Sie sind auf Seite 1von 19

E-Commerce

PART A (Descriptive Type) = 32


PART B (Case Study) = 3
PART C (Multiple Choice) = 140
Instant Downloadable Solution from AiDLo.com
PART A
Descriptive Type Question
Question 1a): What do you understand by Electronic Commerce?
Question 1b): What makes Electronic Commerce different from other kinds of
Commerce"?
Question 2: List the advantages and disadvantages of e-Commerce.
Question 3: Explain why B2B and B2C initiatives require different IT infrastructures.
Question 4a): Name the various technologies that fit well within the definition of
Electronic Commerce.
Question 4b): Identify contributions that EDI can make for the internal process
improvements?
Question 5a): Can everyone have access to Electronic Commerce?
Question 5b): Are electronic transactions safe? What aspects of network security
should be kept in mind?
Question 6: Describe briefly the forces that affect increased usage of Electronic
Commerce in Small & Medium-sized Enterprises.
Question 7: How can my business benefit from changes in how information flows
between my trading partners and me?
Question 8a): What is the difference between a Homepage and a website?
Question 8b): Which scales help define the type of CAD system that a company is
likely to use?
Question 9: Give a concise overview of what a CAD is good for and what to look in
a CAD system.
Question 10a): What are the various technological life cycle stages while
implementing EC?
Question 10b) why is business analysis conducted during the implementation of EC?
Question 11: What is the role of HTML in web page design? Give a HTML code to
display
o Introduction to e-commerce
o This is a new book
Question 12: Define e-Commerce. What are the different types of e-Commerce?
Question 13: What do you understand by EDI? Is EDI used in B2C or B2B e-
Commerce? Why is EDI important in e-Commerce?
Question 14: Explain B2C e-Commerce of a customer reserving airline tickets from
his home or place of work
Question 15: Explain the system architecture of e-Commerce by looking at it as a
set of layers with the physical network at the bottom layer and applications at the
top layer.
Question 16: What are the main differences between electronic cheque payment
and credit card payment in e-Commerce? Explain cheque transaction protocol used
in e-Commerce.
Question 17: What are the three stages of the new technology adoption curve or S-
curve? And what stage do many experts believe e-commerce is entering?
Question 18: What do you understand by a digital signature? Explain it's application
and verification diagrammatically.
Question 19: What are the various types viruses? What can a virus to do the
computer?
Question 20: What is the purpose of the domain name system (DNS)?
Question 21: What is one of the benefits of layering to a complex system?
Question 22: What is the difference between a web site and a portal?
Question 23: What is the most valuable function of the proxy server?
Question 24: Explain B2B E-Commerce using an example of a book distributor who
stocks a large number of books, which he distributes via a large network of book
sellers. Assume that the distributor has stocks of books of a large number of
publishers and book sellers order books as and when their stock is low. Distributors
give 1 month's time to booksellers for payment.
Question 25: Explain the system architecture of E-Commerce by looking at it as a
set of layers with the physical network at the bottom layer and applications at the
top layer.
Question 26: What do you understand by EDI? Is EDI used in B2C or B2B E-
Commerce? Why is EDI important in E-Commerce?
Question 27: Why is security important in E-Commerce? What are the security
issues to be taken into account while designing a security system for E-Commerce?
Question 28: What types of electronic payment systems are required in E-
Commerce? Why are there different types of payment systems? Explain the
necessary characteristics of each type of payment system and give an example
each of where it is used.
Question 29: What three forces lead to the WWW's emergence as the single most
dynamic force in information technology?
Question 30: Why is it so important to align the electronic commerce strategy with
the overall business strategy?
Question 31: Give examples of how the supplier's information system can be used
at every link in the value chain by the customer?
Question 32: Define the following terms and discuss the Infrastructure needed for
an E-Commerce Environment: (Nov'09)
(i) e-businesses
(ii) e-commerce
(iii) e-cooperation
(iv) e-information
(v) e-procurement
(vi) e-government
PART B
Case Study 1
JaiKashan Windows Ltd. (JWL) Case Study in the Courseware.
(a) What is the company's' current practice of manufacturing?
(b) Would usage of E-mail help in reducing the Internal and External communications problems
at JWL? How?
(c) Which EC technologies do you recommend at JWL. Give business uses of any two
technologies?
(d) Which approach would you recommend to get EC up and running at JWL?

