Anda di halaman 1dari 14

Academy Of Technology, Adisaptagram

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING


E-Commerce (IT703A)

Question Bank

Doc No.: AOT/IT/7th Sem/SGH/IT703A Page 1 of 13

Short question (1 mark)


SET-1 1. While creating a digital envelope, we encrypt the_____ with the ______ . (a) sender's private key, one-time session key (b) receiver's public key, one-time session key (c) one-time session key, sender's public key (d) one-time session key, receiver's public key 2. Symmetric key cryptography is _______ asymmetric key cryptography. (a) always slower than (b) of the same speed as (c) faster than (d) usually slower than 3. Conversion of plain text into cipher text is called as (a) encryption (b) decryption (c) cryptography 4. Conversion of cipher text into plain text is called as (a) encryption (b) decryption (c) cryptography 5. DES encrypts blocks of ________ bits. (a) 32 (b) 56 (c) 64 (d) 128 6. There are _________ rounds in DES. (a) 8 (b) 10 c) 14 (d) 16 7. _________is based on the IDEA algorithm. (a) S/MIME (b) PGP (c) SET (d) SSL 8. A _______is used to verify the integrity of a message. (a) message digest (b) decryption algorithm (c) digital envelope none of the above (d) (d) cryptanalyst (d) cryptanalyst.

9. When two different message digests have the same value, it is called as (a) attack (b) collision (c) hash (d) none of the above 10. The final solution to the problem of key exchange is the use of_____ (a) passport (b) digital envelope (c) digital certificate (d) message digest 11. To solve the problem of trust, the ______is used. (a) public key (b) self-signed certificate (c) private key (d) digital signature

Academy Of Technology, Adisaptagram


DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING
E-Commerce (IT703A)

Question Bank

Doc No.: AOT/IT/7th Sem/SGH/IT703A Page 2 of 13

12. SSL layer is located between_______ (a) transport layer, network layer (b) application layer, transport layer (c) data link layer, physical layer (d) network layer, data link layer 13. IPSec provides security at the _______________ (a) application (b)transport (c) network

(d) session

14. If the sender encrypts the message with her private key, it achieves the purpose of (a) confidentiality (b) confidentiality and authentication (c) confidentiality but not authentication (d) authentication 15. In asymmetric key cryptography,_______ keys are required per communicating (a) 2 (b) 3 (c) 4 (d) 5 16. The private key _______________________ (a) must be distributed (b) must be shared with everyone (c) must remain secret with an individual (d) none of the above 17. If A and B want to communicate securely with each other, B must not know (a) Xs private key (b) Xs public key (c) B's private key (d) B's private key 18. _________are very crucial for the success of asymmetric key cryptography. (a) Integers (b) Prime numbers (c) Negative numbers (d) Fractions 19. The main purpose of SET is related to a) Secure communication between browser. b) Digital signatures and server c) Message digests. d) Secure credit card payments on the internet. 20. SET uses the concept of a) Double signature c) Multiple signature b) Dual signature d) Single signature.

21. Electronic money is made up of---------- in physical form a) Floppy disks b) computer files

Academy Of Technology, Adisaptagram


DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING
E-Commerce (IT703A)

Question Bank
d) credit card

Doc No.: AOT/IT/7th Sem/SGH/IT703A Page 3 of 13

c) hard disks 22. Supply Chain Management a) Supplier Management b) Inventory Management c) Distribution Management d) HR Management

23. Pretty Good Privacy(PGP) is an implementation of public-key cryptography based on a) RSA b) DES c)DSA d) RPC 24. Kerberos is a popular a) 1st party protocol

b) 2nd party protocol

c)3rd party protocol d) 4th party protocol 25. SGML stands for a) Standard Global Markup Language b) Standard Generalized Global Markup Language c) Structured Global Markup Language d) Structured Generalized Global Markup Language 26. Which is not an e-business model? a) B2B b) C2B c) G2G d) C2C 27. Which one is not a security threat to the e-commerce websites? a) Spoofing b) Sniffing b) Spooling d) Hacking

