option:

True

False













Quiz Start Time: 08:24 PM

Time Left 78

sec(s)

Question # 3 of 10 ( Start time: 08:25:54 PM ) Total Marks: 1

Which entity does not include in SET(secure Electronic Transaction)?

Select correct option:

Seller

Buyer

Payment gateway not sure

Bank













Quiz Start Time: 08:24 PM

Time Left 80

sec(s)

Question # 4 of 10 ( Start time: 08:26:37 PM ) Total Marks: 1

A paper signature is believed to be more reliable than a digital signature.

Select correct option:

True

False











Quiz Start Time: 08:24 PM

Time Left 81

sec(s)

Question # 5 of 10 ( Start time: 08:26:54 PM ) Total Marks: 1

If a key is 4 bit in length, how many unique key values are possible?

Select correct option:

4

8

16

32













Quiz Start Time: 08:24 PM

Time Left 68

sec(s)

Question # 6 of 10 ( Start time: 08:27:14 PM ) Total Marks: 1

Hash function is a __________

Select correct option:

Communication protocol

Hardware device

Encryption mechanism

Log file













Quiz Start Time: 08:24 PM

Time Left 76

sec(s)

Question # 7 of 10 ( Start time: 08:28:42 PM ) Total Marks: 1

Which of these attacks have been reported on symmetric key algorithms?

Select correct option:

Key Search Attacks

Cryptanalysis

System-Based Attacks

All











Quiz Start Time: 08:24 PM

Time Left 45

sec(s)

Question # 8 of 10 ( Start time: 08:29:03 PM ) Total Marks: 1

Payment gateway is an organization which connects those entities to the internet which are offline.

Select correct option:

True

False











Quiz Start Time: 08:24 PM

Time Left 84

sec(s)

Question # 9 of 10 ( Start time: 08:30:07 PM ) Total Marks: 1

How many elements an e-coin has?

Select correct option:

1

2

3

4













Quiz Start Time: 08:24 PM

Time Left 78

sec(s)

Question # 10 of 10 ( Start time: 08:31:38 PM ) Total Marks: 1

EFT stands for _____________.

Select correct option:

Electronic Film Transmission

Electronic Funds Transfer

Electronic File Translation

None of above


Which of these attacks have been reported on symmetric key algorithms?
Your browser may not support display of this image. Select correct option:

Your browser may not support display of this image. Key Search Attacks
Your browser may not support display of this image. Cryptanalysis
Your browser may not support display of this image. System-Based Attacks
Your browser may not support display of this image. All


SET and SSL both are same with respect to security.
Your browser may not support display of this image. Select correct option:

Your browser may not support display of this image. True
Your browser may not support display of this image. False


What is basic advantage of symmetric algorithms?
Your browser may not support display of this image. Select correct option:

Your browser may not support display of this image. Symmetric key does not use any encryption
Your browser may not support display of this image. Symmetric algorithms are faster
Your browser may not support display of this image. Symmetric algorithms are easy to understand
Your browser may not support display of this image. All of the Above


At deposit stage, the serial number is ……………..by E-Cashbank
Your browser may not support display of this image. Select correct option:

Your browser may not support display of this image. Known
Your browser may not support display of this image. Unknown
Your browser may not support display of this image. Kept Secret
Your browser may not support display of this image. Informed

The serial # generated by the cyberwallet gets multiplied by blinding factor ‘r’ which is known only to the ___________.
Your browser may not support display of this image. Select correct option:

Your browser may not support display of this image. Bank
Your browser may not support display of this image. Merchant
Your browser may not support display of this image. Client
Your browser may not support display of this image. None


Currency used in E-Cash Payment system is called _________.
Your browser may not support display of this image. Select correct option:

Your browser may not support display of this image. Coin
Your browser may not support display of this image. Penny
Your browser may not support display of this image. Cent
Your browser may not support display of this image. Dollar


SETSET(secure Electronic Transaction) was developed in
Your browser may not support display of this image. Select correct option:

Your browser may not support display of this image. 1995
Your browser may not support display of this image. 1996
Your browser may not support display of this image. 1997
Your browser may not support display of this image. 1999


