IT430 - up to date ONLINE Quizzes
Thursday, February 18, 2010 Posted In CS and IT Edit ThisCharacterization and Clustering belong to which of the following types of Data Mining?
Select correct option:
Predictive
Selective
Descriptive
Additive
Question # 2 of 10 ( Start time: 01:39:09 PM ) Total Marks: 1
When customer life cycle is used to create different groups of customers, it is called?
Select correct option:
Targeting Customers
Dynamic groups
Customer Life Cycle Segmentation
Group Development
Question # 3 of 10 ( Start time: 01:40:10 PM ) Total Marks: 1
Which statement is most appropriate description of the term “Interactive-advertisement”?
Select correct option:
By making an advertisement message using flash animation.
Putting an audio or video message on the website to attract customer.
By avoiding customer’s involvement in the advertisement process.
By involving the customer in the advertisement process itself(not confirm)
Question # 4 of 10 ( Start time: 01:41:32 PM ) Total Marks: 1
While designing a website, which of the following factors an internet marketer should pay attention to?
Select correct option:
Easy site navigation (i.e. Site map)
Frequently asked questions (FAQs) section
Privacy policy
All of above
Question # 5 of 10 ( Start time: 01:42:25 PM ) Total Marks: 1
Which of these is an algorithm used in clustering?
Select correct option:
K-means
L-means
C-means
F-means
Question # 6 of 10 ( Start time: 01:43:23 PM ) Total Marks: 1
Many search engines rank the site by using a program called
Select correct option:
Spider
Scorpion
Moon
Cobweb
Question # 7 of 10 ( Start time: 01:44:39 PM ) Total Marks: 1
In which type of approach, we further dig the data for retrieving information from data warehouse?
Select correct option:
Slice
Dice
Drill down
Roll up
Question # 8 of 10 ( Start time: 01:45:23 PM ) Total Marks: 1
Let us, suppose that you have hosted early your e-commerce website to sell sweets online: Your customers are acquaint with the name of your company and “DesiGhee Burfi ”. They have never interacted with your company. Which of following loyalty stages they are?
Select correct option:
Awareness
Exploration(in doubt)
Familiarity
Commitment
Question # 9 of 10 ( Start time: 01:47:04 PM ) Total Marks: 1
Log files consist on information about each visitor's _________.
Select correct option:
Location
IP address
Time of visit
All of above
Question # 10 of 10 ( Start time: 01:47:27 PM ) Total Marks: 1
CPM is an advertising payment mode. CPM stands for ________.
Select correct option:
Cost Per Month
Cost Per Minute
Cost Per Megabyte
Cost Per Message
Select correct option:
Classification
Association
Characterization
Clustering
Classification = Answer
Objective of any marketing strategy is to bring the customers quickly to the ___________.
Select correct option:
Familiarity stage
Exploration stage
Separation stage
Commitment stage
Commitment stage = answer
Which of these can be used for advertisement purpose?
Select correct option:
Telephone
Newspapers
Magazines
All of above
All of above = Answer
In Frequent-Flyer Miles marketing, customer of the business earns specific miles free of charge from _______.
Select correct option:
Bus service
Train service
Airline
None of above
Which of following marketing campaigns are cheap an effective way to target potential customers?
Select correct option:
Sale forces
Media promotion
Marketing software
E-mail = answer
Let us, suppose that you have hosted your e-commerce website, Promotion messages can be sent when potential client is
Select correct option:
online
offline
both online and offline
visiting head office
Which of the following is NOT an advertising payment mode?
Select correct option:
Pay-per-sale
Pay-per-click
Pay-per-keypress
Pay-per-lead
Pay-per-keypress = Answer
Which of these can be used for advertisement purpose?
Select correct option:
Telephone
Newspapers
Magazines
All of above
Question # 3 of 10 ( Start time: 06:15:42 PM ) Total Marks: 1
Traditionally Marketer use the market segmentation(s) like
Select correct option:
Geo-graphic Segmentation
Demographic Segmentation
Psychographic Segmentation
All of the above
Question # 4 of 10 ( Start time: 06:17:00 PM ) Total Marks: 1
Which statement is most appropriate description of the term “Interactive-advertisement”?
Select correct option:
By making an advertisement message using flash animation.
Putting an audio or video message on the website to attract customer.
By avoiding customer’s involvement in the advertisement process.
By involving the customer in the advertisement process itself.
Question # 5 of 10 ( Start time: 06:18:33 PM ) Total Marks: 1
Let us, suppose that you have hosted your e-commerce website, When you provide “opt-in e-mail” option to your customers on your website and customer opt for it , what does it mean to receive ?
Select correct option:
Information about product through advertisement
Information about product through e-mail
Information about services available on it
Information about News through e-mail.
Question # 6 of 10 ( Start time: 06:19:48 PM ) Total Marks: 1
Where there are quite a few erroneous or missing values in a row then that row can be deleted or discarded. This process is called...............
