System Analysis and Design

541. For carrying out B2B e-Commerce the following infrastructure is essential:

  1. World Wide Web
  2. Corporate network
  3. Electronic Data Interchange standards
  4. Secure Payment Services
  5. Secure electronic communication link connecting businesses
  1. i, ii, iii
  2. ii, iii, iv
  3. ii, iii, iv, v
  4. i, ii, iii, iv, v
Correct answer: (C)
ii, iii, iv, v

542. Advantages of B2C commerce to customers are

  1. wide variety of goods can be accessed and comparative prices can be found
  2. shopping can be done at any time
  3. privacy of transactions can be guaranteed
  4. security of transactions can be guaranteed
  1. i and ii
  2. ii and iii
  3. iii and iv
  4. i and iv
Correct answer: (A)
i and ii

543. EDI use

  1. requires an extranet
  2. requires value added network
  3. can be done on internet
  4. requires a corporate intranet
Correct answer: (C)
can be done on internet

544. A firewall is a

  1. wall built to prevent fires from damaging a corporate intranet
  2. security device deployed at the boundary of a company to prevent unauthorized physical access
  3. security device deployed at the boundary of a corporate intranet to protect it from unauthorized access
  4. device to prevent all accesses from the internet to the corporate intranet
Correct answer: (C)
security device deployed at the boundary of a corporate intranet to protect it from unauthorized access

545. A hardened firewall host on an intranet

  1. has a proxy application gateway program running on it
  2. allows specified internet users to access specified services in the intranet
  3. initiates all internet activities requested by clients and monitors them
  4. prevents outsiders from accessing IP addresses within the intranet
  1. i, ii
  2. i, ii, iii
  3. i, ii, iii, iv
  4. ii, iii, iv
Correct answer: (C)
i, ii, iii, iv

546. By applying permutation (31254) and substitution by 5 characters away from current character (A → F , B → G etc..) the following string ABRACADABRA becomes

  1. FGWCAAADRBF
  2. RABCAAADRBF
  3. WFGHFFFIWGF
  4. None of the above
Correct answer: (C)
WFGHFFFIWGF

547. Triple DES

  1. Cannot be broken in reasonable time using presently available computers.
  2. Can be broken only if the algorithm is known using even slow computer.
  3. Can be broken with presently available high performance computers.
  4. It is impossible to break ever.
Correct answer: (A)
Cannot be broken in reasonable time using presently available computers.

548. Message can be sent more securely using DES by

  1. encrypting plain text by a different randomly selected key for each transmission
  2. encrypting plain text by a different random key for each message transmission and sending the key to the receiver using a public key system
  3. using an algorithm to implement DES instead of using hardware
  4. designing DES with high security and not publicizing algorithm used by it
Correct answer: (B)
encrypting plain text by a different random key for each message transmission and sending the key to the receiver using a public key system

549. While sending a signed message, a sender

  1. sends message key using public key encryption using DES and hashed message using public key encryption
  2. sends message using public key encryption and hashed message using DES
  3. sends both message and hashed message using DES
  4. sends both message and hashed message using public key encryption
Correct answer: (A)
sends message key using public key encryption using DES and hashed message using public key encryption

550. One of the problems with using SET protocol is

  1. the merchant's risk is high as he accepts encrypted credit card
  2. the credit card company should check digital signature
  3. the bank has to keep a database of the public keys of all customers
  4. the bank has to keep a database of digital signatures of all customers
Correct answer: (C)
the bank has to keep a database of the public keys of all customers
Page 55 of 61