Which entity does not include in SET(secure Electronic Transaction)?
Your browser may not support display of this image. Select correct option:

Your browser may not support display of this image. Seller
Your browser may not support display of this image. Buyer
Your browser may not support display of this image. Payment gateway
Your browser may not support display of this image. Bank


Question # 1 of 10 ( Start time: 05:24:12 PM ) Total Marks: 1
The length of a message digest is ________.
Select correct option:



32 to 64 bits

64 to 128 bits

128 to 256 bits (correct)

256 to 512 bit

Virtual PIN Payment System requires both merchant and buyer to register with _______________.
Select correct option:



Auto Clearing House (ACH)

First Virtual (FV) (correct)

DSS (Digital Signature



is necessary for both buyer and seller to have their account in the ---------E-bank.
Select correct option:



Same (correct)

Separate



Key version represents public key by
Select correct option:



Buyer

Seller

E-Bank (correct)

Certification Authority






If a key is 4 bit in length, how many unique key values are possible?
Select correct option:



4

8

16 (correct)




Which of the following represents correct sequence of steps for electronic check payment system?
Select correct option:



Payer’s bank ? Payee ? Payee’s bank ? Payer (correct)





The serial # generated by the cyberwallet gets multiplied by blinding factor ‘r’ which is known only to the ___________.
Select correct option:



Bank

Merchant

Client (correct)

None



What is basic advantage of symmetric algorithms?
Select correct option:



Symmetric key does not use any encryption

Symmetric algorithms are faster
(correct)

Symmetric



Attacker attempts to decrypt the message with every possible key in ______.
Select correct option:



Key Search Attacks

Cryptanalysis

ALL (correct)


ACH is a centralized system used by different interconnected banks for clearing payment requests.
Select correct option:
True
False

Question # 1 of 10 ( Start time: 05:16:32 PM ) Total Marks: 1
What are the security threats in VPS?
Select correct option:
a. Email hacking
b. Credit card number stolen
c. Missing of delivery
d. A and B (correct)

Centralized Account Payment Model uses unique _______ of users as their account identifier.
Select correct option:
Residence address
E-mail address (correct)
Office address
None

Key version represents public key by
Select correct option:
Buyer
Seller
E-Bank
Certification Authority

SET and SSL both are same with respect to security.
Select correct option:
True
False

Quiz Start Time: 02:29 PM
Time Left 81
sec(s)
Question # 1 of 10 ( Start time: 02:30:00 PM ) Total Marks: 1
What are the security threats in VPS?
Select correct option:
a. Email hacking
b. Credit card number stolen
c. Missing of delivery
d. A and B

Question # 3 of 10 ( Start time: 02:30:44 PM ) Total Marks: 1
What is function of Cyberwallet?
Select correct option:
Store coins
Manage Coins
Record transactions
All of above

SET and SSL both are same with respect to security.
Select correct option:
True
False

Question # 1 of 10 ( Start time: 01:30:04 PM ) Total Marks: 1
Virtual PIN Payment System requires both merchant and buyer to register with _____________.
Select correct option:
Auto Clearing House (ACH)
First Virtual (FV)
DSS (Digital Signature Standard)
DES (Data Encryption Standard)

Question # 2 of 10 ( Start time: 01:30:43 PM ) Total Marks: 1
Basic difference between Virtual PIN Payment System and Electronic Check is _____.
Select correct option:
Encryption
Registration with bank
No. of participants
There is no difference between them

Question # 3 of 10 ( Start time: 01:31:19 PM ) Total Marks: 1
SETSET(secure Electronic Transaction) was developed by
Select correct option:
Microsoft
Netscape Navigator
Master Cards and VISA
All of the options


Question # 4 of 10 ( Start time: 01:32:41 PM ) Total Marks: 1
SSL stands for
Select correct option:
Secure Socket Layer
Security Service Layer
Sub Secured Length
None of these

Question # 5 of 10 ( Start time: 01:33:34 PM ) Total Marks: 1
What is basic advantage of symmetric algorithms?
Select correct option:
Symmetric key does not use any encryption
Symmetric algorithms are faster
Symmetric algorithms are easy to understand
All of above

