System Analysis and Design

551. In Electronic cash payment

  1. a debit card payment system is used
  2. a customer buys several electronic coins which are digitally signed by coinissuing bank
  3. a credit card payment system is used
  4. RSA cryptography is used in the transactions
Correct answer: (B)
a customer buys several electronic coins which are digitally signed by coinissuing bank

552. For carrying out B2C e-Commerce the following infrastructure is essential:

  1. World Wide Web
  2. Corporate network
  3. Electronic Data Interchange standards
  4. Secure Payment Services
  5. Secure electronic communication link connecting businesses
  1. i, iv
  2. i, iii, iv
  3. ii, iii
  4. i, ii, iii, iv
Correct answer: (A)
i, iv

553. Electronic Data Interchange is necessary in

  1. B2C e-Commerce
  2. C2C e-Commerce
  3. B2B e-Commerce
  4. Commerce using internet
Correct answer: (C)
B2B e-Commerce

554. EDIFACT standard was developed by

  1. American National Standard Institute
  2. International Standard Institute
  3. European Common Market
  4. United Nations Economic Commission for Europe
Correct answer: (D)
United Nations Economic Commission for Europe

555. A firewall may be implemented in

  1. routers which connect intranet to internet
  2. bridges used in an intranet
  3. expensive modem
  4. user's application programs
Correct answer: (A)
routers which connect intranet to internet

556. A hardened firewall host on an Intranet is

  1. a software which runs in any of the computers in the intranet
  2. a software which runs on a special reserved computer on the intranet
  3. a stripped down computer connected to the intranet
  4. a mainframe connected to the intranet to ensure security
Correct answer: (B)
a software which runs on a special reserved computer on the intranet

557. DES

  1. is a symmetric key encryption method
  2. guarantees absolute security
  3. is implementable as hardware VLSI chip
  4. is a public key encryption method
  1. i and ii
  2. ii and iii
  3. i and iii
  4. iii and iv
Correct answer: (C)
i and iii

558. Public key encryption method is a system

  1. which uses a set of public keys one for each participant in e-Commerce
  2. in which each person who wants to communicate has two keys; a private key known to him only and a public key which is publicized to enable others to send message to him
  3. which uses the RSA coding system
  4. which is a standard for use in e-Commerce
Correct answer: (B)
in which each person who wants to communicate has two keys; a private key known to him only and a public key which is publicized to enable others to send message to him

559. A digital signature is

  1. a bit string giving identity of a correspondent
  2. a unique identification of a sender
  3. an authentication of an electronic record by tying it uniquely to a key only a sender knows
  4. an encrypted signature of a sender
Correct answer: (C)
an authentication of an electronic record by tying it uniquely to a key only a sender knows

560. The Secure Electronic Transaction protocol is used for

  1. credit card payment
  2. cheque payment
  3. electronic cash payments
  4. payment of small amounts for internet services
Correct answer: (A)
credit card payment
Page 56 of 61