Select correct option:
Data Deletion
Data Selection
Data Integration
Data Transformation
Question # 7 of 10 ( Start time: 06:21:11 PM ) Total Marks: 1
Creation of separate experiences for customers based on their behavior is called
Select correct option:
Demographic segmentation
Behavioral segmentation
Geo-Graphic Segmentation
None of the above
Question # 8 of 10 ( Start time: 06:22:42 PM ) Total Marks: 1
Customer Loyalty model is also called
Select correct option:
Customer Life Cycle
Customer Segmentation
Customer Awareness
All
Question # 9 of 10 ( Start time: 06:24:15 PM ) Total Marks: 1
Advertising Subscription Mixed Revenue Model includes
Select correct option:
Online journals
Sports information services
Business week online
All of the above
Question # 10 of 10 ( Start time: 06:25:24 PM ) Total Marks: 1
Which of these is an algorithm used in clustering?
Select correct option:
K-means
L-means
C-means
F-means
Select correct option:
Travel Agents and Insurance brokers
Automobile Sales and event tickets
Stock brokers and online banking
All of the above
Which one of the followings is an example of Banner advertising?
Select correct option:
Branding
Affiliate programs
Partnership
All of these
Question # 3 of 10 ( Start time: 12:37:26 PM ) Total Marks: 1
Log files consist on information about each visitor's _________.
Select correct option:
Location
IP address
Time of visit
All of above
Question # 4 of 10 ( Start time: 12:39:08 PM ) Total Marks: 1
In which type of approach, we further dig the data for retrieving information from data warehouse?
Select correct option:
Slice
Dice
Drill down
Roll up
Question # 5 of 10 ( Start time: 12:40:48 PM ) Total Marks: 1
Dividing potential customers on the basis of variables such as social class, personality, or lifestyle is called____________.
Select correct option:
Demographic Segmentation
Geographic Segmentation
Psychographic segmentation
Behavioral segmentation
Question # 7 of 10 ( Start time: 12:44:30 PM ) Total Marks: 1
If a company's marketing stretegy is focusing on customers having age less than 30, which of the following marketing segmentation technique is being used by company?
Select correct option:
Demographic Segmentation
Geographic Segmentation
Psychographic segmentation
Behavioral segmentation
Question # 8 of 10 ( Start time: 12:45:07 PM ) Total Marks: 1
Which of following marketing campaigns are cheap an effective way to target potential customers?
Select correct option:
Sale forces
Media promotion
Marketing software
Question # 9 of 10 ( Start time: 12:45:58 PM ) Total Marks: 1
OLAP stands for……………
Select correct option:
Online Analytical Program
Online Analytical Processing
Online Application Program
Online Analysis Performance
Question # 10 of 10 ( Start time: 12:46:36 PM ) Total Marks: 1
Press release can provide information about current events and news to, which of following, via a internet?
Select correct option:
Print media
T.v commercial
Press or media
T.v program.
1: All of the above (not sure) pg # 130
2: Affiliate programs pg # 138
3: All of above pg # 136
4: Drill down pg # 146
5: Psychographic segmentation pg # 131
7: Demographic Segmentation pg # 131
8: E-mail pg # 133
9: Online Analytical Processing pg # 145
10: Press or media pg # 135
Chech out hadsout pages AND SORRY quiz # 6 is missing
Total Marks: 1
The length of a message digest is ________.
Select correct option:
32 to 64 bits
64 to 128 bits
128 to 256 bits
256 to 512 bit
Virtual PIN Payment System requires both merchant and buyer to register with _______________.
Select correct option:
Auto Clearing House (ACH)
First Virtual (FV)
DSS (Digital Signature
is necessary for both buyer and seller to have their account in the ---------E-bank.
Select correct option:
Same
Separate
Key version represents public key by
Select correct option:
Buyer
Seller
E-Bank (page 116)
Certification Authority
If a key is 4 bit in length, how many unique key values are possible?
Select correct option:
4
8
16
32
Which of the following represents correct sequence of steps for electronic check payment system?
Select correct option:
Payer’s bank ? Payee ? Payee’s bank ? Payer
The serial # generated by the cyberwallet gets multiplied by blinding factor ‘r’ which is known only to the ___________.
Select correct option:
Bank
Merchant
Client
None
What is basic advantage of symmetric algorithms?
Select correct option:
Symmetric key does not use any encryption
Symmetric algorithms are faster
Symmetric
Attacker attempts to decrypt the message with every possible key in ______.
Select correct option:
Key Search Attacks
Cryptanalysis
Time Left 75sec(s)
Question # 1 of 10 ( Start time: 11:56:22 PM ) Total Marks: 1
DES, IDEA, RC2, RC4 and Rinjdael are examples of _________.
Select correct option:
Symmetric key algorithms
Asymmetric key algorithms
Public key algorithms
Private key algorithms
Question # 2 of 10 ( Start time: 11:56:55 PM ) Total Marks: 1
Using SSL, we type in URL as :
https
httpc
httpc
httpi
Question # 3 of 10 ( Start time: 11:57:40 PM ) Total Marks: 1
If a key is 4 bit in length, how many unique key values are possible?
