MCQOPTIONS
 Saved Bookmarks
				This section includes 629 Mcqs, each offering curated multiple-choice questions to sharpen your Commerce knowledge and support exam preparation. Choose a topic below to get started.
| 1. | 
                                    During E‐commerce transaction we should ensure ___________. | 
                            
| A. | ntegrity | 
| B. | ecurity | 
| C. | onfidentiality | 
| D. | ll the above | 
| Answer» E. | |
| 2. | 
                                    The study of encryption is called ___________. | 
                            
| A. | ecryption | 
| B. | ryptography | 
| C. | irewall | 
| D. | ll the above | 
| Answer» C. irewall | |
| 3. | 
                                    Which will harm computer resources | 
                            
| A. | orm | 
| B. | irus | 
| C. | rojan horse | 
| D. | ll the above | 
| Answer» E. | |
| 4. | 
                                    Which one is not layer of E‐commerce infrastructure? | 
                            
| A. | hysical layer | 
| B. | roduct layer | 
| C. | ervice layer | 
| D. | one | 
| Answer» E. | |
| 5. | 
                                    What is an arrangement made between e‐commerce sites that direct users from one site to the other? | 
                            
| A. | pam | 
| B. | iral marketing | 
| C. | ffiliate programs | 
| D. | one of the above | 
| Answer» D. one of the above | |
| 6. | 
                                    Which one is not an online payment mode? | 
                            
| A. | ash on delivery | 
| B. | ebit card | 
| C. | redit card | 
| D. | ‐cheque | 
| Answer» B. ebit card | |
| 7. | 
                                    Which one is an offline payment mode? | 
                            
| A. | ash on delivery | 
| B. | ash before delivery | 
| C. | redit card | 
| D. | oth a and b | 
| Answer» E. | |
| 8. | 
                                    Which one is not an offline payment mode? | 
                            
| A. | ash on delivery | 
| B. | ash before delivery | 
| C. | emand drafts | 
| D. | ‐cheque | 
| Answer» E. | |
| 9. | 
                                    Which one is threat for E‐commerce? | 
                            
| A. | rojan horse | 
| B. | irewall | 
| C. | ncryption | 
| D. | one | 
| Answer» B. irewall | |
| 10. | 
                                    Public key cryptography is also known as _________ cryptography. | 
                            
| A. | rivate key | 
| B. | ymmetric | 
| C. | symmetric | 
| D. | one | 
| Answer» D. one | |
| 11. | 
                                    Private Key cryptography is also known as __________ cryptography. | 
                            
| A. | ublic key | 
| B. | ymmetric | 
| C. | symmetric | 
| D. | one | 
| Answer» C. symmetric | |
| 12. | 
                                    Which one is not a threat for E‐commerce? | 
                            
| A. | rojan horse | 
| B. | iruses | 
| C. | orm | 
| D. | one | 
| Answer» E. | |
| 13. | 
                                    which one is not an E‐payment method used in India? | 
                            
| A. | ebit card | 
| B. | redit card | 
| C. | ‐cheque | 
| D. | one | 
| Answer» E. | |
| 14. | 
                                    The basic elements of website is. | 
                            
| A. | ome page | 
| B. | eb pages | 
| C. | inks and banners | 
| D. | ll the above | 
| Answer» E. | |
| 15. | 
                                    Which one is a physical threat? | 
                            
| A. | hishing | 
| B. | torm | 
| C. | arthquake | 
| D. | ll the above | 
| Answer» E. | |
| 16. | 
                                    Which one is not a physical threat? | 
                            
| A. | acking | 
| B. | torm | 
| C. | hishing | 
| D. | one of the above | 
| Answer» B. torm | |
| 17. | 
                                    Which one is not an encryption technique? | 
                            
| A. | SA | 
| B. | ES | 
| C. | ES | 
| D. | TP | 
| Answer» E. | |
| 18. | 
                                    Which one is a client level threat? | 
                            