Case Study 2
Do comparative study of electronic cheque payment and credit card payment in e-Commerce.

Case Study 3
Information Management in E Commerce
ABC Ltd is a manufacturer of mobile handsets. It has its manufacturing plant in Bangalore and
its offices and retail outlets in different cities in India and abroad. The organization wants to
have information systems connecting all the above facilities and also providing access to its
suppliers as well as customers.
Questions:
(a) Discuss various issues in developing information systems and fulfilling information needs at
different levels in the organization.
(b) Explain different security threats in the context of e-commerce for the above company.



PART C
Multiple Choice Question Set 1
1. Company ABC sells a variety of products on its website to the highest bidder. What
type of business model are they using?
(a) Affiliate Marketing
(b) Online Auction
(c) Supply Chain improver
(d) Name your price

2. Company XYZ helps individuals sell products to other individuals and takes a small
commission on each sale. What EC classification do they fit?
(a) B2C
(b) B2B
(c) C2C
(d) P2P
3. Which of the following is a pure electronic commerce corporation?
(a) Mike's business sells products out of his store in Chicago.
(b) Tom's business sells products out of his store in Chicago and online.
(c) Jane's business sells products out of her website.
(d) Ann's business sells products out of her website and mail order catalog
4. Which of the following is not a limitation of EC?
(a) Some customers like to physically inspect products before buying
(b) Customers now have nearly unlimited bandwidth.
(c) The standards for security are still evolving.
(d) Software tools change frequently
5. Company XYZ sells products to individuals. What EC classification do they fit?
(a) B2C
(b) B2B
(c) C2C
(d) P2P
6. Which of the following is not an attribute of a corporate portal?
(a) A company's partners use the portal to communicate
(b) The company's employees use this system to communicate
(c) The public uses this portal to access the Internet
(d) The public uses this portal to access information about the company
7. Which of the following is a limitation of EC?
(a) Ability to operate 24 hours a day.
(b) Integration of distributor and supplier IT systems.
(c) Special network and hardware requirements.
(d) Increased market area
8. Which of the following is a benefit of EC?
(a) Insufficient telecommunications bandwidth
(b) Individuals can telecommute more easily
(c) Customers may be unsure of EC security
(d) EC theory and practice is constantly evolving
9. EC reduces cycle time in all of the following ways except:
(a) Customer satisfaction
(b) Development of marketing materials
(c) Product distribution
(d) Time to market
10. Why is B2C generally less attractive than B2B?
(a) Easier to implement
(b) Less expensive to implement
(c) Larger number of organizations
(d) Channel conflict
11. Company helps individuals exchange digital products. What EC classification do
they fit?
(a) B2C
(b) B2B
(c) C2C
(d) P2P
12. Company ABC has several divisions that have created private resources that can be
accessed using Internet protocols. The company is now going to link these resources
together. What type of network is being described?
(a) Internet
(b) Extranet
(c) Intranet
(d) Virtual private network
13. Company XYZ sells a variety of products on its website. What type of business
model are they using?
(a) Affiliate Marketing
(b) Online Auction
(c) E-tailing
(d) Name your price
14. Association ABC helps its members get discounts on the purchases by buying in
bulk. What type of business model are they using?
(a) Group purchasing
(b) Online Auction
