System Analysis and Design

561. In the NetBill's protocol for small payments for services available in the internet.

  1. the customer is charged only when the information is delivered
  2. the vendor is guaranteed payment when information is delivered
  3. the customer must have a certified credit card
  4. the customer must have a valid public key
  1. i, ii
  2. i, ii, iii
  3. i, ii, iii, iv
  4. i, ii, iv
Correct answer: (D)
i, ii, iv

562. Advantages of B2C commerce are

  1. Business gets a wide reach to customers
  2. Payment for services easy
  3. Shop can be open 24 hours a day seven days a week
  4. Privacy of transaction always maintained
  1. i and ii
  2. ii and iii
  3. i and iii
  4. iii and iv
Correct answer: (C)
i and iii

563. ANSI X.12 is a standard developed by

  1. American National Standard Institute
  2. International Standard Institute
  3. European Common Market
  4. United Nations Economic Commission for Europe
Correct answer: (A)
American National Standard Institute

564. Firewall as part of a router program

  1. filters only packets coming from internet
  2. filters only packets going to internet
  3. filters packets travelling from and to the intranet from the internet
  4. ensures rapid traffic of packets for speedy e-Commerce
Correct answer: (C)
filters packets travelling from and to the intranet from the internet

565. Encryption is required to

  1. protect business information from eavesdropping when it is transmitted on internet
  2. efficiently use the bandwidth available in PSTN
  3. to protect information stored in companies' databases from retrieval
  4. to preserve secrecy of information stored in databases if an unauthorized person retrieves it
  1. i and ii
  2. ii and iii
  3. iii and iv
  4. i and iv
Correct answer: (D)
i and iv

566. DES using 56 bit keys

  1. Cannot be broken in reasonable time using presently available computers
  2. Can be broken only if the algorithm is known using even slow computers.
  3. Can be broken with presently available high performance computers.
  4. It is impossible to break ever.
Correct answer: (C)
Can be broken with presently available high performance computers.

567. In public key encryption if A wants to send an encrypted message to B

  1. A encrypts message using his private key
  2. A encrypts message using B's private key
  3. A encrypts message using B's public key
  4. A encrypts message using his public key
Correct answer: (C)
A encrypts message using B's public key

568. A hashing function for digital signature

  1. must give a hashed message which is shorter than the original message
  2. must be hardware implementable
  3. two different messages should not give the same hashed message
  4. is not essential for implementing digital signature
  1. i and ii
  2. ii and iii
  3. i and iii
  4. iii and iv
Correct answer: (C)
i and iii

569. The bank has to have the public keys of all customers in SET protocol as it has to

  1. check the digital signature of customers
  2. communicate with merchants
  3. communicate with merchants credit card company
  4. certify their keys
Correct answer: (A)
check the digital signature of customers

570. B2C commerce

  1. includes services such as legal advice
  2. means only shopping for physical goods
  3. means only customers should approach customers to sell
  4. means only customers should approach business to buy
Correct answer: (A)
includes services such as legal advice
Page 57 of 61