Digital Business MCQ
Digital Business Definition
Digital business is the process of applying digital technology to reinvent business models and transform a company’s products and customer experiences—innovating products that create new value and connecting people with things, insights and experiences.
Digital Business MCQ
41. All of the following are tools for optimizing a Web site’s location in search engine listings except ______.
A. Keywords and page titles.
B. Identifying market niches.
C. Buying ads.
D. Benchmarking.
Answer:- D
42. The most common type of Internet crime according to the IC3 is ______.
A. Credit card fraud.
B. Check fraud.
C. Non-delivery.
D. Auction fraud.
Answer:- D
43. In the e-commerce security environment, which of the following constitutes the inner-most layer?
A. People.
B. Data.
C. Technology solutions.
D. Organizational policies and procedures.
Answer:- B
44. All of the following are major categories of computer viruses except _____.
A. Macro viruses.
B. File-infecting viruses.
C. Script viruses.
D. Trojan viruses.
Answer:- D
45. A worm is designed to spread _________.
A. From computer to computer.
B. From file to file on a computer.
C. From Web site to Web site.
D. From Web site to computer
Answer:- A
46 . When hackers flood a Web site with useless traffic to overwhelm the network, it is called ______.
A. phishing.
B. pharming.
C. a Denial of Service (DoS) attack.
D. spoofing.
Answer:- C
47. Which of the following is not a dimension of e-commerce security provided by encryption?
A. availability.
B. message integrity.
C. nonrepudiation.
D. confidentiality.
Answer:- A
48. The most widely used encryption standard is ______.
A. Advanced Encryption Standard (AES).
B. Data Encryption Standard (DES).
C. Universal Encryption Standard (UES).
D. Optimal Encryption Standard (OES).
Answer:- A
49. The most common form of securing channels is through ______.
A. S-HTTP.
B. VPNs.
C. SSL.
D. PPTP.
Answer:- C
50. Firewalls perform all of the following functions except ______.
A. Forbids communications from untrustworthy sources.
B. Allows communications from trustworthy sources.
C. Eliminates viruses and other malicious attacks.
D. Filters traffic based on packet attributes.
Answer:- C