(c) Affiliate Marketing
(d) Name your price
15. The disadvantages of use of computer in business transactions are _________
1. They never be able to exercise judgment
2. They lack creativity
3. Lack experience to manage exceptions
4. Speed up the flow of information
5. They cannot solve problems.
(a) 1, 2, 3, 4
(b) 2, 3, 4, 5
(c) 1, 2, 3, 5
(d) 1, 2, 4, 5
16. Which of the following types of sites features the greatest amount of self-generated
content?
(a) hub sites
(b) portals
(c) connectors
(d) destinations
17. E-business software is best defined as to manage:
(a) internal administrative applications.
(b) buy-side applications.
(c) sell-side e-commerce applications.
(d) All of the above
18. Which of the following statements do you agree with relating to knowledge audits?
(a) A knowledge audit should always be completed before an information audit
(b) Information and knowledge audits are complementary processes
(c) Information and knowledge audits are unrelated
(d) An information audit should always be completed before a knowledge audit
(e) Information and knowledge audits are the same
19. E-commerce:
(a) is based on the exchange of digitized information.
(b) depends upon technology.
(c) includes intra- and inter-organizational activities that support exchanges.
(d) all of the above.
20. Purchasing and procurement transactions are a major part of the
________________
category of e-commerce.
(a) B2C
(b) B2B
(c) C2B
(d) P2P
21. Amazon.com was a pioneer in _____________ e-commerce.
(a) B2C
(b) B2B
(c) C2B
(d) P2P
22. The "backbone" of modern firms is the:
(a) ERP system
(b) IT system
(c) CRM system
(d) EC system
23. A firm's interface, data set, and code set can be integrated by a _______________
system.
(a) ERP
(b) IT
(c) CRM
(d) EC
24. Which of the following is not a web browser?
(e) Netscape's Navigator
(f) Mosaic
(g) Amaya
(h) Gopher
25. The disadvantages of use of computer in business transactions are _________
1. They never be able to exercise judgment
2. They lack creativity
3. Lack experience to manage exceptions
4. Speed up the flow of information
5. They cannot solve problems.
(a) 1, 2, 3, 4
(b) 2, 3, 4, 5
(c) 1, 2, 3, 5
(d) 1, 2, 4, 5
26. The main protocol for transferring information on the web is
(a) HTTP
(b) PPP
(c) FTP
(d) SLIP
27. ___________ connect a company with its suppliers and distributors.
(a) Supply nets
(b) Intranets
(c) Extranets
(d) Internets
28. E-markets are "_____________," rather than physical "marketplaces".
(a) Marketspaces
(b) Brick-and-mortar
(c) Bazaars
(d) Click-and-brick
29. If a Web page designer were to use a "skyscraper," he or she would be using a
technique that had which of the following characteristics?
(a) A box that is much larger than a banner advertisement.
(b) Tall, skinny advertisements at the side of a Web page.
(c) An online ad that pops up between changes on a Web site.
(d) An advertisement that moves across the screen.
30. A browser is "told" how to access desired content by a(n):
(a) URL
(b) JPEG
(c) IP
(d) WYSIWYC
31. Website development:
(a) is strictly a technological exercise.
(b) requires the use of outside experts.
(c) is a game of tradeoffs
(d) must be undertaken from the firm's point of view
32. _______________ is the most common way to communicate with a user's browser.
(a) CRM
(b) GUI
(c) CPM
(d) HTML
33. In hypertext, the term "hyper" refers to:
(a) speed
(b) ability to link to other pages
(c) the dynamic character of its content
(d) the volume of content
34. Which of the following is not a Web scripting language?
(a) ASP
(b) PHP
(c) ColdFusion
(d) Apache
35. HTML stands for
(a) Hypertext Markup Language
(b) Hitext Markup Language
(c) Hypertext Marked Language
(d) Hypertext Mark Language