Question # 6 of 10 ( Start time: 01:34:56 PM ) Total Marks: 1
EFT stands for ___________.
Select correct option:
Electronic Film Transmission
Electronic Funds Transfer
Electronic File Translation
None of above

Question # 7 of 10 ( Start time: 01:35:24 PM ) Total Marks: 1
Which of these attacks have been reported on symmetric key algorithms?
Select correct option:
Key Search Attacks
Cryptanalysis
System-Based Attacks
All

Question # 9 of 10 ( Start time: 01:37:20 PM ) Total Marks: 1
Which of these keys can be used for encryption instead of using pair of private and public keys?
Select correct option:
Systematic key
Asymmetric key
Symmetric key
All of above

Quiz Start Time: 01:47 PM
Time Left 89
sec(s)
Question # 1 of 10 ( Start time: 01:47:20 PM ) Total Marks: 1
Using SSL, we type in URL as :
Select correct option:
https
httpc
httpc
httpi

Question # 4 of 10 ( Start time: 01:48:24 PM ) Total Marks: 1
In Virtual Payment system , Four kinds of information is provided to e-bank. Identify which one is NOT included:
Select correct option:
Buyer Accounts identifier
Buyer password
Address of Merchant
Actual amount of money in favor of merchant

Question # 5 of 10 ( Start time: 01:48:52 PM ) Total Marks: 1
A unique large number, generated as a result of applying hash function on a message is called ______.
Select correct option:
Hash message
Message digest
Digitally singed message
Secret message

FVIPSS stands for _______.
Select correct option:
First Virtual Internet Payment System Server
First Virtual International Payment System Server
First Virtual International Payment System Services
First Virtual Internal Payment System Services

Quiz Start Time: 01:47 PM
Time Left 90
sec(s)
Question # 7 of 10 ( Start time: 01:49:37 PM ) Total Marks: 1
Virtual PIN Payment system is considered suitable for ________.
Select correct option:
Low-cost items
High-cost items
Very expensive items
Every kind of items

Which of these is a primary participant in E-Cash Payment system?
Select correct option:
Buyer
Bank
Merchant
All

Most of the electronic payment systems on internet use cryptography.
Select correct option:
True
False

Question # 3 of 10 ( Start time: 11:14:22 PM ) Total Marks: 1
In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded signed coins from last …………………withdrawals to the E-bank.
Select correct option:

10

12

14

16 (page no. 119 heading: lost coins)

Question # 4 of 10 ( Start time: 11:15:23 PM ) Total Marks: 1
The key feature of E-Cash Payment system is
Select correct option:

Anonymity (page no. 116, e-cash payment system)

Security

Cryptography

None of these
Question # 6 of 10 ( Start time: 11:16:48 PM ) Total Marks: 1
At minting stage, the client is ……………..by E-Cashbank
Select correct option:

Known (page. 118, minting stage)

Unknown

Secret

informed

Question # 7 of 10 ( Start time: 11:17:24 PM ) Total Marks: 1
Cipher suite is a combination of
Select correct option:

Cryptographic Algorithm

Authentication methods

Security layers

Cryptographic Algorithm And Authentication methods (page. 121, SSL handshake)

SETSET(secure Electronic Transaction) was developed in Select correct option:

1995

1996

1997 (page no. 122)

1999


Question # 1 of 10 ( Start time: 03:52:11 PM ) Total Marks: 1
Which entity does not include in SET(secure Electronic Transaction)?
Select correct option:

Seller
Buyer
Payment gateway
Bank

Question # 2 of 10 ( Start time: 03:54:29 PM ) Total Marks: 1
Which of the following represents correct sequence of steps for electronic check payment system?
Select correct option:

Payer’s bank ? Payee ? Payee’s bank ? Payer
Payer’s bank ? Payee’s bank ? Payer ? Payee
Payer ? Payee ? Payee’s bank ? Payer’s bank
Payee’s bank ? Payer’s bank ? Payee ? Payer


