0% found this document useful (0 votes)
173 views2 pages

Bsa201 CH12 Quiz

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 2

QUIZ #12: ELECTRONIC COMMERCE SYSTEMS

1. One of the functions that protocols perform is the promotion of compatibility among
network devices.
a. True
b. False
2. Theft of passwords is an example of Intranet risks under “risks to consumers”.
a. True
b. False
3. This is a kind of security protocol that gives security of transactions in the Web.
a. Private Enhanced Mail
b. Privacy Enhanced Messaging
c. Private Communications Technology
d. Privacy Communications Technology
4. Which of the following are not used by businesses and organizations in improving their
security, assurance, and trust?
I. Digital Authentication
II. Encryption
III. Firewalls
IV. Seals of Assurance
V. Network Topologies
VI. Value-added Network
a. I, II, III, and IV
b. I, II, III, IV, and V
c. V and VI
d. None of the above
5. An electronic commerce model where online transactions only involve the manufacturers,
wholesalers, retailers etc.
a. Business to Business
b. Business to Consumer
c. Consumer to Consumer
d. Consumer to Business
6. Hyper Text Transport Protocol (HTTP) has the control to Web browser that can access in
the Web. The Hyper Text Transport Protocol–New Generation (HTTP-NG) is the more
advanced version of the HTTP protocol that keeps the simplicity of the HTTP highlighting
various features like security & authentication.
a. True
b. False
7. A type of attack wherein a hacker sends ping which consequently triggers an echo request
message to the host computer that listens for a response message called echo reply.
a. SYN Flood Attack
b. Smurf Attack
c. Caesar Cipher
d. Distributed DDoS
8. It is a network security device that tracks incoming and outgoing network traffic and allows
or blocks data packets based on a set of security rules.
a. Firewall
b. Antivirus
c. Advanced encryption standard
d. Digital envelope
9. The use of e-mail for a firewall system is under application-level firewall
a. True
b. False
c. Maybe
d. I don’t know
10. Electronic audit trails need to be developed that will enable the auditor to review
transactions at frequent intervals or as they occur.
a. False
b. Maybe
c. True
d. I have no idea
11. This can be applied to any topology.
a. Hierarchy Topology
b. Ring Topology
c. Bus Topology
d. Client-Server Topology
12. The structure is applicable to firms with many organizational levels and must be controlled
from a central location.
a. Hierarchy Topology
b. Ring Topology
c. Bus Topology
d. Client-Server Topology
13. It is simple, reliable, and generally less costly to install than the ring topology.
a. Hierarchy Topology
b. Ring Topology
c. Bus Topology
d. Client-Server Topology
14. This is a peer-to-peer arrangement in which all nodes are of equal status.
a. Hierarchy Topology
b. Ring Topology
c. Bus Topology
d. Client-Server Topology
15. Which of the following is not a feature of Electronic Data Interchange (EDI)?
a. EDI is an inter-organization endeavor.
b. The information systems of the trading partners automatically process the transaction.
c. Transaction information is transmitted in a standardized format.
d. EDI reduces or even eliminates the need for data entry.

You might also like