1 ……………….acts like a gate keeper that examines each users identification before allowing them to enter to the organization’s internal networks.
(a) Network firewall
(b) Antivirus
(c) both of these
(d) none of these
(b) Antivirus
(c) both of these
(d) none of these
2 …………..Prevents unauthorized communication into and out of the network, allowing the organization to enforce a security policy on traffic between its network and the internet.
(a) Network firewall
(b) Antivirus
(c) both of these
(d) none of these
(b) Antivirus
(c) both of these
(d) none of these
3. SET means ………………
(a) Standard Electronic Technology
(b) Standard Electronic Transfer
(b) Standard Electronic Transfer
(c) Secure Electronic Transaction
(d) None of these
(d) None of these
4. The verification of credit card is done by using…………….. with a communications link to the merchants acquiring bank
(a) Credit card payment terminal
(b) Point of Sale
(b) Point of Sale
(c) All of these
(d) none of these
(d) none of these
5. Creating illegitimate sites that appear to be published by established organizations by unscrupulous artists is termed as…………………
(a) Spoofing
(b) Snooping
(c) Sniffing
(d) None of these
(b) Snooping
(c) Sniffing
(d) None of these
6. Gain entry into the user’s system and scan your file system for personal information is known as……………….
(a) Spoofing
(b) Snooping
(c) Sniffing
(d) None of these
(b) Snooping
(c) Sniffing
(d) None of these
7 ………………attacks are difficult and are only successful if the attacker knows something about the shopper
(a) Spoofing
(b) Snooping
(c) Sniffing
(d) Guessing passwords
(b) Snooping
(c) Sniffing
(d) Guessing passwords
8 …………………is the process of making information unintelligible to the unauthorized user.
(a) Spoofing
(b) Snooping
(c) Sniffing
(d) Cryptography
(b) Snooping
(c) Sniffing
(d) Cryptography
9 ………………….is the reverse process of encryption, to make the information readable once again
(a) Spoofing
(b) Decryption
(c) Sniffing
(d) Cryptography
(b) Decryption
(c) Sniffing
(d) Cryptography
10. A………………….provides a way to associate the message with the sender and is the equivalent of an ordinary signature.
(a) cyber signature
(b) Digital signature
(c) SSL
(d) none of these
(b) Digital signature
(c) SSL
(d) none of these
4 Comments
…attacks are difficult and are only successful if the attacker knows something about the shopper
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeletePost a Comment