4
8
16
32
Question # 4 of 10 ( Start time: 11:58:46 PM ) Total Marks: 1
SSL stands for
Secure Socket Layer
Security Service Layer
Sub Secured Length
None of these
Question # 5 of 10 ( Start time: 11:59:06 PM ) Total Marks: 1
SETSET(secure Electronic Transaction) was developed by
Microsoft
Netscape Navigator
Master Cards and VISA
All of the options
Question # 6 of 10 ( Start time: 12:00:02 AM ) Total Marks: 1
Currency used in E-Cash Payment system is called _________.
Coin
Penny
Cent
Dollar
Question # 7 of 10 ( Start time: 12:00:39 AM ) Total Marks: 1
The serial # generated by the cyberwallet gets multiplied by blinding factor ‘r’ which is known only to the ___________.
Bank
Merchant
Client
None
Question # 8 of 10 ( Start time: 12:01:25 AM ) Total Marks: 1
User generates blank electronic check by using his checkbook device.
True
False
Question # 9 of 10 ( Start time: 12:01:44 AM ) Total Marks: 1
EFT stands for _____________.
Electronic Film Transmission
Electronic Funds Transfer
Electronic File Translation
None of above
Question # 10 of 10 ( Start time: 12:02:52 AM ) Total Marks: 1
What is basic advantage of symmetric algorithms?
Symmetric key does not use any encryption
Symmetric algorithms are faster
Symmetric algorithms are easy to understand
All of above
Total Marks: 1
The length of a message digest is ________.
Select correct option:
32 to 64 bits
64 to 128 bits
128 to 256 bits
256 to 512 bit
Virtual PIN Payment System requires both merchant and buyer to register with _______________.
Select correct option:
Auto Clearing House (ACH)
First Virtual (FV)
DSS (Digital Signature
is necessary for both buyer and seller to have their account in the ---------E-bank.
Select correct option:
Same
Separate
Key version represents public key by
Select correct option:
Buyer
Seller
E-Bank
Certification Authority
If a key is 4 bit in length, how many unique key values are possible?
Select correct option:
4
8
16
Which of the following represents correct sequence of steps for electronic check payment system?
Select correct option:
Payer’s bank ? Payee ? Payee’s bank ? Payer
The serial # generated by the cyberwallet gets multiplied by blinding factor ‘r’ which is known only to the ___________.
Select correct option:
Bank
Merchant
Client
None
What is basic advantage of symmetric algorithms?
Select correct option:
Symmetric key does not use any encryption
Symmetric algorithms are faster
Symmetric
Attacker attempts to decrypt the message with every possible key in ______.
Select correct option:
Key Search Attacks
Cryptanalysis
ALL
Select correct option:
First Virtual Internet Payment System Server
First Virtual International Payment System Server
First Virtual International Payment System Services
First Virtual Internal Payment System Services
Which entity does not include in SET(secure Electronic Transaction)?
Select correct option:
Seller
Buyer
Payment gateway
Bank
Which of these payment systems does not involve the use of encryption?
Select correct option:
Electronic check
Electronic cash
Virtual PIN
None
A unique large number, generated as a result of applying hash function on a message is called ________.
Select correct option:
Hash message
Message digest
Digitally singed message
Secret message
Which of these attacks have been reported on symmetric key algorithms?
Select correct option:
Key Search Attacks
Cryptanalysis
System-Based Attacks
All
Attacker attempts to decrypt the message with every possible key in ______.
Select correct option:
Key Search Attacks
Cryptanalysis
System-Based Attacks
None
What is basic advantage of symmetric algorithms?
Select correct option:
Symmetric key does not use any encryption
Symmetric algorithms are faster not sure
Symmetric algorithms are easy to understand
All of above
How many elements an e-coin has?
Select correct option:
1
2
3
4
Suppose you want to buy diamonds. Which of the following payment system you should give LEAST preference for this purpose?
Select correct option:
Virtual PIN payment system
Electronic checks
Electronic Cash
Credit card
By whom a payer secret code is generated, for proving the payment?
Select correct option:
Client
E-bank not sure
Seller
Merchant and client
A paper signature is believed to be more reliable than a digital signature.
Select correct option:
True
False
At deposit stage, the serial number is ……………..by E-Cashbank
Select correct option:
Known
Unknown
Kept Secret not sure
Informed
The serial # generated by the cyberwallet gets multiplied by blinding factor ‘r’ which is known only to the ___________.
Select correct option:
Bank
Merchant
Client not zsure
None
Virtual PIN Payment System requires both merchant and buyer to register with _______________.
Select correct option:
Auto Clearing House (ACH)
First Virtual (FV)
DSS (Digital Signature Standard)
DES (Data Encryption Standard)
Using SSL, we type in URL as :
Select correct option:
https
httpc
httpc
httpi
User generates blank electronic check by using his checkbook device.
Select correct option:
True
False not sure
Most of the electronic payment systems on internet use cryptography.