Multiple Choice Question Set 2
1. The primary focus of most B2C applications is generating ____.
(a). Revenue
(b). Product
(c). Service
(d). Web Site
2. Which is most significant for web based advertisers?
(a). Impressions
(b). Page Views
(c). Click Thoughts
(d). Hits
3. Digital products are particularly appealing for a company's bottom line because of-
(a). The freedom from the law of diminishing returns
(b). The integration of the value chain.
(c). The increase in brand recognition.
(d). The changes they bring to the industry.
4. The differences between B2B and B2C exchanges include
(a) Size of customer set
(b) Transaction volume
(c) Form of payment
(d) Level of customization on products/services
(A). a and b
(B). a, b, and c
(C). b and c
(D). All of the above
5. What is the most significant part of e-commerce:
(a). B2B
(b). B2E
(c). B2C
(d). C2C
6. Security-and-risk services include--
(a). Firewalls & policies for remote access
(b). Encryption and use of passwords
(c). Disaster planning and recovery
(d). All of the above
(e). a & b only
7. Business Plans are important when trying to find capital to start up your new
business. Important elements of a business plan include:
(a). Sales And Marketing
(b). Human resources handbook
(c). Business description
(d). a and c
8. Based on the study, in the supply side initiatives, which of the following clusters was
the only one found to be critical enterprise-wide?
(a). IT management
(b). Communications
(c). Data management
(d). IT-architecture-and-standards
9. E-commerce increases competition by: erasing geographical boundaries,
empowering customers and suppliers, commoditizing new products, etc. How do
companies usually solve this problem?
(a). By competing on price
(b). By selling only through traditional channels.
(c). By lowering costs
(d). By creating attractive websites
10. On which form of e-commerce does Dell Computer Corporation rely in conducting
its business?
(a). B2E
(b). B2C
(c). B2B
(d). None of the above
(e). All of the above
11. What is the 'last mile' in the last mile problem? The link between your...
(a). Computer and telephone
(b). Home and telephone provider's local office
(c). Office and server
(d). Home and internet service provider
12. Which of the following is a function of a proxy server?
(a). Maintaining a log of transactions
(b). Caching pages to reduce page load times
(c). Performing virus checks
(d). Forwarding transactions from a user to the appropriate server
(e). All of the above
13. An example of the supply chain of commerce is :
(a). A company turns blocks of wood into pencils.
(b). A department supplies processed data to another department within a company.
(c). A consumer purchases canned vegetables at the store.
(d). None of the above
14. Just after your customers have accepted your revolutionary new e-commerce idea,
which of the following is not expected to immediately happen?
(a). Competitor catch-up moves
(b). Commoditization
(c). First-mover expansion
(d). None of the above
15. Which of the following statements about E-Commerce and E-Business is true?
(a). E-Commerce involves buying and selling over the internet while E-Business does
not.
(b). E-Commerce is B2C (business to consumer) while E-Business is B2B (business to
business).
(c). E-Business is a broader term that encompasses E-Commerce (buying and selling)
as well as doing other forms of business over the internet.
(d). None of the above.
16. Where do CGI (Common Gateway Interface) application programs or scripts run?
(a). On the client through a web browser
(b). On the client through temporary stored files
(c). On the web server
(d). Where the user installs them
(e). None of the above
17. In which model the application logic is partitioned among the clients and multiple
specialized servers?
1. Two tier
2. Three tier
3. N tier
Options:
(a). 1
(b). 2
(c). 2 & 3
(d). 3
18. What of the following are the 3 types of web information system logic?
(a). Presentation, business, information/data