28. Which one is not a security tool available to protect e-commerce websites from external or internal threats? a) Buffering b) Network Security Protocol c) Virtual Private Network d) Tunneling 29. Data Encryption Standard (DES) uses

Academy Of Technology, Adisaptagram


DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING
E-Commerce (IT703A)

Question Bank

Doc No.: AOT/IT/7th Sem/SGH/IT703A Page 4 of 13

a) 32-bit encryption key b) 56-bit encryption key c) 64-bit encryption key d) 128-bit encryption key 30. S-HTTP is a) Secure Hypertext Transfer Protocol b) Simple Hypertext Transfer Protocol c) Simultaneous Hypertext Transfer Protocol d) Server Hypertext Transfer Protocol 31. Which is not a B2C site? a) amazon.com b) autobytel.com c) eDiest.com d) Priceline.com. 32. E-Commerce is not suitable for a)sale/purchase of expensive jwellery & antiques b) sale/purchase of mobile phones c) sale/purchase of branded clothes d)online job searching. 33. Which is not an ERP Software package? a) SAP AG b) People Soft c) BAAN d) All of these are ERP 34. WMS stands for a)Wireless Mobile Standards b) Warehouse Management System c) Wide Messaging Services d) none of these 35. SHA is more secured than MD5 by a factor of a)233 b) 210 2 c) 10 d) 232 36. e-Bay is an example of a/an -------------e-commerce

Academy Of Technology, Adisaptagram


DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING
E-Commerce (IT703A)

Question Bank

Doc No.: AOT/IT/7th Sem/SGH/IT703A Page 5 of 13

a) B2C b)EDI c)C2C d)B2B 37. Which one is not a force fuelling e-commerce? a) Economic force b) Technology & digital convergence c) Marketing & customer interaction force 38. TCP/IP has ------------ layers a) 7 b) 6 b) 5 d) 4

39. An example of information to support operational management is a) Business Intelligence System b) Electronic Document Management System c) Spreadsheet model of income projections d) None of these. 40. The IT Act was passed by the Indian Parliament in the year a) 1999 b) 2000 b) 2001 d) 2002

41. There are --------- types of Business Transction Models a) one b) two c) three d) four 42. Which one of the following is a protocol for secure messaging a) PGP b) PEM c) S/MIME d) All of these 43. iGov.com is an example of a) B2B b) B2C

Academy Of Technology, Adisaptagram


DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING
E-Commerce (IT703A)

Question Bank

Doc No.: AOT/IT/7th Sem/SGH/IT703A Page 6 of 13

c) B2G d) C2B SET-2 1. Which of the following is not an scripting language ? (A) HTML (B) XML (C) Postscript (D) Javascript 2. Which of the following is a platform free language (A) Fortran (B) (B) Assembly (C) C (D) Java 3. A digital signature is (A) scanned signature (B) signature in binary form (C) encrypting information (D) handwritten signature 4. Mechanism to protect private networks from outside attack is (A) Firewall (B) Antivirus (C) Digital signature (D) Formatting 5. A computer system that permits multiple users to run programs at same time (A) Real time system (B) Multi programming system (C) Time sharing system (D) Multi tasking system 6. A computer communication technology that provides a way to interconnect multiple computer across short distance is (A) LAN (B) MAN (C) WAN (D) Wireless network 7. Telnet is a service that runs (A) Television on net (B) Remote program (C) Cable TV network (D) Telenext 8. A device that forwards data packet from one network to another is called a

Academy Of Technology, Adisaptagram


DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING
E-Commerce (IT703A)