Select correct option:
True
False
What is added in message digest to create digital signatures?
Select correct option:
Sender's private key
Sender's public key
Sender's symmetric key
None of above
Key version represents public key by
Select correct option:
Buyer
Seller
E-Bank
Certification Authority not sure
Virtual PIN payment system needs a special software at front end.
Select correct option:
True
False
Which of these payment systems does not involve the use of encryption?
Select correct option:
Electronic check
Electronic cash
Virtual PIN
None
DES, IDEA, RC2, RC4 and Rinjdael are examples of _________.
Select correct option:
Symmetric key algorithms
Asymmetric key algorithms
Public key algorithms
Private key algorithms
Most of the electronic payment systems on internet use cryptography.
Select correct option:
True
False
Symmetric algorithms are faster than asymmetric.
Select correct option:
True
False
EFT stands for _____________.
Select correct option:
Electronic Film Transmission
Electronic Funds Transfer
Electronic File Translation
None of above
In Virtual Payment system , Four kinds of information is provided to e-bank. Identify which one is NOT included:
Select correct option:
Buyer Accounts identifier
Buyer password not sure
Address of Merchant
Actual amount of money in favor of merchant
Currency used in E-Cash Payment system is called _________.
Select correct option:
Coin
Penny
Cent
Dollar
At which of the following stage ,Validity of coins is done?
Select correct option:
Minting stage
Deposit stage
Withdrawal
Deposit stage and Withdrawal not sure
Virtual PIN Payment system is considered suitable for __________.
Select correct option:
Low-cost items
High-cost items
Very expensive items
Every kind of items
The length of a message digest is ________.
Select correct option:
32 to 64 bits
64 to 128 bits
128 to 256 bits
256 to 512 bits
In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded signed coins from last …………………withdrawals to the E-bank.
Select correct option:
10
12
14
16
A unique large number, generated as a result of applying hash function on a message is called ________.
Select correct option:
Hash message
Message digest
Digitally singed message
Secret message
The serial # generated by the cyberwallet gets multiplied by blinding factor ‘r’ which is known only to the ___________.
Select correct option:
Bank
Merchant
Client
None
Centralized Account Payment Model uses unique _________ of users as their account identifier.
Select correct option:
Residence address
E-mail address
Office address
None
Virtual PIN Payment System requires both merchant and buyer to register with _______________.
Select correct option:
Auto Clearing House (ACH)
First Virtual (FV)
DSS (Digital Signature Standard)
DES (Data Encryption Standard)
SETSET(secure Electronic Transaction) was developed in
Select correct option:
1995
1996
1997
1999
Virtual PIN payment system needs a special software at front end.
Select correct option:
True
False
ACH is a centralized system used by different interconnected banks for clearing payment requests.
Select correct option:
True
False
IT430 Quiz # 2
Question # 1 of 10 ( Star time: 05:33:37 PM ) Total Marks: 1
At deposit stage, the serial number is ……………..by E-Cashbank
Known
Unknow
Secure
View
Question # 2 of 10 ( Start time: 05:34:37 PM ) Total Marks: 1
User generates blank electronic check by using his checkbook device.
Select correct option:
True
False
Question # 3 of 10 ( Start time: 05:36:04 PM ) Total Marks: 1
In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded signed coins from last …………………withdrawals to the E-bank.
Select correct option:
10
12
14
16
Question # 4 of 10 ( Start time: 05:36:54 PM ) Total Marks: 1
Using SSL, we type in URL as :
Select correct option:
https
httpc
httpc
httpi
Question # 5 of 10 ( Start time: 05:37:49 PM ) Total Marks: 1
Which of the following represents correct sequence of steps for electronic check payment system?
Select correct option:
Payer’s bank ? Payee ? Payee’s bank ? Payer
Payer’s bank ? Payee’s bank ? Payer ? Payee
Payer ? Payee ? Payee’s bank ? Payer’s bank
Payee’s bank ? Payer’s bank ? Payee ? Payer
Question # 6 of 10 ( Start time: 05:39:21 PM ) Total Marks: 1
Suppose you want to buy diamonds. Which of the following payment system you should give LEAST preference for this purpose?
Select correct option:
Virtual PIN payment system
Electronic checks
Electronic Cash
Credit card
Question # 7 of 10 ( Start time: 05:40:53 PM ) Total Marks: 1
It is necessary for both buyer and seller to have their account in the ---------E-bank.
Select correct option:
Same
Separate
Any
partially same
Question # 8 of 10 ( Start time: 05:42:00 PM ) Total Marks: 1
How many elements an e-coin has?
Select correct option:
1
2
3
4
Question # 9 of 10 ( Start time: 05:42:49 PM ) Total Marks: 1
ACH is a centralized system used by different interconnected banks for clearing payment requests.
Select correct option:
True
False
Question # 10 of 10 ( Start time: 05:44:06 PM ) Total Marks: 1
If a key is 4 bit in length, how many unique key values are possible?