(b). Presentation, information/data, active server pages
(c). Business, information/data, client/server
(d). None
19. Software, music, digitized images, electronic games, pornography can be revenue
sources for the B2C e-commerce
(a). Selling services
(b). Doing customization
(c). Selling digital products
(d). Selling physical products
20. What e-commerce category is the largest in terms of revenue?
(a). Business to Business (B2B)
(b). Intra-Business (B2E)
(c). Business to Consumer (B2C)
(d). Consumer to Consumer (C2C)
21. An application layer protocol, such as FTP or HTTP, is transparent to the end user.
(a) Always
(b) Never
(c) Sometimes
(d) None Of Above
22. B2B & B2C IT initiatives can use the same E-Commerce platforms
(a) Always
(b) Never
(c) Sometimes
(d) None Of Above
23. B2B involves small, focused customer set with large transaction volume per
customer, periodic consolidated payments and significant customizations of products
and services
(a) Always
(b) Never
(c) Sometimes
(d) None Of Above
24. Two computers can communicate using different communication protocols.
(a) Always
(b) Never
(c) Sometimes
(d) None Of Above
25. Which is/are types of e - commerce?
(a). B2B
(b). B2C
(c). C2C
(d). All the above
26. Which of the following items is used to protect your computer from unwanted
intruders?
(a). A cookie.
(b). A browser.
(c). A firewall.
(d). A server.
27. For selling physical products on the Internet, what is the key to profitability?
(a). Hook
(b). Cost Control
(c). Brand Recognition
(d). Customization
28. Which of the following B2C companies is the best example of achieving its financial
success through controlling its cost?
(a). Yahoo
(b). Amazon
(c). E-Bay
(d). Google
(e). None of the above
29. AsianAvenue.com, BlackVoices.com, iVillage.com, SeniorNet.org are all examples
of what?
(a). Intermediary Services websites
(b). Physical Communities
(c). B2C websites
(d). Virtual Communities
30. Which of the following is the least attractive product to sell online?
(a). Downloadable music
(b). Software
(c). A pda
(d). Electronic stock trading
31. In the e-mail address jgreen03@gsm.uci.edu what is the top-level domain
(a). gsm
(b). uci
(c). edu
32. What do you think cookies do
(a). They are threat to privacy
(b). The help the user not to repeat some input info
(c). They personalize user's webpage
(d). B and c
(e). All of the above
33. Much of Amazon.com's initial success can be attributed to which of the following:
(a). Low prices
(b). Brand recognition
(c). Fast web connections
(d). Customer service
34. It is particularly difficult to maintain the competition advantage based on ________.
(a). Quality
(b). Efficiency
(c). Price
(d). Internal Cost Reduction
(e). Brand
35. What type of application has the potential to change a market or even create a new
market?
(a). Software application
(b). Intelligent application
(c). Killer application
(d). Business application
36. Why did the e-commerce boom, as evidenced by soaring stock prices of Internet
businesses such as Pets.com and e Toys, went bust in 2000?
(a). Websites started by techies who lack business knowledge
(b). Lack of good business model
(c). Investors' and entrepreneurs' greed and ignorance
(d). All of the above
37.. Why can't new connection infrastructure like DSL, Cable Modem, and fiber optics
solve the last mile problem?
(a). Availability
(b). Cost
(c). Distance
(d). All of the Above
38. These are all the uses of plug-ins except?
(I). Air fresheners
II. Speed up data transmission
III. Enhance browser capability
IV. To view different file types
(a) I and II
(b) III and IV
(c) I
(d) I and IV
39. A system with universally accepted standards for storing, retrieving, formatting, and
displaying information in a networked environment best defines:
(a) A web site.
(b) A web location.
(c) The World Wide Web.
(d) An intranet.
40. What's the real potential of e-commerce?
(a) Making a profit
(b) Generating Revenue
(c) Improving efficiency
(d) Buying and selling on the internet and WWW