| A. | alicious code | 
| B. | iruses | 
| C. | ctive contents | 
| D. | ll the above | 
| Answer» E. | |
| 19. | 
                                    __________ is backbone of all E‐payments in E‐commerce. | 
                            
| A. | FT | 
| B. | PS | 
| C. | ayPal | 
| D. | one of these | 
| Answer» C. ayPal | |
| 20. | 
                                    E‐Banking is also known as. | 
                            
| A. | TMs | 
| B. | et banking | 
| C. | raditional banking | 
| D. | one of these | 
| Answer» C. raditional banking | |
| 21. | 
                                    Which one is communication channel security protocol? | 
                            
| A. | SL | 
| B. | ‐HTTP | 
| C. | ET | 
| D. | LL OF THE ABOVE | 
| Answer» E. | |
| 22. | 
                                    Which one is communication channel threat? | 
                            
| A. | niffer programs | 
| B. | yber vandalism | 
| C. | ntegrity threats | 
| D. | ll of the above | 
| Answer» E. | |
| 23. | 
                                    Secret key is used for. | 
                            
| A. | ublic key cryptography | 
| B. | rivate key cryptography | 
| C. | symmetric key cryptography | 
| D. | one of these | 
| Answer» C. symmetric key cryptography | |
| 24. | 
                                    Which e‐government arena is being used when governmental agencies send out and accept bids for work? | 
                            
| A. | 2G | 
| B. | 2B | 
| C. | 2C | 
| D. | 2G | 
| Answer» C. 2C | |
| 25. | 
                                    What is A stands in CIA of smart card? | 
                            
| A. | uditing | 
| B. | uthenticity | 
| C. | uthorized | 
| D. | one of the above | 
| Answer» C. uthorized | |
| 26. | 
                                    What is I stands in CIA of smart card? | 
                            
| A. | nternational | 
| B. | ntegrity | 
| C. | dentity | 
| D. | one of the above | 
| Answer» C. dentity | |
| 27. | 
                                    Which is not a feature of eCommerce? | 
                            
| A. | CM | 
| B. | DI | 
| C. | WW | 
| D. | PR | 
| Answer» E. | |
| 28. | 
                                    ‐‐‐‐‐‐‐‐‐ card is read only mode. | 
                            
| A. | ontact smart card | 
| B. | ontactless smart card | 
| C. | roximity smart card | 
| D. | oth B and C | 
| Answer» D. oth B and C | |
| 29. | 
                                    Which one is not a encryption technique? | 
                            
| A. | SA | 
| B. | ES | 
| C. | ES | 
| D. | ONE OF THE ABOVE | 
| Answer» E. | |
| 30. | 
                                    ‐‐‐‐‐‐‐‐‐ is an act that poses danger to computer assets. | 
                            
| A. | hreat | 
| B. | anger | 
| C. | rror | 
| D. | one of the above | 
| Answer» B. anger | |
| 31. | 
                                    Which is used to identify mobile money? | 
                            
| A. | CID | 
| B. | MID | 
| C. | SID | 
| D. | ONE OF THE ABOVE | 
| Answer» C. SID | |
| 32. | 
                                    Which one is the third party payment providers who offer digital wallets for E‐merchants? | 
                            
| A. | xicash | 
| B. | ayMate | 
| C. | ayPass | 
| D. | ll the above | 
| Answer» E. | |
| 33. | 
                                    The two main types of Internet-based B2B commerce are_________. | 
                            
| A. | et marketplaces and private industrial networks | 
| B. | DI and collaborative commerce | 
| C. | et marketplaces and collaborative commerce | 
| D. | DI and private industrial networks | 
| Answer» E. | |
| 34. | 
                                    What is the unauthorized use, duplication, distribution or sale of copyrighted software? | 
                            
| A. | air Use Doctrine | 
| B. | irated software | 
| C. | ounterfeit software | 
| D. | rivacy | 
| Answer» C. ounterfeit software | |
| 35. | 
                                    The foundation for contemporary supply chain management systems includes all of the following except _________. | 
                            