Select correct option:
4
8
16
32
Time Left 82
sec(s)
Question # 2 of 10 ( Start time: 08:25:38 PM ) Total Marks: 1
Symmetric algorithms are faster than asymmetric.
Select correct option:
True
False
Quiz Start Time: 08:24 PM
Time Left 78
sec(s)
Question # 3 of 10 ( Start time: 08:25:54 PM ) Total Marks: 1
Which entity does not include in SET(secure Electronic Transaction)?
Select correct option:
Seller
Buyer
Payment gateway not sure
Bank
Quiz Start Time: 08:24 PM
Time Left 80
sec(s)
Question # 4 of 10 ( Start time: 08:26:37 PM ) Total Marks: 1
A paper signature is believed to be more reliable than a digital signature.
Select correct option:
True
False
Quiz Start Time: 08:24 PM
Time Left 81
sec(s)
Question # 5 of 10 ( Start time: 08:26:54 PM ) Total Marks: 1
If a key is 4 bit in length, how many unique key values are possible?
Select correct option:
4
8
16
32
Quiz Start Time: 08:24 PM
Time Left 68
sec(s)
Question # 6 of 10 ( Start time: 08:27:14 PM ) Total Marks: 1
Hash function is a __________
Select correct option:
Communication protocol
Hardware device
Encryption mechanism
Log file
Quiz Start Time: 08:24 PM
Time Left 76
sec(s)
Question # 7 of 10 ( Start time: 08:28:42 PM ) Total Marks: 1
Which of these attacks have been reported on symmetric key algorithms?
Select correct option:
Key Search Attacks
Cryptanalysis
System-Based Attacks
All
Quiz Start Time: 08:24 PM
Time Left 45
sec(s)
Question # 8 of 10 ( Start time: 08:29:03 PM ) Total Marks: 1
Payment gateway is an organization which connects those entities to the internet which are offline.
Select correct option:
True
False
Quiz Start Time: 08:24 PM
Time Left 84
sec(s)
Question # 9 of 10 ( Start time: 08:30:07 PM ) Total Marks: 1
How many elements an e-coin has?
Select correct option:
1
2
3
4
Quiz Start Time: 08:24 PM
Time Left 78
sec(s)
Question # 10 of 10 ( Start time: 08:31:38 PM ) Total Marks: 1
EFT stands for _____________.
Select correct option:
Electronic Film Transmission
Electronic Funds Transfer
Electronic File Translation
None of above
Your browser may not support display of this image. Select correct option:
Your browser may not support display of this image. Key Search Attacks
Your browser may not support display of this image. Cryptanalysis
Your browser may not support display of this image. System-Based Attacks
Your browser may not support display of this image. All
SET and SSL both are same with respect to security.
Your browser may not support display of this image. Select correct option:
Your browser may not support display of this image. True
Your browser may not support display of this image. False
What is basic advantage of symmetric algorithms?
Your browser may not support display of this image. Select correct option:
Your browser may not support display of this image. Symmetric key does not use any encryption
Your browser may not support display of this image. Symmetric algorithms are faster
Your browser may not support display of this image. Symmetric algorithms are easy to understand
Your browser may not support display of this image. All of the Above
At deposit stage, the serial number is ……………..by E-Cashbank
Your browser may not support display of this image. Select correct option:
Your browser may not support display of this image. Known
Your browser may not support display of this image. Unknown
Your browser may not support display of this image. Kept Secret
Your browser may not support display of this image. Informed
The serial # generated by the cyberwallet gets multiplied by blinding factor ‘r’ which is known only to the ___________.
Your browser may not support display of this image. Select correct option:
Your browser may not support display of this image. Bank
Your browser may not support display of this image. Merchant
Your browser may not support display of this image. Client
Your browser may not support display of this image. None
Currency used in E-Cash Payment system is called _________.
Your browser may not support display of this image. Select correct option:
Your browser may not support display of this image. Coin
Your browser may not support display of this image. Penny
Your browser may not support display of this image. Cent
Your browser may not support display of this image. Dollar
SETSET(secure Electronic Transaction) was developed in
Your browser may not support display of this image. Select correct option:
Your browser may not support display of this image. 1995
Your browser may not support display of this image. 1996
Your browser may not support display of this image. 1997
Your browser may not support display of this image. 1999
Which entity does not include in SET(secure Electronic Transaction)?
Your browser may not support display of this image. Select correct option:
Your browser may not support display of this image. Seller
Your browser may not support display of this image. Buyer
Your browser may not support display of this image. Payment gateway
Your browser may not support display of this image. Bank
The length of a message digest is ________.
Select correct option:
32 to 64 bits
64 to 128 bits
128 to 256 bits (correct)
256 to 512 bit
Virtual PIN Payment System requires both merchant and buyer to register with _______________.
Select correct option:
Auto Clearing House (ACH)
First Virtual (FV) (correct)
DSS (Digital Signature
is necessary for both buyer and seller to have their account in the ---------E-bank.
