NPTEL Assignment 6 Answer 2023 E-Business



(Week 6)  NPTEL  E-Business  - Assignment Answer 2023


NPTEL  E-Business - Assignment 6 Answer 2023 .In this article we are going to share answers for NPTEL  E-Business. All the Answers are provided below to help students as a reference. This will help you with the answers to NPTEL (National Programme on Technology Enhanced Learning) 


Week : 6 Assignment 2023 nptel 


Course Name: E-Business


Below you will find answers for  E-Business Assignment 6 Answer 2023:-


NTPEL  E-Business Assignment answers


Q1. Which of the following best describes the security category "Confidentiality"?


A) preventing data from being modified by an attacker. Transmitting information over the Internet

B) preventing the sender of a message from denying having sent it

C) process of examining transactions

D) protecting the content of messages or data transmitted over the Internet from the unauthorized people


Answer:- D) protecting the content of messages or data transmitted over the Internet from unauthorized people.


Q2. Along with a password and captcha, the banks also send an OTP to login into your account. The purpose here is to add an extra layer of


A) Authentication

B) Confidentiality

C) Integrity

D) Availability


Answer:- A) Authentication.


Q3. Which of the following attack changes the destination IP address in the IP header of the data packets


A) Sniffing

B) IP Spoofing

C) Denial of Service

D) Cryptography


Answer:-  B) IP Spoofing


Q4.  Which of the following is not a symmetric key cryptography algorithm?


A) DES

B) TDES

C) RSA

D) IDEA


Answer:- C) RSA


Q5. Data integrity in the digital signature is achieved through


A) Public key

B) Private key

C) Encryption

D) Hash function


Answer:- D) Hash functions.


Q6. For any country, ______ brings the security foundation for online business transactions


A) Digital signature

B) Controller of Certifying Authority

C) Public Key Infrastructure

D)  TLS protocol


Answer:- C) Public Key Infrastructure


Q7. During a TLS transaction, the delays in round  trip transmission, data access from disk, server-side processing time, and client processing side are 0.001 ms, 0.0002 ms, 0.1 ms and 0.5 ms, respectively. Which of the following is the bottleneck element?


A) Network

B) Disk

C) Client

D) Server


Answer:- Client.


Q8. Cryptographic accelerator hardware is a __________  responsible for improving the execution time of cryptography algorithms


A) Hardware

B) Software

C) Network device

D) A combination of all three


Answer:- A) Hardware.


Q9. The strength of a cryptography algorithm depends on


A) Network delay

B) Data size

C) Key size

D) Server response time


Answer:- C) Key size.


Q10. Client Server Interaction Diagrams are tools  to graphically show the detailed steps involved in any internet transactions. The nodes in the diagram represent the __________ and the arcs represent the ___________


A) Client, Server

B) Message, Server/Client

C) Client/server, Message

D) Routers, Data packets


Answer:- A) Client, Server