( Best 130+ ) Digital Business MCQ

by Mr. DJ

Digital Business MCQ

Digital Business Definition

Digital business is the process of applying digital technology to reinvent business models and transform a company’s products and customer experiences—innovating products that create new value and connecting people with things, insights and experiences.

Digital Business MCQ

Digital Business MCQ

41. All of the following are tools for optimizing a Web site’s location in search engine listings except ______.
A. Keywords and page titles.
B. Identifying market niches.
C. Buying ads.
D. Benchmarking.
Answer:- D
42. The most common type of Internet crime according to the IC3 is ______.
A. Credit card fraud.
B. Check fraud.
C. Non-delivery.
D. Auction fraud.
Answer:- D
43. In the e-commerce security environment, which of the following constitutes the inner-most layer?
A. People.
B. Data.
C. Technology solutions.
D. Organizational policies and procedures.
Answer:- B
44. All of the following are major categories of computer viruses except _____.
A. Macro viruses.
B. File-infecting viruses.
C. Script viruses.
D. Trojan viruses.
Answer:- D
45. A worm is designed to spread _________. 
A. From computer to computer.
B. From file to file on a computer.
C. From Web site to Web site.
D. From Web site to computer
Answer:- A
46 . When hackers flood a Web site with useless traffic to overwhelm the network, it is called ______.
A. phishing.
B. pharming.
C. a Denial of Service (DoS) attack.
D. spoofing.
Answer:- C
47. Which of the following is not a dimension of e-commerce security provided by encryption?
A. availability.
B. message integrity.
C. nonrepudiation.
D. confidentiality.
Answer:- A
48. The most widely used encryption standard is ______.
A. Advanced Encryption Standard (AES).
B. Data Encryption Standard (DES).
C. Universal Encryption Standard (UES).
D. Optimal Encryption Standard (OES).
Answer:- A
49. The most common form of securing channels is through ______.
A. S-HTTP.
B. VPNs.
C. SSL.
D. PPTP.
Answer:- C
50. Firewalls perform all of the following functions except ______.
A. Forbids communications from untrustworthy sources.
B. Allows communications from trustworthy sources.
C. Eliminates viruses and other malicious attacks.
D. Filters traffic based on packet attributes.
Answer:- C

Join Our Telegram Channel 

Read More Management MCQs

You may also like

Leave a Comment