E Commerce MCQ Questions and Answers Quiz

121. Which of the following records logons and deletions?

  1. Key logger
  2. Packet sniffer
  3. Log analysis tools
  4. Screen captures

122. E-mail messages may be stored on which of the following computers?

  1. Senders computer
  2. Senders server
  3. Recipients server
  4. All of the above

123. What might identity thieves do with your identity?

  1. Apply for and use credit cards
  2. Apply for a loan
  3. Change their identity
  4. All of the above

124. Which of the following is not a common approach to phishing?

  1. Send an official-looking e-mail asking for confidential information
  2. Ask people to fill out and return a fake letter using postal mail
  3. Ask people to click a link in an e-mail to open a submission form on a web page
  4. All of the above are uncommon approaches to phishing

125. A technique used to gain personal information for the purpose of identity theft, often bye-mail, is called?

  1. Phishing
  2. Carding
  3. Brand spoofing
  4. All of the above

126. Companies can gather information about employees and potential employees fromwhich of the following places?

  1. Job applications
  2. Credit reports
  3. Companies that track Web surfers
  4. All of the above

127. Cyber slacking consists of what activities?

  1. Visiting “inappropriate” web sites
  2. Visiting news sites
  3. Chatting online with others about non-work topics
  4. All of the above

128. Cookies are used to do which of the following?

  1. Store your ID and password for subsequent logons to the site
  2. Store contents of electronic shopping carts
  3. To track web activity
  4. All of the above and more

129. Unsolicited e-mail is called what?

  1. Junk mail
  2. Spam
  3. Extra mail
  4. None of the above

130. What is the name of the new anti-Spam bill?

  1. No-Spam
  2. CAN-Spam
  3. Spam-Away
  4. Stop Spam

MCQ Multiple Choice Questions and Answers on E Commerce

E Commerce Question and Answer