CareerCadets.com is a community driven website, you can freely participate, invite friends and add content.
Categories: Management
Answer 3) a Denial of Service (DoS) attack Yes! You can do Online MCQ practice of E-Business question set and give online exam quiz test for E-Business, so you can check your knowledge. You can get MCQ Study and Exam link from home page.
Share
Question:Directors may not be disqualified for Option A.continuing to trade when the company is insolventOption…
Question:Which of the following is not one the underlying principles of the corporate governance Combined…
Question:The view that business exists at society's pleasure and businesses should meet public expectations of…
Question:An organisation's obligation to act to protect and improve society's welfare as well asits own…
Question:The hand-of-government refers to the Option A.ability of the government to interfere in business negotiationsOption…
Question:Successful global initiatives addressing standards for business must begin and end with: Option A.the role…
Rahul Asked :
A. phishing B. pharming C. a Denial of Service (DoS) attack D. spoofing
Dapzoi Answer: Option C Explanation: When hackers flood a Web site with useless traffic to overwhelm the network, it is called a Denial of Service (DoS) attack. A denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. Submit Your Comment
Which of the following is a characteristic of a firewall?
When you purchase copyrighted software, what actually are you paying for? When hackers flood a Web site with useless traffic to overwhelm the network it is called .... a) phishing b) pharming c) a Denial of Service (DoS) attack d) spoofing Ans. c) a Denial of Service (DoS) attack Redundant navigation refers to ..... a) pages that work, load quickly, and point the customer toward your product offerings b) simple, fool-proof navigation c) a site working with the most popular browsers d) alternative navigation to the same content Ans. d) alternative navigation to the same content The most widely used encryption standard is ..... a) Advanced Encryption Standard (AES) b) Data Encryption Standard (DES) c) Universal Encryption Standard (UES) d) Optimal Encryption Standard (OES) Ans. a) Advanced Encryption Standard (AES) What Web server functionality allows it verify usernames and passwords and process certificates and encryption information? a) Processing of HTTP requests b) File Transfer Protocol c) Data capture d) Security services Ans. d) Security services When hackers flood a Web site with useless traffic to overwhelm the network it is called .... a) phishing b) pharming c) a Denial of Service (DoS) attack d) spoofing Ans. c) a Denial of Service (DoS) attack Which of the following is not a widely used midrange or high-end e-commerce suite ? a) Microsoft Commerce Server b) WebTrends Marketing Lab2 c) IBM WebSphere Commerce d) Broadvision Commerce Ans. a) Microsoft Commerce Server Malicious hackers who act with the intention of causing harm are .... a) White hats b) Black hats c) Grey hats. d) Brown hats Ans. b) Black hats The underlying computing equipment that the system uses to achieve its e-commerce functionality is called a ... a) hardware platform b) content platform c) transaction platform d) scalability platform Ans. a) hardware platform The set of standards for communication between a browser and a program running on a server that allows for interaction between the user and the server is known as ... a) Active Server Pages (ASP) b) Java Server Pages (JSP) c) Common Gateway Interface (CGI) d) VBScript Ans. c) Common Gateway Interface (CGI) A security plan begins with a(n) is ..... a) security policy b) risk assessment c) implementation plan d) security organization Ans. b) risk assessment E-commerce merchant server software includes all of the following except ..... a) online e-mail b) online catalog c) online shopping cart d) online credit card processing. Ans. a) online e-mail Firewalls perform all of the following functions except .... a) Forbids communications from untrustworthy sources b) Allows communications from trustworthy sources c) Eliminates viruses and other malicious attacks d) Filters traffic based on packet attributes Ans. c) Eliminates viruses and other malicious attacks In the e-commerce security environment which of the following constitutes the inner-most layer ? a) people b) data c) technology solutions d) organizational policies and procedures. Ans. b) data The dominant Web server software is .... a) Zeus b) Apache c) Microsoft IIS d) Google Ans. b) Apache A worm is designed to spread ..... a) from computer to computer b) from file to file on a computer c) from Web site to Web site d) from Web site to computer Ans. a) from computer to computer The most common form of securing channels is through ..... a) S-HTTP b) VPNs c) SSL d) PPTP Ans. c) SSL The most common type of Internet crime according to the IC3 is .. a) Credit card fraud. b) Check fraud c) Non-delivery d) Auction fraud Ans. d) Auction fraud All of the following are major categories of computer viruses except .... a) Macro viruses b) File-infecting viruses c) Script viruses d) Trojan viruses Ans. d) Trojan viruses The ability to change the product to better fit the needs of the customer is called ..... a) customization b) personalization c) privacy d) accessibility Ans. a) customization All of the following are tools for optimizing a Web site's location in search engine listings except ..... a) keywords and page titles b) identifying market niches c) buying ads d) benchmarking Ans. d) benchmarking Which of the following is not a dimension of e-commerce security provided by encryption ? a) availability b) message integrity c) nonrepudiation d) confidentiality Ans. a) availability |