Select correct option:
Same (correct)
Separate
Key version represents public key by
Select correct option:
Buyer
Seller
E-Bank (correct)
Certification Authority
If a key is 4 bit in length, how many unique key values are possible?
Select correct option:
4
8
16 (correct)
Which of the following represents correct sequence of steps for electronic check payment system?
Select correct option:
Payer’s bank ? Payee ? Payee’s bank ? Payer (correct)
The serial # generated by the cyberwallet gets multiplied by blinding factor ‘r’ which is known only to the ___________.
Select correct option:
Bank
Merchant
Client (correct)
None
What is basic advantage of symmetric algorithms?
Select correct option:
Symmetric key does not use any encryption
Symmetric algorithms are faster (correct)
Symmetric
Attacker attempts to decrypt the message with every possible key in ______.
Select correct option:
Key Search Attacks
Cryptanalysis
ALL (correct)
ACH is a centralized system used by different interconnected banks for clearing payment requests.
Select correct option:
True
False
Question # 1 of 10 ( Start time: 05:16:32 PM ) Total Marks: 1
What are the security threats in VPS?
Select correct option:
a. Email hacking
b. Credit card number stolen
c. Missing of delivery
d. A and B (correct)
Centralized Account Payment Model uses unique _______ of users as their account identifier.
Select correct option:
Residence address
E-mail address (correct)
Office address
None
Key version represents public key by
Select correct option:
Buyer
Seller
E-Bank
Certification Authority
SET and SSL both are same with respect to security.
Select correct option:
True
False
Quiz Start Time: 02:29 PM
Time Left 81
sec(s)
Question # 1 of 10 ( Start time: 02:30:00 PM ) Total Marks: 1
What are the security threats in VPS?
Select correct option:
a. Email hacking
b. Credit card number stolen
c. Missing of delivery
d. A and B
Question # 3 of 10 ( Start time: 02:30:44 PM ) Total Marks: 1
What is function of Cyberwallet?
Select correct option:
Store coins
Manage Coins
Record transactions
All of above
SET and SSL both are same with respect to security.
Select correct option:
True
False
Question # 1 of 10 ( Start time: 01:30:04 PM ) Total Marks: 1
Virtual PIN Payment System requires both merchant and buyer to register with _____________.
Select correct option:
Auto Clearing House (ACH)
First Virtual (FV)
DSS (Digital Signature Standard)
DES (Data Encryption Standard)
Question # 2 of 10 ( Start time: 01:30:43 PM ) Total Marks: 1
Basic difference between Virtual PIN Payment System and Electronic Check is _____.
Select correct option:
Encryption
Registration with bank
No. of participants
There is no difference between them
Question # 3 of 10 ( Start time: 01:31:19 PM ) Total Marks: 1
SETSET(secure Electronic Transaction) was developed by
Select correct option:
Microsoft
Netscape Navigator
Master Cards and VISA
All of the options
Question # 4 of 10 ( Start time: 01:32:41 PM ) Total Marks: 1
SSL stands for
Select correct option:
Secure Socket Layer
Security Service Layer
Sub Secured Length
None of these
Question # 5 of 10 ( Start time: 01:33:34 PM ) Total Marks: 1
What is basic advantage of symmetric algorithms?
Select correct option:
Symmetric key does not use any encryption
Symmetric algorithms are faster
Symmetric algorithms are easy to understand
All of above
Question # 6 of 10 ( Start time: 01:34:56 PM ) Total Marks: 1
EFT stands for ___________.
Select correct option:
Electronic Film Transmission
Electronic Funds Transfer
Electronic File Translation
None of above
Question # 7 of 10 ( Start time: 01:35:24 PM ) Total Marks: 1
Which of these attacks have been reported on symmetric key algorithms?
Select correct option:
Key Search Attacks
Cryptanalysis
System-Based Attacks
All
Question # 9 of 10 ( Start time: 01:37:20 PM ) Total Marks: 1
Which of these keys can be used for encryption instead of using pair of private and public keys?
Select correct option:
Systematic key
Asymmetric key
Symmetric key
All of above
Quiz Start Time: 01:47 PM
Time Left 89
sec(s)
Question # 1 of 10 ( Start time: 01:47:20 PM ) Total Marks: 1
Using SSL, we type in URL as :
Select correct option:
https
httpc
httpc
httpi
Question # 4 of 10 ( Start time: 01:48:24 PM ) Total Marks: 1
In Virtual Payment system , Four kinds of information is provided to e-bank. Identify which one is NOT included:
Select correct option:
Buyer Accounts identifier
Buyer password
Address of Merchant
Actual amount of money in favor of merchant
Question # 5 of 10 ( Start time: 01:48:52 PM ) Total Marks: 1
A unique large number, generated as a result of applying hash function on a message is called ______.
Select correct option:
Hash message
Message digest
Digitally singed message
Secret message
FVIPSS stands for _______.
