Quiz Summary
0 of 15 questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 15 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Congratulations!
Click on the ‘Get Certificate’ button below to fill up the form & get your Certificate
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 15
1. Question
You are running an e-commerce portal and due to a security breach an authorised person got access to the credit card information. For the financial benefits from the credit card of other person’s name which became a major Financial loss or disadvantage for your customer what is the legal terminology of this kind of crime?
CorrectIncorrect -
Question 2 of 15
2. Question
In the following options, which one do you think is more vulnerable to the cyber attacks?
CorrectIncorrect -
Question 3 of 15
3. Question
One of your customer rises a dispute and requests full refund of the complete payment because he never made any transaction from his credit card. The credit card company processes the chargebacks , now who is responsible to pay the chargeback amount?
CorrectIncorrect -
Question 4 of 15
4. Question
One of your customer visit your website and wants to know how you are protecting his personal information such as his name ,email ID, mobile number ,date of birth ,credit card details and his login credentials to 3rd parties or not, which document can be useful to give clear information about the customers data?
CorrectIncorrect -
Question 5 of 15
5. Question
http://iiec.edu.in or https://iiec.edu.in how can you identify that which domain name is secured or unsecured and what security measure makes a domain name secure?
CorrectIncorrect -
Question 6 of 15
6. Question
Your web administrator identifies that your e-commerce portal is getting very huge traffic from a particular system and your web server crashes, he also identifies that this is a possible attack to shut down your website. What does it indicate ?
CorrectIncorrect -
Question 7 of 15
7. Question
To secure your e-commerce portal from potential security breaches and hacks. Your company needs to write down a step by step guide to protect your organisation from any kind of threat including computer security threats so you can immediately protect your companies assets, what document can be useful in this case.
CorrectIncorrect -
Question 8 of 15
8. Question
All of the following are examples of real privacy and security threats except ?
CorrectIncorrect -
Question 9 of 15
9. Question
From the following which one do you think monitors the users activity on Internet and also secretly share that information in the background to someone else ?
CorrectIncorrect -
Question 10 of 15
10. Question
Computer viruses are
CorrectIncorrect -
Question 11 of 15
11. Question
Unsolicited emails sent to you for gaining commercial benefits are also known as
CorrectIncorrect -
Question 12 of 15
12. Question
Out of the four which one do you think is a computer threat
CorrectIncorrect -
Question 13 of 15
13. Question
A customer came to your e-commerce portal and his personal data is compromised, now this person has been repeatedly harassed by being followed, being called and also gets emails and WhatsApp messages. What kind of target this customer has been into ?
CorrectIncorrect -
Question 14 of 15
14. Question
Your e-commerce portal is hosted in a firewall enabled cloud server, the firewall is a
CorrectIncorrect -
Question 15 of 15
15. Question
What security program or hardware or software protects your e-commerce portal from incoming threats ?
CorrectIncorrect