Multiple Choice Question Set 3
1 By Electronic Commerce we mean:
a. Commerce of electronic goods
b. Commerce which depends on electronics
c. Commerce which is based on the use of internet
d. Commerce which is based on transactions using computers connected by
telecommunication network

2 For carrying out B2B e-Commerce the following infrastructure is essential: (i) World
Wide Web
(ii) Corporate network
(iii) Electronic Data Interchange standards
(iv) Secure Payment Services
(v) Secure electronic communication link connecting businesses
a. i, ii, iii
b. ii, iii, iv
c. ii, iii, iv, v
d. i, ii, iii, iv, v

3 For carrying out B2C e-Commerce the following infrastructure is essential (i) World
Wide Web
(ii) Corporate network
(iii) Electronic Data Interchange standards
(iv) Secure Payment Services
(v) Secure electronic communication link connecting businesses
a. i, iv
b. i, iii, iv
c. ii, iii
d. i, ii, iii, iv

4 For carrying out C2C e-Commerce the following infrastructure is essential (i) World
Wide Web
(ii) Corporate network
(iii) Electronic Data Interchange standards
V. Rajaraman/IISc. Bangalore M13/V1/July 04/1
System Analysis and Design/Electronic Commerce Multiple Choice Questions
(iv) Secure Payment Services
(v)Secure electronic communication link connecting businesses
a. i and ii
b. ii and iv
c. i and iii
d. i and iv

5 Advantages of B2C commerce are (i) Business gets a wide reach to customers
(ii) Payment for services easy
(iii)Shop can be open 24 hours a day seven days a week
(iv)Privacy of transaction always maintained
a. i and ii
b. ii and iii
c. i and iii
d. iii and iv

6 B2C commerce
a. includes services such as legal advice
b. means only shopping for physical goods
c. means only customers should approach customers to sell
d. means only customers should approach business to buy

7 Advantages of B2C commerce to customers are (i)wide variety of goods can be
accessed and comparative prices can be found
(ii) shopping can be done at any time
(iii)privacy of transactions can be guaranteed
(iv)security of transactions can be guaranteed
a. i and ii
b. ii and iii
c. iii and iv
d. i and iv

8 Disadvantages of e-Commerce in India are (i) internet access is not universally
available
(ii) Credit card payment security is not yet guaranteed
(iii) Transactions are de-personalized and human contact is missing
(iv) Cyberlaws are not in place
a. i and ii
b. ii and iii
c. i, ii, iii
d. i, ii, iii, iv

9 Electronic Data Interchange is necessary in
a. B2C e-Commerce
b. C2C e-Commerce
c. B2B e-Commerce
d. Commerce using internet

10 EDI requires
a. representation of common business documents in computer readable forms
b. data entry operators by receivers
c. special value added networks
d. special hardware at co-operating Business premises

11 EDI standards are
a. not universally available
b. essential for B2B commerce
c. not required for B2B commerce
d. still being evolved

12 EDIFACT is a standard
a. for representing business forms used in e-Commerce
b. for e-mail transaction for e-Commerce
c. for ftp in e-Commerce
d. protocol used in e-Commerce

13 EDIFACT standard was developed by
a. American National Standard Institute
V. Rajaraman/IISc. Bangalore M13/V1/July 04/3
System Analysis and Design/Electronic Commerce Multiple Choice Questions
b. International Standard Institute
c. European Common Market
d. United Nations Economic Commission for Europe
14 ANSI X.12 is a standard developed by
a. American National Standard Institute
b. International Standard Institute
c. European Common Market
d. United Nations Economic Commission for Europe

15 In B2B e-Commerce
(i) Co-operating Business should give an EDI standard to be used
(ii) Programs must be developed to translate EDI forms to a form accepted by
application program
(iii) Method of transmitting/receiving data should be mutually agreed
(iv) It is essential to use internet
a. i, ii
b. i, ii, iii
c. i, ii, iii, iv
d. ii, iii, iv

16 EDI use
a. requires an extranet
b. requires value added network
c. can be done on internet
d. requires a corporate intranet

17 EDI over internet uses
a. MIME to attach EDI forms to e-mail messages
b. FTP to send business forms
c. HTTP to send business forms
d. SGML to send business forms

18 For secure EDI transmission on internet
a. MIME is used
b. S/MIME is used
V. Rajaraman/IISc. Bangalore M13/V1/July 04/4
System Analysis and Design/Electronic Commerce Multiple Choice Questions
c. PGP is used
d. TCP/IP is used