| A. | upply chain simplification | 
| B. | ontinuous inventory replenishment | 
| C. | RP systems | 
| D. | 2B electronic storefronts | 
| Answer» E. | |
| 36. | 
                                    The viruses spreads through __________. | 
                            
| A. | ails | 
| B. | en drives and cds | 
| C. | ebsites | 
| D. | ll the above | 
| Answer» E. | |
| 37. | 
                                    The virus that are attached with vb and java files are called. | 
                            
| A. | acro | 
| B. | rojan horse | 
| C. | cript virus | 
| D. | one of the above | 
| Answer» D. one of the above | |
| 38. | 
                                    The virus that are commonly found in word documents are called __________. | 
                            
| A. | acro | 
| B. | rojan horse | 
| C. | cript virus | 
| D. | one of the above | 
| Answer» B. rojan horse | |
| 39. | 
                                    What is the name of the new anti‐Spam bill? | 
                            
| A. | o‐Spam | 
| B. | AN‐Spam | 
| C. | pam‐Away | 
| D. | top Spam | 
| Answer» C. pam‐Away | |
| 40. | 
                                    Goods directly involved in the production process are known as _________. | 
                            
| A. | RO goods | 
| B. | rocured goods | 
| C. | ndirect goods | 
| D. | irect goods | 
| Answer» E. | |
| 41. | 
                                    Unsolicited e‐mail is called what? | 
                            
| A. | unk mail | 
| B. | pam | 
| C. | xtra mail | 
| D. | one of the above | 
| Answer» C. xtra mail | |
| 42. | 
                                    The smart card which use antenna for reading and writing data. | 
                            
| A. | ontact smart card | 
| B. | ontactless smart card | 
| C. | roximity smart card | 
| D. | oth B and C | 
| Answer» E. | |
| 43. | 
                                    The presence of ‐‐‐‐‐‐‐‐‐‐‐ make the smart card smart. | 
                            
| A. | emory | 
| B. | icrochip | 
| C. | ‐cash | 
| D. | one of the above | 
| Answer» C. ‐cash | |
| 44. | 
                                    Which one is the component of cybercash payment system? | 
                            
| A. | C user software | 
| B. | C merachant software | 
| C. | C Server Software | 
| D. | ll of the above | 
| Answer» E. | |
| 45. | 
                                    E‐cheques are ________ | 
                            
| A. | repaid | 
| B. | ostpaid | 
| C. | oth prepaid and postpaid | 
| D. | one of these | 
| Answer» B. ostpaid | |
| 46. | 
                                    The communication standard for sharing business documents and settlement information that emerged in the 1970s is called__________. | 
                            
| A. | CD | 
| B. | DI | 
| C. | DE | 
| D. | CB | 
| Answer» C. DE | |
| 47. | 
                                    Cyber slacking consists of what activities? | 
                            
| A. | isiting “inappropriate” web sites | 
| B. | isiting news sites | 
| C. | hatting online with others about non‐work topics | 
| D. | ll of the above | 
| Answer» E. | |
| 48. | 
                                    An auction that has multiple winners that all pay the same price is an example of________. | 
                            
| A. | niform pricing | 
| B. | iscriminatory pricing | 
| C. | id rigging | 
| D. | rice matching | 
| Answer» B. iscriminatory pricing | |
| 49. | 
                                    A technique used to gain personal information for the purpose of identity theft, often by e‐mail, is called? | 
                            
| A. | hishing | 
| B. | arding | 
| C. | rand spoofing | 
| D. | ll of the above | 
| Answer» E. | |
| 50. | 
                                    Which of the following portal revenue models involves charging for premium content? | 
                            
| A. | SP services | 
| B. | eneral advertising | 
| C. | ubscription fees | 
| D. | enancy deals | 
| Answer» D. enancy deals | |