Question Bank

Doc No.: AOT/IT/7th Sem/SGH/IT703A Page 7 of 13

(A) Bridge (B) Switch (C) Hub (D) Gateway 9. Which of the following is the fastest media of data transfer (A) Co-axial Cable (B) Untwisted Wire (C) Telephone Lines (D) Fibre Optic 10. Tool that is used to transfer data/files among computers on the Internet (A) FTP (B) Archie (C) TCP (D) Gopher 11. HTML is a (A) Programming Language (B) Scripting Language (C) Web Browser (D) Network Protocol 12. Secret-key encryption is also known as (A) Asymmetric encryption (B) Symmetric encryption (C) Secret-encryption (D) Private encryption 13. The concept of electronic cash is to execute payment by (A) Credit Card (B) ATM Card (C) Using computers over network (D) Cheque 14. SMTP is a (A) Networking Protocol (B) Protocol used for transferring message between end user & Mail Server (C) Protocol used for smart card message interchange (D) Encryption Standard 15. Digital Signature is (A) Scanned Signature on Computer (B) Code number of the sender. (C) Public Key Encryption. (D) Software to recognize signature. 16. Telnet is a (A) Network of Telephones (B) Television Network

Academy Of Technology, Adisaptagram


DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING
E-Commerce (IT703A)

Question Bank

Doc No.: AOT/IT/7th Sem/SGH/IT703A Page 8 of 13

(C) Remote Login (D) none of these 17. The internet is (A) Network of networks (B) Web site. (C) Host (D) Server 18. An e-business that allows consumer to name their own price for products and services is following which e-business model? (A) B2B (B) B2G (C) C2C (D) C2B 19. Kerberos is an encryption-based system that uses (A) Secret key encryption (B) Public key encryption (C) Private key encryption (D) Data key encryption 20. The method(s) of payment for online consumers are (A) Electronic cash (B) Credit/debit (C) Electronic checks (D) All of the above 21. DNS is (A) The distributed hierarchical naming system (B) The vertical naming system (C) The horizontal naming system (D) The client server system 22. A firewall is (A) An established network performance reference point. (B) Software or hardware used to isolate a private network from a public network. (C) A virus that infects macros. (D) A predefined encryption key used to encrypt and decrypt data transmissions. 23. A router (A) Screens incoming information. (B) Distributes information between networks (C) Clears all viruses from a computer system (D) Is a work virus. 24. LDAP stands for (A) Light weight Data Access Protocol. (B) Light weight Directory Access Protocol. (C) Large Data Access Protocol.

Academy Of Technology, Adisaptagram


DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING
E-Commerce (IT703A)

Question Bank

Doc No.: AOT/IT/7th Sem/SGH/IT703A Page 9 of 13

(D) Large Directory Access Protocol. 25. E-Commerce is not suitable for (A) Sale/Purchase of expensive jewellery and antiques. (B) Sale/Purchase of mobile phones. (C) Sale/Purchase of branded clothes. (D) Online job searching. 26. Amazon.com comes under the following model (A) B2B (B) B2C (C) C2C (D) C2B 27. Hubs are present in the network (A) to diagnose line failures, measure and manage traffic flow and simplify re configuring of LANs. (B) to interconnect the LAN with WANs. (C) to interconnect the WANs with WANs. (D) to interconnect the WANs with LANs. 28. Firewalls operate by (A) The pre-purchase phase. (B) isolating Intranet from Extranet. (C) Screening packets to/from the Network and provide controllable filtering of network traffic. (D) None of the above. 29. The mercantile process model consists of the following pahase(s): (A) The pre-purchase phase. (B) Purchase consummation phase. (C) Post-purchase Interaction phase. (D) All of the above.

Short answer type questions (5 marks)


1. Define Symmetric and Asymmetric Cryptography. Give one example of each. 2. What is the basic principle of RSA? 3. Write a brief note on Tripple DES. 4. .Explain the key generation process in DES. 5. What is the purpose of the S-boxes in DES? 6. What is a meet-in-the-middle attack? 7. Why is the middle portion of 3DES a decryption rather than an encryption? 8. What are the properties a digital signature should have? 9. What are the five principal services provided by PGP? 10. What services are provided by IPSec? 11. What services are provided by the SSL Record Protocol?