19 EDI standard
a. is not easily available
b. defines several hundred transaction sets for various business forms
c. is not popular
d. defines only a transmission protocol

20 By security in e-Commerce we mean
(i) Protecting an organizations data resource from unauthorized access
(ii)Preventing disasters from happening
(iii) Authenticating messages received by an organization
(iv) Protecting messages sent on the internet from being read and understood by
unauthorized persons/organizations
a. i, ii
b. ii, iii
c. iii, iv
d. i, iii, iv

21 A firewall is a
a. wall built to prevent fires from damaging a corporate intranet
b. security device deployed at the boundary of a company to prevent unauthorized
physical access
c. security device deployed at the boundary of a corporate intranet to protect it from
unauthorized access
d. device to prevent all accesses from the internet to the corporate intranet

22 A firewall may be implemented in
a. routers which connect intranet to internet
b. bridges used in an intranet
c. expensive modem
d. users application programs

23 Firewall as part of a router program
a. filters only packets coming from internet
V. Rajaraman/IISc. Bangalore M13/V1/July 04/5
System Analysis and Design/Electronic Commerce Multiple Choice Questions
b. filters only packets going to internet
c. filters packets travelling from and to the intranet from the internet
d. ensures rapid traffic of packets for speedy e-Commerce

24 Filtering of packets by firewall based on a router has facilities to
a. i, iii
b. i, ii, iii
c. i, ii, iii, iv
d. ii, iii, iv

25 Main function of proxy application gateway firewall is
a. to allow corporate users to use efficiently all internet services
b. to allow intranet users to securely use specified internet services
c. to allow corporate users to use all internet services
d. to prevent corporate users from using internet services

26 Proxy application gateway
(i) acts on behalf of all intranet users wanting to access interne securely
(ii)monitors all accesses to internet and allows access to only specified IP addresses
(iii) disallows use of certain protocols with security problems
(iv) disallows all internet users from accessing intranet
a. i, ii
b. i, ii, iii
c. i, ii, iii, iv
d. ii, iii, iv

27 A hardened firewall host on an intranet
(i) has a proxy application gateway program running on it
(ii)Allows specified internet users to access specified services in the intranet
(iii) Initiates all internet activities requested by clients and monitors them
(iv) prevents outsiders from accessing IP addresses within the intranet
a. i, ii
b. i, ii, iii
c. i, ii, iii, iv
d. ii, iii, iv

28 A hardened firewall host on an Intranet is
a. a software which runs in any of the computers in the intranet
b. a software which runs on a special reserved computer on the intranet
c. a stripped down computer connected to the intranet
d. a mainframe connected to the intranet to ensure security

29 By encryption of a text we mean
a. compressing it
b. expanding it
c. scrambling it to preserve its security
d. hashing it

30 Encryption is required to
(i) protect business information from eavesdropping when it is transmitted on internet
(ii)efficiently use the bandwidth available in PSTN
(iii) to protect information stored in companies databases from retrieval
(iv) to preserve secrecy of information stored in databases if an unauthorized person
retrieves it
a. i and ii
b. ii and iii
c. iii and iv
d. i and iv

31 Encryption can be done
a. only on textual data
b. only on ASCII coded data
c. on any bit string
d. only on mnemonic data

32 By applying permutation (31254) and substitution by 5 characters away from current
character (A ?? F , B ?? G etc..) the following string ABRACADABRA becomes
a. FGWCAAADRBF
b. RABCAAADRBF
c. WFGHFFFIWGF
d. None of the above

33 The following ciphertext was received. The plaintext was permuted using
permutation (34152) and substitution. Substitute character by character +3 (A ?? D,
etc). The plain text after decryption is: Cipher text : PDLJDLXHVQC
a. MAIGAIUESNZ

Das könnte Ihnen auch gefallen