System Analysis and Design
581. In cheque payment protocol, the purchase order form is signed by purchaser using
- his public key
- his private key
- his private key using his signature hardware
- various public keys
Correct answer: (C)
his private key using his signature hardware
582. EDIFACT is a standard
- for representing business forms used in e-Commerce
- for e-mail transaction for e-Commerce
- for ftp in e-Commerce
- protocol used in e-Commerce
Correct answer: (A)
for representing business forms used in e-Commerce
583. For secure EDI transmission on internet/p>
- MIME is used
- S/MIME is used
- PGP is used
- TCP/IP is used
Correct answer: (B)
S/MIME is used
584. By symmetric key encryption we mean
- one private key is used for both encryption and decryption
- private and public key used are symmetric
- only public keys are used for encryption
- only symmetric key is used for encryption
Correct answer: (A)
one private key is used for both encryption and decryption
585. Public key system is useful because
- it uses two keys
- there is no key distribution problem as public key can be kept in a commonly accessible database
- private key can be kept secret
- it is a symmetric key system
Correct answer: (B)
there is no key distribution problem as public key can be kept in a commonly accessible database
586. The responsibility of a certification authority for digital signature is to authenticate the
- hash function used
- private keys of subscribers
- public keys of subscribers
- key used in DES
Correct answer: (C)
public keys of subscribers
587. The acronym DES stands for
- Digital Evaluation System
- Digital Encryption Standard
- Digital Encryption System
- Double Encryption Standard
Correct answer: (B)
Digital Encryption Standard
588. In public key encryption system if A encrypts a message using his private key and sends it to B
- if B knows it is from A he can decrypt it using A's public key
- Even if B knows who sent the message it cannot be decrypted
- It cannot be decrypted at all as no one knows A's private key
- A should send his public key with the message
Correct answer: (A)
if B knows it is from A he can decrypt it using A's public key
589. Certification of Digital signature by an independent authority is needed because
- it is safe
- it gives confidence to a business
- the authority checks and assures customers that the public key indeed belongs to the business which claims its ownership
- private key claimed by a sender may not be actually his
Correct answer: (C)
the authority checks and assures customers that the public key indeed belongs to the business which claims its ownership
590. In SET protocol a customer encrypts credit card number using
- his private key
- bank's public key
- bank's private key
- merchant's public key
Correct answer: (B)
bank's public key