Question # 3 of 10 ( Start time: 03:55:26 PM ) Total Marks: 1
Currency used in E-Cash Payment system is called _________.
Select correct option:

Coin
Penny
Cent
Dollar


Question # 1 of 10 ( Start time: 04:01:32 PM ) Total Marks: 1
Payment gateway is an organization which connects those entities to the internet which are offline.
Select correct option:

True
False

Question # 2 of 10 ( Start time: 04:02:06 PM ) Total Marks: 1
Basic difference between Virtual PIN Payment System and Electronic Check is _______.
Select correct option:

Encryption
Registration with bank
No. of participants
There is no difference between them



Question # 3 of 10 ( Start time: 04:02:25 PM ) Total Marks: 1
Which of these attacks have been reported on symmetric key algorithms?
Select correct option:

Key Search Attacks
Cryptanalysis
System-Based Attacks
All


Question # 4 of 10 ( Start time: 04:02:57 PM ) Total Marks: 1
Which of the following represents correct sequence of steps for electronic check payment system?
Select correct option:

Payer’s bank ? Payee ? Payee’s bank ? Payer
Payer’s bank ? Payee’s bank ? Payer ? Payee
Payer ? Payee ? Payee’s bank ? Payer’s bank
Payee’s bank ? Payer’s bank ? Payee ? Payer


Question # 5 of 10 ( Start time: 04:03:18 PM ) Total Marks: 1
What is the basic purpose of applying hash function on a message?
Select correct option:

Boosting up transfer speed
Simplification of communication
Encryption of message
All of above

Question # 6 of 10 ( Start time: 04:03:36 PM ) Total Marks: 1
EFT stands for _____________.
Select correct option:

Electronic Film Transmission
Electronic Funds Transfer
Electronic File Translation
None of above

Question # 7 of 10 ( Start time: 04:03:50 PM ) Total Marks: 1
SET and SSL both are same with respect to security.
Select correct option:

True
False

Question # 8 of 10 ( Start time: 04:04:07 PM ) Total Marks: 1
The key feature of E-Cash Payment system is
Select correct option:

Anonymity
Security
Cryptography
None of these


Question # 9 of 10 ( Start time: 04:04:53 PM ) Total Marks: 1
SSL stands for
Select correct option:

Secure Socket Layer
Security Service Layer
Sub Secured Length
None of these


Question # 1 of 10 ( Star time: 05:33:37 PM ) Total Marks: 1
At deposit stage, the serial number is ……………..by E-Cashbank

Known
Unknow
Secure
View


Question # 2 of 10 ( Start time: 05:34:37 PM ) Total Marks: 1
User generates blank electronic check by using his checkbook device.
Select correct option:

True
False




Question # 3 of 10 ( Start time: 05:36:04 PM ) Total Marks: 1
In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded signed coins from last …………………withdrawals to the E-bank.
Select correct option:

10
12
14
16





Question # 4 of 10 ( Start time: 05:36:54 PM ) Total Marks: 1
Using SSL, we type in URL as :
Select correct option:

https
httpc
httpc
httpi







Question # 5 of 10 ( Start time: 05:37:49 PM ) Total Marks: 1
Which of the following represents correct sequence of steps for electronic check payment system?
Select correct option:

Payer’s bank ? Payee ? Payee’s bank ? Payer
Payer’s bank ? Payee’s bank ? Payer ? Payee
Payer ? Payee ? Payee’s bank ? Payer’s bank
Payee’s bank ? Payer’s bank ? Payee ? Payer



Question # 6 of 10 ( Start time: 05:39:21 PM ) Total Marks: 1
Suppose you want to buy diamonds. Which of the following payment system you should give LEAST preference for this purpose?
Select correct option:

Virtual PIN payment system
Electronic checks
Electronic Cash
Credit card





Question # 7 of 10 ( Start time: 05:40:53 PM ) Total Marks: 1
It is necessary for both buyer and seller to have their account in the ---------E-bank.
Select correct option:

Same
Separate
Any
partially same




Question # 8 of 10 ( Start time: 05:42:00 PM ) Total Marks: 1
How many elements an e-coin has?
Select correct option:

1
2
3
4




Question # 9 of 10 ( Start time: 05:42:49 PM ) Total Marks: 1
ACH is a centralized system used by different interconnected banks for clearing payment requests.
Select correct option:

True
False







Question # 10 of 10 ( Start time: 05:44:06 PM ) Total Marks: 1
If a key is 4 bit in length, how many unique key values are possible?
Select correct option:

4
8
16
32


Question # 1 of 10 ( Start time: 05:51:18 PM ) Total Marks: 1
Which of these keys can be used for encryption instead of using pair of private and public keys?
Select correct option:

Systematic key

Asymmetric key

Symmetric key

All of above
Question # 2 of 10 ( Start time: 05:52:50 PM ) Total Marks: 1
Which of these is a primary participant in E-Cash Payment system?
Select correct option:

Buyer

Bank

Merchant

All
Question # 3 of 10 ( Start time: 05:54:04 PM ) Total Marks: 1
What is added in message digest to create digital signatures?
Select correct option:

Sender's private key

Sender's public key

Sender's symmetric key

None of above
Question # 4 of 10 ( Start time: 05:55:36 PM ) Total Marks: 1
Virtual PIN Payment System requires both merchant and buyer to register with _______________.
Select correct option:

Auto Clearing House (ACH)

First Virtual (FV)

DSS (Digital Signature Standard)

DES (Data Encryption Standard)
Question # 5 of 10 ( Start time: 05:56:33 PM ) Total Marks: 1
It is necessary for both buyer and seller to have their account in the ---------E-bank.
Select correct option:

Same

Separate

Any

partially same
Question # 6 of 10 ( Start time: 05:57:57 PM ) Total Marks: 1
Virtual PIN Payment system is considered suitable for __________.
Select correct option:

Low-cost items

High-cost items

Very expensive items

Every kind of items
Question # 7 of 10 ( Start time: 05:59:10 PM ) Total Marks: 1
How many elements an e-coin has?
Select correct option:

1

2

3

4
Question # 8 of 10 ( Start time: 05:59:49 PM ) Total Marks: 1
Using SSL, we type in URL as :
Select correct option:

https

httpc

httpc

httpi
Question # 9 of 10 ( Start time: 06:01:08 PM ) Total Marks: 1
What are the security threats in VPS?
Select correct option:

a. Email hacking

b. Credit card number stolen

c. Missing of delivery

d. A and B
Question # 10 of 10 ( Start time: 06:04:53 PM ) Total Marks: 1
Attacker attempts to decrypt the message with every possible key in ______.
Select correct option:

Key Search Attacks

Cryptanalysis

System-Based Attacks

None


Question # 1 of 10 ( Start time: 05:24:12 PM ) Total Marks: 1
The length of a message digest is ________.
Select correct option:



32 to 64 bits

64 to 128 bits

128 to 256 bits

256 to 512 bit

Virtual PIN Payment System requires both merchant and buyer to register with _______________.
Select correct option:



Auto Clearing House (ACH)

First Virtual (FV)

DSS (Digital Signature



is necessary for both buyer and seller to have their account in the ---------E-bank.



Same

Separate



Key version represents public key by
Select correct option:



Buyer

Seller

E-Bank

Certification Authority






If a key is 4 bit in length, how many unique key values are possible?
Select correct option:



4

8

16




Which of the following represents correct sequence of steps for electronic check payment system?
Select correct option:



Payer’s bank ? Payee ? Payee’s bank ? Payer





The serial # generated by the cyberwallet gets multiplied by blinding factor ‘r’ which is known only to the ___________.
Select correct option:



Bank

Merchant

Client

None



What is basic advantage of symmetric algorithms?
Select correct option:



Symmetric key does not use any encryption

Symmetric algorithms are faster

Symmetric



Attacker attempts to decrypt the message with every possible key in ______.
Select correct option:



Key Search Attacks

Cryptanalysis


by VUsolutions
Next PostNewer Post Previous PostOlder Post Home

0 comments

Post a Comment