Select correct option:
First Virtual Internet Payment System Server
First Virtual International Payment System Server
First Virtual International Payment System Services
First Virtual Internal Payment System Services
Quiz Start Time: 01:47 PM
Time Left 90
sec(s)
Question # 7 of 10 ( Start time: 01:49:37 PM ) Total Marks: 1
Virtual PIN Payment system is considered suitable for ________.
Select correct option:
Low-cost items
High-cost items
Very expensive items
Every kind of items
Which of these is a primary participant in E-Cash Payment system?
Select correct option:
Buyer
Bank
Merchant
All
Most of the electronic payment systems on internet use cryptography.
Select correct option:
True
False
Question # 3 of 10 ( Start time: 11:14:22 PM ) Total Marks: 1
In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded signed coins from last …………………withdrawals to the E-bank.
Select correct option:
10
12
14
16 (page no. 119 heading: lost coins)
Question # 4 of 10 ( Start time: 11:15:23 PM ) Total Marks: 1
The key feature of E-Cash Payment system is
Select correct option:
Anonymity (page no. 116, e-cash payment system)
Security
Cryptography
None of these
Question # 6 of 10 ( Start time: 11:16:48 PM ) Total Marks: 1
At minting stage, the client is ……………..by E-Cashbank
Select correct option:
Known (page. 118, minting stage)
Unknown
Secret
informed
Question # 7 of 10 ( Start time: 11:17:24 PM ) Total Marks: 1
Cipher suite is a combination of
Select correct option:
Cryptographic Algorithm
Authentication methods
Security layers
Cryptographic Algorithm And Authentication methods (page. 121, SSL handshake)
SETSET(secure Electronic Transaction) was developed in Select correct option:
1995
1996
1997 (page no. 122)
1999
Which entity does not include in SET(secure Electronic Transaction)?
Select correct option:
Seller
Buyer
Payment gateway
Bank
Question # 2 of 10 ( Start time: 03:54:29 PM ) Total Marks: 1
Which of the following represents correct sequence of steps for electronic check payment system?
Select correct option:
Payer’s bank ? Payee ? Payee’s bank ? Payer
Payer’s bank ? Payee’s bank ? Payer ? Payee
Payer ? Payee ? Payee’s bank ? Payer’s bank
Payee’s bank ? Payer’s bank ? Payee ? Payer
Question # 3 of 10 ( Start time: 03:55:26 PM ) Total Marks: 1
Currency used in E-Cash Payment system is called _________.
Select correct option:
Coin
Penny
Cent
Dollar
Question # 1 of 10 ( Start time: 04:01:32 PM ) Total Marks: 1
Payment gateway is an organization which connects those entities to the internet which are offline.
Select correct option:
True
False
Question # 2 of 10 ( Start time: 04:02:06 PM ) Total Marks: 1
Basic difference between Virtual PIN Payment System and Electronic Check is _______.
Select correct option:
Encryption
Registration with bank
No. of participants
There is no difference between them
Question # 3 of 10 ( Start time: 04:02:25 PM ) Total Marks: 1
Which of these attacks have been reported on symmetric key algorithms?
Select correct option:
Key Search Attacks
Cryptanalysis
System-Based Attacks
All
Question # 4 of 10 ( Start time: 04:02:57 PM ) Total Marks: 1
Which of the following represents correct sequence of steps for electronic check payment system?
Select correct option:
Payer’s bank ? Payee ? Payee’s bank ? Payer
Payer’s bank ? Payee’s bank ? Payer ? Payee
Payer ? Payee ? Payee’s bank ? Payer’s bank
Payee’s bank ? Payer’s bank ? Payee ? Payer
Question # 5 of 10 ( Start time: 04:03:18 PM ) Total Marks: 1
What is the basic purpose of applying hash function on a message?
Select correct option:
Boosting up transfer speed
Simplification of communication
Encryption of message
All of above
Question # 6 of 10 ( Start time: 04:03:36 PM ) Total Marks: 1
EFT stands for _____________.
Select correct option:
Electronic Film Transmission
Electronic Funds Transfer
Electronic File Translation
None of above
Question # 7 of 10 ( Start time: 04:03:50 PM ) Total Marks: 1
SET and SSL both are same with respect to security.
Select correct option:
True
False
Question # 8 of 10 ( Start time: 04:04:07 PM ) Total Marks: 1
The key feature of E-Cash Payment system is
Select correct option:
Anonymity
Security
Cryptography
None of these
Question # 9 of 10 ( Start time: 04:04:53 PM ) Total Marks: 1
SSL stands for
Select correct option:
Secure Socket Layer
Security Service Layer
Sub Secured Length
None of these
At deposit stage, the serial number is ……………..by E-Cashbank
Known
Unknow
Secure
View
Question # 2 of 10 ( Start time: 05:34:37 PM ) Total Marks: 1
User generates blank electronic check by using his checkbook device.
Select correct option:
True
False
Question # 3 of 10 ( Start time: 05:36:04 PM ) Total Marks: 1
In case of transaction failure or crash, one can retrieve his or her lost coins by sending all blinded signed coins from last …………………withdrawals to the E-bank.