Academy Of Technology, Adisaptagram


DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING
E-Commerce (IT703A)

Question Bank

Doc No.: AOT/IT/7th Sem/SGH/IT703A Page 10 of 13

12. What steps are involved in the SSL Record Protocol transmission? 13. How is SHTTP different from SSL? 14. Explain the concepts of key rings in PGP. 15. Discuss about the four basic principles related to the security of a massage. 16. Explain digital signature. Provide a scheme for implementing digital signature using public key cryptography. 17. What is cryptography? What is cryptanalysis? 18. Describe Diffie-Hellman symmetric key exchange algorithm. 19. Which are the key participants in SET? 20. How does SET protect payment information from the merchant? 21. Outline the broad level steps in SET. 22. What is electronic money? 23. Why is anonymous offline electronic money dangerous? Discuss the double spending problem. 24.a)What are the reasons behind the following importance of e-advertisement? b) What are the different types of web-advertising? 25.Distinguish between Symmetric & Asymmetric Cryptosystem. 26.Describe various risks in e-commerce. 27.Describe different revenue generation schemes in commercial websites. 28. Briefly describe the e-business models based on the relationship of transaction parties. 29.What is e-commerce? What are the advantages & disadvantages of e-commerce over traditional e-commerce? 30.Critically comment on internet banking. 31. What is Digital Certificate? What does it contain? 32. Describe the steps for a B2C process model with necessary diagram. 33. What is Trade Cycle? What are the activities that a trade cycle should include?

Long answer type questions (15 marks)


1. a. What do you mean by network security explain with a suitable model. b. What is Brute-force attack? Explain. c. What do you mean by asymmetric key encryption? Explain. d. What is the difference between symmetric key encryption and asymmetric key encryption? a. Describe DES in block level. b. What does each round of DES perform? c. How can the same key be reused in triple DES? a. What is key wrapping? How is it useful? b. What are the problems with exchanging of public keys?

2. 3.

Academy Of Technology, Adisaptagram


DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING
E-Commerce (IT703A)

Question Bank

Doc No.: AOT/IT/7th Sem/SGH/IT703A Page 11 of 13

c. Explain RSA algorithm. d. Symmetric key cryptography is faster than Asymmetric key cryptographyjustify. 4. a. Define Digital Signature with example. b. What is the difference between MAC and message digest? c. What is the real crux of RSA? d. What is the purpose of the S-boxes in DES? a. In the public-key system using RSA, you intercept the cipher text CT=10 sent to a user whose public key is E=5, N=35. What is the plain text PT? b .What are the roles of the public and private key? c. In an RSA system, the public key of a given user is E=31, N=3599. What is the private key of the user? a. b. c. d. a. b. c. d. What protocols comprise SSL? What is a dual signature and what is its purpose? Give examples of applications of IPSec. What services are provided by IPSec?

5.

6.

7.

Why is the SSL layer positioned between Application layer and Transport layer? Name the four key steps in the creation of a Digital certificate. How is SHTTP different from SSL? Explain the following: i) Static web page ii) Dynamic web page iii) Active web page 8. Define e-commerce? What are the benefits of using e-commerce? What do you mean by the followed types of e-commerce a) B2B b) B2C 9. Explain the use of SSL to secure the network. Explain network security. What are the types of security features used in client server types of network? 10. Explain the application of E-Commerce in the following fields a) Home banking b)Home Entertainment c) Home Shopping 11. What is on electronic payment system? What are its types and advantages? Write notes on following i) E-Cash ii) Electronic Cheques. 12. Define EDI. Explain the layered architecture of EDI. What are the applications of EDI in business?

Academy Of Technology, Adisaptagram


DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING
E-Commerce (IT703A)

