Q.1
Which one is an encryption technique?
Q.2
Which one is not a server level threat?
Q.3
Which is the most important component of IT?
Q.4
Public key cryptography is also known as _________ cryptography.
Q.5
__________ is backbone of all E‐payments in E‐commerce.
Q.6
Which one is a client level threat?
Q.7
Which e‐government arena is being used when governmental agencies send out and accept bids for work?
Q.8
Secret key is used for.
Q.9
Which one is not a physical threat?
Q.10
Which one is a physical threat?
Q.11
The basic elements of website is.
Q.12
What is C stands in CIA of smart card?
Q.13
Which is used to identify mobile money?
Q.14
E‐cheques are ________
Q.15
Digital signature is a.
Q.16
Which one is the component of cybercash payment system?
Q.17
‐‐‐‐‐‐‐‐‐ card is read only mode.
Q.18
Which of the smart card uses a sim like structure for reading and writing data?
Q.19
Which is not a feature of eCommerce?
Q.20
Which one is not an encryption technique?
Q.21
Which one is communication channel threat?
Q.22
Which one is communication channel security protocol?
Q.23
‐‐‐‐‐‐‐‐‐ is an act that poses danger to computer assets.
Q.24
Which one is not a encryption technique?
Q.25
The presence of ‐‐‐‐‐‐‐‐‐‐‐ make the smart card smart.
Q.26
The smart card which use antenna for reading and writing data.
Q.27
What is I stands in CIA of smart card?
Q.28
What is A stands in CIA of smart card?
0 h : 0 m : 1 s