Skip to content
Indian Insititute of E-Commerce

Certified E-Commerce Security Manager Exam

Time limit: 0

Quiz Summary

0 of 15 questions completed

Questions:

Information

You have already completed the quiz before. Hence you can not start it again.

Quiz is loading…

You must sign in or sign up to start the quiz.

You must first complete the following:

Results

Quiz complete. Results are being recorded.

Results

0 of 15 questions answered correctly

Your time:

Time has elapsed

You have reached 0 of 0 point(s), (0)

Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)

Categories

  1. Not categorized 0%
  • Congratulations! 

    Click on the ‘Get Certificate’ button below to fill up the form & get your  Certificate

    Get Certificate

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  1. Current
  2. Review
  3. Answered
  4. Correct
  5. Incorrect
  1. Question 1 of 15
    1. Question

    You are running an e-commerce portal and due to a security breach an authorised person got access to the credit card information. For the financial benefits from the credit card of other person’s name which became a major Financial loss or disadvantage for your customer what is the legal terminology of this kind of crime?

    Correct

    Incorrect

  2. Question 2 of 15
    2. Question

    In the following options, which one do you think is more vulnerable to the cyber attacks?

    Correct

    Incorrect

  3. Question 3 of 15
    3. Question

    One of your customer rises a dispute and requests full refund of the complete payment because he never made any transaction from his credit card. The credit card company processes the chargebacks , now who is responsible to pay the chargeback amount?

    Correct

    Incorrect

  4. Question 4 of 15
    4. Question

    One of your customer visit your website and wants to know how you are protecting his personal information such as his name ,email ID, mobile number ,date of birth ,credit card details and his login credentials to 3rd parties or not, which document can be useful to give clear information about the customers data?

    Correct

    Incorrect

  5. Question 5 of 15
    5. Question

    http://iiec.edu.in or https://iiec.edu.in how can you identify that which domain name is secured or unsecured and what security measure makes a domain name secure?

    Correct

    Incorrect

  6. Question 6 of 15
    6. Question

    Your web administrator identifies that your e-commerce portal is getting very huge traffic from a particular system and your web server crashes, he also identifies that this is a possible attack to shut down your website. What does it indicate ?

    Correct

    Incorrect

  7. Question 7 of 15
    7. Question

    To secure your e-commerce portal from potential security breaches and hacks. Your company needs to write down a step by step guide to protect your organisation from any kind of threat including computer security threats so you can immediately protect your companies assets, what document can be useful in this case.

    Correct

    Incorrect

  8. Question 8 of 15
    8. Question

    All of the following are examples of real privacy and security threats except ?

    Correct

    Incorrect

  9. Question 9 of 15
    9. Question

    From the following which one do you think monitors the users activity on Internet and also secretly share that information in the background to someone else ?

    Correct

    Incorrect

  10. Question 10 of 15
    10. Question

    Computer viruses are

    Correct

    Incorrect

  11. Question 11 of 15
    11. Question

    Unsolicited emails sent to you for gaining commercial benefits are also known as

    Correct

    Incorrect

  12. Question 12 of 15
    12. Question

    Out of the four which one do you think is a computer threat

    Correct

    Incorrect

  13. Question 13 of 15
    13. Question

    A customer came to your e-commerce portal and his personal data is compromised, now this person has been repeatedly harassed by being followed, being called and also gets emails and WhatsApp messages. What kind of target this customer has been into ?

    Correct

    Incorrect

  14. Question 14 of 15
    14. Question

    Your e-commerce portal is hosted in a firewall enabled cloud server, the firewall is a

    Correct

    Incorrect

  15. Question 15 of 15
    15. Question

    What security program or hardware or software protects your e-commerce portal from incoming threats ?

    Correct

    Incorrect