(Week 6) NPTEL E-Business - Assignment Answer 2023
NPTEL E-Business - Assignment 6 Answer 2023 .In this article we are going to share answers for NPTEL E-Business. All the Answers are provided below to help students as a reference. This will help you with the answers to NPTEL (National Programme on Technology Enhanced Learning)
Week : 6 Assignment 2023 nptel
Course Name: E-Business
Below you will find answers for E-Business Assignment 6 Answer 2023:-
NTPEL E-Business Assignment answers
Q1. Which of the following best describes the security category "Confidentiality"?
A) preventing data from being modified by an attacker. Transmitting information over the Internet
B) preventing the sender of a message from denying having sent it
C) process of examining transactions
D) protecting the content of messages or data transmitted over the Internet from the unauthorized people
Answer:- D) protecting the content of messages or data transmitted over the Internet from unauthorized people.
Q2. Along with a password and captcha, the banks also send an OTP to login into your account. The purpose here is to add an extra layer of
A) Authentication
B) Confidentiality
C) Integrity
D) Availability
Answer:- A) Authentication.
Q3. Which of the following attack changes the destination IP address in the IP header of the data packets
A) Sniffing
B) IP Spoofing
C) Denial of Service
D) Cryptography
Answer:- B) IP Spoofing
Q4. Which of the following is not a symmetric key cryptography algorithm?
A) DES
B) TDES
C) RSA
D) IDEA
Answer:- C) RSA
Q5. Data integrity in the digital signature is achieved through
A) Public key
B) Private key
C) Encryption
D) Hash function
Answer:- D) Hash functions.
Q6. For any country, ______ brings the security foundation for online business transactions
A) Digital signature
B) Controller of Certifying Authority
C) Public Key Infrastructure
D) TLS protocol
Answer:- C) Public Key Infrastructure
Q7. During a TLS transaction, the delays in round trip transmission, data access from disk, server-side processing time, and client processing side are 0.001 ms, 0.0002 ms, 0.1 ms and 0.5 ms, respectively. Which of the following is the bottleneck element?
A) Network
B) Disk
C) Client
D) Server
Answer:- Client.
Q8. Cryptographic accelerator hardware is a __________ responsible for improving the execution time of cryptography algorithms
A) Hardware
B) Software
C) Network device
D) A combination of all three
Answer:- A) Hardware.
Q9. The strength of a cryptography algorithm depends on
A) Network delay
B) Data size
C) Key size
D) Server response time
Answer:- C) Key size.
Q10. Client Server Interaction Diagrams are tools to graphically show the detailed steps involved in any internet transactions. The nodes in the diagram represent the __________ and the arcs represent the ___________
A) Client, Server
B) Message, Server/Client
C) Client/server, Message
D) Routers, Data packets
Answer:- A) Client, Server