161. What is an act that poses danger to computer assets.
162. Which one is not a encryption technique
163. Which one is not used as a security mechanism?
164. Which e-government arena is being used when governmental agencies send out and accept bids for work?
165. Secret key is used for
166. Which one isÂ Â a communication channel threat?
167. Which one isÂ Â a communication channel security protocol?
168. The protocol which allows the file transfer between computers is
169. E-Banking is also known as
170. What is backbone of all E-payments in E-commerce
MCQ Multiple Choice Questions and Answers on E Commerce
E Commerce Question and Answer