System Analysis and Design

581. In cheque payment protocol, the purchase order form is signed by purchaser using

  1. his public key
  2. his private key
  3. his private key using his signature hardware
  4. various public keys
Correct answer: (C)
his private key using his signature hardware

582. EDIFACT is a standard

  1. for representing business forms used in e-Commerce
  2. for e-mail transaction for e-Commerce
  3. for ftp in e-Commerce
  4. protocol used in e-Commerce
Correct answer: (A)
for representing business forms used in e-Commerce

583. For secure EDI transmission on internet/p>

  1. MIME is used
  2. S/MIME is used
  3. PGP is used
  4. TCP/IP is used
Correct answer: (B)
S/MIME is used

584. By symmetric key encryption we mean

  1. one private key is used for both encryption and decryption
  2. private and public key used are symmetric
  3. only public keys are used for encryption
  4. only symmetric key is used for encryption
Correct answer: (A)
one private key is used for both encryption and decryption

585. Public key system is useful because

  1. it uses two keys
  2. there is no key distribution problem as public key can be kept in a commonly accessible database
  3. private key can be kept secret
  4. it is a symmetric key system
Correct answer: (B)
there is no key distribution problem as public key can be kept in a commonly accessible database

586. The responsibility of a certification authority for digital signature is to authenticate the

  1. hash function used
  2. private keys of subscribers
  3. public keys of subscribers
  4. key used in DES
Correct answer: (C)
public keys of subscribers

587. The acronym DES stands for

  1. Digital Evaluation System
  2. Digital Encryption Standard
  3. Digital Encryption System
  4. Double Encryption Standard
Correct answer: (B)
Digital Encryption Standard

588. In public key encryption system if A encrypts a message using his private key and sends it to B

  1. if B knows it is from A he can decrypt it using A's public key
  2. Even if B knows who sent the message it cannot be decrypted
  3. It cannot be decrypted at all as no one knows A's private key
  4. A should send his public key with the message
Correct answer: (A)
if B knows it is from A he can decrypt it using A's public key

589. Certification of Digital signature by an independent authority is needed because

  1. it is safe
  2. it gives confidence to a business
  3. the authority checks and assures customers that the public key indeed belongs to the business which claims its ownership
  4. private key claimed by a sender may not be actually his
Correct answer: (C)
the authority checks and assures customers that the public key indeed belongs to the business which claims its ownership

590. In SET protocol a customer encrypts credit card number using

  1. his private key
  2. bank's public key
  3. bank's private key
  4. merchant's public key
Correct answer: (B)
bank's public key
Page 59 of 61