81. ___ is a financial institution that establishes an account with a merchant andprocesses payment card authorization and payments
A. customer
B. issuer
C. Merchant
D. Acquirer
Answer
D. Acquirer
82. In ___ type of payment system customer is allowed to spend only up to theamount that have pre deposited into account.
A. Prepaid
B. Post paid
C. both of these
D. none of these
Answer
A. Prepaid
83. ___ type of payment system is highly useful to those customers who would like tocontrol overspending,
A. Prepaid
B. Post paid
C. both of these
D. none of these
Answer
A. Prepaid
84. credit card gives all the advantages of a normal credit card without worryingabout the interest charges
A. Prepaid
B. Post paid
C. both of these
D. none of these
Answer
A. Prepaid
85. facility helps the customer to pay only a small amount of the total outstandingand revolve the rest of the payment to the next month.
A. Cash advance
B. Revolver
C. Tele draft
D. None of these
Answer
B. Revolver
86. is the system of purchasing cash credits in relatively small amounts, storing the credits in our computer, and then spending them, when making electronic purchases over the internet.
A. E-cash
B. Digicash
C. Cyber cash
D. any of these
Answer
D. any of these
87. is a financial instrument which can be used more than once to borrow moneyor buy products and services on credit.
A. Credit card
B. E-Cheques
C. E-cash
D. none of these
Answer
A. Credit card
88. To accept a credit card for payment, we have to open a account with our bank
A. Savings Bank
B. Current account
C. Merchant account
D. any of these
Answer
C. Merchant account
89. A ___ is a device that includes an embedded integrated circuit Chip [ICC] that can be either a secure micro controller or equivalent intelligence with internal memory or a memory chip alone.
A. smart Card
B. E-Cheques
C. E-cash
D. none of these
Answer
A. smart Card
90. is a kind of payment card that transfers fund directly from the consumer’s bankaccount to the merchants account
A. Debit Card
B. Electronic purse
C. credit card
D. any of these
Answer
A. Debit Card
91. ___ is a card with a microchip that can be used instead of cash and coins for everythingfrom vending machines to public transportation.
A. Debit Card
B. Electronic purse
C. credit card
D. any of these
Answer
B. Electronic purse
92. is basically a secure gate between our organization data and internet.
A. Network firewall
B. Antivirus
C. both of these
D. none of these
Answer
A. Network firewall
93. encrypts payment card transaction data and verifies that both parties in thetransaction are genuine.
A. SSL
B. SET
C. both of these
D. none of these
Answer
B. SET
94. is automated methods of recognizing a person based on a physiological orbehavioral characteristic.
A. Biometric
B. PIN
C. both of these
D. none of these
Answer
A. Biometric
95. In Biometrics, ___ ID system is designed to prevent more than one person fromusing a single identity
A. Positive ID system
B. Negative ID system
C. both of these
D. none of these
Answer
A. Positive ID system
96. In Biometrics, ___ ID system is designed to prevent one person from usingmore than one identity
A. Positive ID system
B. Negative ID system
C. both of these
D. none of these
Answer
B. Negative ID system
97. are program developed by some dishonest people to destroy the computersystem and the valuable information in it.
A. Network firewall
B. computer virus
C. both of these
D. none of these
Answer
B. computer virus
98. Which among the following is not an example for computer virus ?
A. Chernobyl
B. Melissa
C. I Love You
D. None of these
Answer
D. None of these
99. are special type of software meant for limiting the risks of being hit bycomputer viruses
A. Network firewall
B. Antivirus
C. both of these
D. none of these
Answer
B. Antivirus
100. A is a person who gains unauthorized access to a computer network for profit,criminal mischief or personal pleasure.
A. Hacker
B. spoofer
C. operator
D. none of these
Answer
A. Hacker
101. acts like a gate keeper that examines each users identification before allowingthem to enter to the organization’s internal networks.
A. Network firewall
B. Antivirus
C. both of these
D. none of these
Answer
A. Network firewall
102. Prevents unauthorized communication into and out of the network, allowing theorganization to enforce a security policy on traffic between its network and the internet.
A. Network firewall
B. Antivirus
C. both of these
D. none of these
Answer
A. Network firewall
103. SET means ___
A. Standard Electronic Technology
B. Standard Electronic Transfer
C. Secure Electronic Transaction
D. None of these
Answer
C. Secure Electronic Transaction
104. The verification of credit card is done by using ___ with a communications link to themerchants acquiring bank
A. Credit card payment terminal
B. Point of Sale
C. All of these
D. none of these
Answer
C. All of these
105. Creating illegitimate sites that appear to be published by established organizationsby unscrupulous artists is termed as ___
A. Spoofing
B. Snooping
C. Sniffing
D. None of these
Answer
A. Spoofing
106. Gain entry into the user’s system and scan your file system for personal informationis known as ___
A. Spoofing
B. Snooping
C. Sniffing
D. None of these
Answer
B. Snooping
107. attacks are difficult and are only successful if the attacker knows somethingabout the shopper
A. Spoofing
B. Snooping
C. Sniffing
D. Guessing passwords
Answer
D. Guessing passwords
108. is the process of making information unintelligible to the unauthorized user.
A. Spoofing
B. Snooping
C. Sniffing
D. Cryptography
Answer
D. Cryptography
109. is the reverse process of encryption, to make the information readable onceagain
A. Spoofing
B. Decryption
C. Sniffing
D. Cryptography
Answer
B. Decryption
110. A provides a way to associate the message with the sender and is theequivalent of an ordinary signature.
A. cyber signature
B. Digital signature
C. SSL
D. none of these
Answer
B. Digital signature
111. A is an electronic file that uniquely identifies individuals and websites on theinternet and enables secure confidential communications
A. Digital signature
B. Digital certificates
C. SSL
D. none of these
Answer
B. Digital certificates
112. The information Technology Act [IT ACT] came into effect on
A. 16th November 2000
B. 15th December 2000
C. 17th October 2000
D. none of these
Answer
C. 17th October 2000
113. Information sent over the Internet commonly uses the set of rules called ___
A. TCP/IP
B. FTP
C. HTTP
D. gopher
Answer
A. TCP/IP
114. is a person who breaks in or trespasses a computer system
A. Hacker
B. Snooper
C. operator
D. spoofer
Answer
A. Hacker
115. E-mail which contain useless material is termed as ___
A. Spam
B. useless mail
C. trunk mail
D. Junk mail
Answer
D. Junk mail
116. India has enacted the first IT Act in the year ___
A. 2001
B. 2002
C. 2009
D. 2000
Answer
D. 2000
117. Which of the following crimes were not covered under IT (Amendment) Act, 2008 ?
A. Cyber terrorism
B. Child pornography
C. Video voyeurism
D. None of these
Answer
D. None of these
118. Trade mark, copyright, patent law etc comes under the purview of ___
A. Data protection
B. Telecommunication laws
C. Intellectual property laws
D. None
Answer
C. Intellectual property laws
119. is a programme designed o replicate and spread generally with the victim beingoblivious to its existence
A. hacker
B. software
C. Computer virus
D. none of these
Answer
C. Computer virus
120. Which one of the following is not a principle of e-commerce ?
A. privacy
B. integrity
C. authentication
D. none of these
Answer
D. none of these