541. For carrying out B2B e-Commerce the following infrastructure is essential:
World Wide Web
Corporate network
Electronic Data Interchange standards
Secure Payment Services
Secure electronic communication link connecting businesses
i, ii, iii
ii, iii, iv
ii, iii, iv, v
i, ii, iii, iv, v
Correct answer: (C) ii, iii, iv, v
542. Advantages of B2C commerce to customers are
wide variety of goods can be accessed and comparative prices can be found
shopping can be done at any time
privacy of transactions can be guaranteed
security of transactions can be guaranteed
i and ii
ii and iii
iii and iv
i and iv
Correct answer: (A) i and ii
543. EDI use
requires an extranet
requires value added network
can be done on internet
requires a corporate intranet
Correct answer: (C) can be done on internet
544. A firewall is a
wall built to prevent fires from damaging a corporate intranet
security device deployed at the boundary of a company to prevent unauthorized physical access
security device deployed at the boundary of a corporate intranet to protect it from unauthorized access
device to prevent all accesses from the internet to the corporate intranet
Correct answer: (C) security device deployed at the boundary of a corporate intranet to protect it from unauthorized access
545. A hardened firewall host on an intranet
has a proxy application gateway program running on it
allows specified internet users to access specified services in the intranet
initiates all internet activities requested by clients and monitors them
prevents outsiders from accessing IP addresses within the intranet
i, ii
i, ii, iii
i, ii, iii, iv
ii, iii, iv
Correct answer: (C) i, ii, iii, iv
546. By applying permutation (31254) and substitution by 5 characters away from current character (A → F , B → G etc..) the following string ABRACADABRA becomes
FGWCAAADRBF
RABCAAADRBF
WFGHFFFIWGF
None of the above
Correct answer: (C) WFGHFFFIWGF
547. Triple DES
Cannot be broken in reasonable time using presently available computers.
Can be broken only if the algorithm is known using even slow computer.
Can be broken with presently available high performance computers.
It is impossible to break ever.
Correct answer: (A) Cannot be broken in reasonable time using presently available computers.
548. Message can be sent more securely using DES by
encrypting plain text by a different randomly selected key for each transmission
encrypting plain text by a different random key for each message transmission and sending the key to the receiver using a public key system
using an algorithm to implement DES instead of using hardware
designing DES with high security and not publicizing algorithm used by it
Correct answer: (B) encrypting plain text by a different random key for each message transmission and sending the key to the receiver using a public key system
549. While sending a signed message, a sender
sends message key using public key encryption using DES and hashed message using public key encryption
sends message using public key encryption and hashed message using DES
sends both message and hashed message using DES
sends both message and hashed message using public key encryption
Correct answer: (A) sends message key using public key encryption using DES and hashed message using public key encryption
550. One of the problems with using SET protocol is
the merchant's risk is high as he accepts encrypted credit card
the credit card company should check digital signature
the bank has to keep a database of the public keys of all customers
the bank has to keep a database of digital signatures of all customers
Correct answer: (C) the bank has to keep a database of the public keys of all customers