1) Most individuals are familiar with which form of e-commerce
- B2B
- C2C
- C2B
- B2C
2) ________ is defined as any crime completed through the use of computer technology
- Hacking
- Computer Crime
- Cracking
- Computer Forensics
3) _________ is a discussion or informational site published on the World-Wide consisting of discrete entries typically runs y an individual or a small group.
- E-Commerce
- URL
- Blog
4) What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient
- Encryption
- Security-auditing software
- Public key encryption
- Intrusion-detection software
5) Amazon.com comes under the following model
- B2C
- C2B
- B2B
- C2C
6) Collecting personal information and effectively posting as another individual is known as crime of:
- Spoofing
- Identity theft
- Hacking
- Spamming
7) Who breaks into other people’s computer systems and steals and destroys information
- Hackers
- Software’s
- Hactivists
- Script Kiddies
8) The internet is
- Server
- Network of networks
- Website
- Host
9) According to Electronic Crime Bill 2007 what is the imprisonment of “Electronic Fraud” Offense
- 7 Months
- 7 years
- 1 years
- 10 Months
10) Fast re-transmissions are triggered when __________identical acknowledgement arrive at a receiving host.
- 1
- 2
- 3
- 4