Question Bank

Doc No.: AOT/IT/7th Sem/SGH/IT703A Page 12 of 13

13. a. Explain with a figure how secure sockets layer(ssl) is accommodated in TCP/IP protocol suite. b. Explain what are the three sub-protocol in SSL? Explain the position of SHTTP in TCP/IP protocol suite. c. Using RSA public key cryptography system with a=1,b=2,etc.If p=5,q=11,and d=27,find e and encrypt(cad). d. How is SSTTP different from SSL? 14. Write short notes of any three of the following. a) Kerberos b) PGP c) Applet and active-X controls d) Digital Envelope. e) Secure Electronic Transaction(SET) 15. a). How many rounds are there in DES? b). Describe a single round of DES with block diagram. c). What is Triple DES? Why is it more secure than DES? d). Authentication can be achieved using DES. Comment on it. 16. a). What is electronic money? b). What is SET? Explain with a suitable model. c). How pre-master-secret and master-secret is prepared in SSL handshake protocol? d). Describe he fields of SSL records protocol header. 17. a. Which are the key participants in SET? b. How does SET protect payment information from the merchant? c.. Outline the broad level steps in SET. 18. Describe in brief the history of E-Commerce. Explain briefly the generic framework for e-commerce. 19. Explain the role of World Wide Web in the field of e-commerce. What is nonrepudiation? How can it be achieved in designing e-cash based system? Give a suitable algorithm. 20. What are the advantages of having e-commerce over extranets? What are the concerns for growth of e-commerce in India? 21. What is electronic cash? What are the properties of electronic cash? What are the types of amart cards used in e-commerce? What are the essential components of an e-banking site? 22. What is EDI (Electronic Data Interchange)? Explain benefits and drawbacks of EDI process. Also explain different EDI components and EDI services?

Academy Of Technology, Adisaptagram


DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING
E-Commerce (IT703A)

Question Bank

Doc No.: AOT/IT/7th Sem/SGH/IT703A Page 13 of 13

23. What do you understand by E-cash? What are the properties of E-cash? What is the basic difference between the transaction made using Smart Card and E-cash? 24. Explain different security protocols used for e-commerce applications. 25. What is Supply Chain Management? What are the characteristics of Supply Chain Management in an e-commerce environment? 26. What are the two primary models of Supply Chain Management? Discuss the primary elements of these models. 27. What is Public Key Cryptography? Explain its advantages and disadvantages. What do you understand by Electronic Funds Transfer? 28. What are the risks involved in Electronic Payment Systems? What are the four types of consumer oriented applications of E-commerce? Discuss them briefly. 29. a) What are the concepts behind the internet? b) Compare e-commerce & traditional commerce. c) Saving in distribution costs. Discuss in the light of B2C model. 30. a) What is EDI? b) Discuss the brief on the layered architecture of EDI. c) What is the importance of EDI in e-commerce? 31. a) Describe the RSA & DES algorithm for ensuring security. b) Briefly describe the SET protocol. 32. a) Give a brief note on the technology requirement for a B2C e-commerce application. b) Write a brief note on legal issues regarding trade mark & domain name. c) Discuss e-market. 33. a) What is EDI? Explain EDI with trade cycle. b) What is UN/EDIFACT? c) Explain EAN coding system for EDI message. d)Describe the impact of EDI on the supply chain management of a manufacturing plant. e) Discuss B2B2C model & C2B2C model. Give examples. 34. a) With the help of diagram briefly explain how the public key cryptography works. Explain with a diagram how the addition of a digital signature changes the process of public key cryptography. b) Distinguish between SSL & SET protocol. c) What are the digital signatures? How they differ from digital certificate? d) What are the typical content of digital certificate? What are the common causes for revoking a digital certificate? e) Explain the ways & means of protecting online website operations from hackers. 35. a) What are the digital signatures & How they differ from digital certificate? b) What are the advantages & disadvantages of E-commerce & E-business? c) What is the difference between E-commerce & E-business?

Academy Of Technology, Adisaptagram


DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING
E-Commerce (IT703A)

Question Bank

Doc No.: AOT/IT/7th Sem/SGH/IT703A Page 14 of 13

d) Discuss about the Business Models in e-commerce. 36. a) What is digital cash oe e-cash? Explain the mechanism involved in E-cash. b) What is SET protocol? What are the steps required to purchase an item using SET protocol? Give necessary diagram. 37. Write short note(Each question has 5 marks) a) e-diversity b) Virtual action c) Digital Wallet d) Phases of e-commerce website development e) ERP. f) Copyright g) Electronic Newspaper h) E-Market.

Anda mungkin juga menyukai