QN01. ————– is an act that poses danger to computer assets.a. Threatb. Dangerc. Errord. None of the aboveAnswer: A QN02. Which one is not a encryption techniquea. RSAb. DESc. AESd. NONE OF THE ABOVEAnswer: D QN03. Which one is not used as a security mechanism?a. Encryptionb. Cryptographyc. Walletsd. Digital signatureAnswer :C QN04. Which e-government arena is being used when governmental agencies send out and accept bids for work?a) G2Gb) G2Bc) G2Cd) G2GAnswer: B QN05. Secret key is used fora. Public key cryptographyb. Private key cryptographyc. Asymmetric key cryptographyd. None of theseAnswer: B QN06. Which one is a communication channel threat?a. Sniffer programsb. Cyber vandalismc. Integrity threatsd. All of the aboveAnswer: D QN07. Which one is a communication channel security protocol?a. SSLb. S-HTTPc. SETd. ALL OF THE ABOVEAnswer: D QN08. The protocol which allows the file transfer between computers isa. TCP/IPb. FTPc. HTTPd. SOAAnswer: B QN09. E-Banking is also known asa. ATMsb. Net bankingc. Traditional bankingd. None of theseAnswer: B QN10….