Select correct option:
10
12
14
16
Question # 4 of 10 ( Start time: 05:36:54 PM ) Total Marks: 1
Using SSL, we type in URL as :
Select correct option:
https
httpc
httpc
httpi
Question # 5 of 10 ( Start time: 05:37:49 PM ) Total Marks: 1
Which of the following represents correct sequence of steps for electronic check payment system?
Select correct option:
Payer’s bank ? Payee ? Payee’s bank ? Payer
Payer’s bank ? Payee’s bank ? Payer ? Payee
Payer ? Payee ? Payee’s bank ? Payer’s bank
Payee’s bank ? Payer’s bank ? Payee ? Payer
Question # 6 of 10 ( Start time: 05:39:21 PM ) Total Marks: 1
Suppose you want to buy diamonds. Which of the following payment system you should give LEAST preference for this purpose?
Select correct option:
Virtual PIN payment system
Electronic checks
Electronic Cash
Credit card
Question # 7 of 10 ( Start time: 05:40:53 PM ) Total Marks: 1
It is necessary for both buyer and seller to have their account in the ---------E-bank.
Select correct option:
Same
Separate
Any
partially same
Question # 8 of 10 ( Start time: 05:42:00 PM ) Total Marks: 1
How many elements an e-coin has?
Select correct option:
1
2
3
4
Question # 9 of 10 ( Start time: 05:42:49 PM ) Total Marks: 1
ACH is a centralized system used by different interconnected banks for clearing payment requests.
Select correct option:
True
False
Question # 10 of 10 ( Start time: 05:44:06 PM ) Total Marks: 1
If a key is 4 bit in length, how many unique key values are possible?
Select correct option:
4
8
16
32
Which of these keys can be used for encryption instead of using pair of private and public keys?
Select correct option:
Systematic key
Asymmetric key
Symmetric key
All of above
Question # 2 of 10 ( Start time: 05:52:50 PM ) Total Marks: 1
Which of these is a primary participant in E-Cash Payment system?
Select correct option:
Buyer
Bank
Merchant
All
Question # 3 of 10 ( Start time: 05:54:04 PM ) Total Marks: 1
What is added in message digest to create digital signatures?
Select correct option:
Sender's private key
Sender's public key
Sender's symmetric key
None of above
Question # 4 of 10 ( Start time: 05:55:36 PM ) Total Marks: 1
Virtual PIN Payment System requires both merchant and buyer to register with _______________.
Select correct option:
Auto Clearing House (ACH)
First Virtual (FV)
DSS (Digital Signature Standard)
DES (Data Encryption Standard)
Question # 5 of 10 ( Start time: 05:56:33 PM ) Total Marks: 1
It is necessary for both buyer and seller to have their account in the ---------E-bank.
Select correct option:
Same
Separate
Any
partially same
Question # 6 of 10 ( Start time: 05:57:57 PM ) Total Marks: 1
Virtual PIN Payment system is considered suitable for __________.
Select correct option:
Low-cost items
High-cost items
Very expensive items
Every kind of items
Question # 7 of 10 ( Start time: 05:59:10 PM ) Total Marks: 1
How many elements an e-coin has?
Select correct option:
1
2
3
4
Question # 8 of 10 ( Start time: 05:59:49 PM ) Total Marks: 1
Using SSL, we type in URL as :
Select correct option:
https
httpc
httpc
httpi
Question # 9 of 10 ( Start time: 06:01:08 PM ) Total Marks: 1
What are the security threats in VPS?
Select correct option:
a. Email hacking
b. Credit card number stolen
c. Missing of delivery
d. A and B
Question # 10 of 10 ( Start time: 06:04:53 PM ) Total Marks: 1
Attacker attempts to decrypt the message with every possible key in ______.
Select correct option:
Key Search Attacks
Cryptanalysis
System-Based Attacks
None
The length of a message digest is ________.
Select correct option:
32 to 64 bits
64 to 128 bits
128 to 256 bits
256 to 512 bit
Virtual PIN Payment System requires both merchant and buyer to register with _______________.
Select correct option:
Auto Clearing House (ACH)
First Virtual (FV)
DSS (Digital Signature
is necessary for both buyer and seller to have their account in the ---------E-bank.
Same
Separate
Key version represents public key by
Select correct option:
Buyer
Seller
E-Bank
Certification Authority
If a key is 4 bit in length, how many unique key values are possible?
Select correct option:
4
8
16
Which of the following represents correct sequence of steps for electronic check payment system?
Select correct option:
Payer’s bank ? Payee ? Payee’s bank ? Payer
The serial # generated by the cyberwallet gets multiplied by blinding factor ‘r’ which is known only to the ___________.
Select correct option:
Bank
Merchant
Client
None
What is basic advantage of symmetric algorithms?
Select correct option:
Symmetric key does not use any encryption
Symmetric algorithms are faster
Symmetric
Attacker attempts to decrypt the message with every possible key in ______.
Select correct option:
Key Search Attacks
Cryptanalysis