IT 430 final sample paper with solution
IT 430 final sample paper with solution
Question #1 What are the different methods available for maintaining state in a stateless system?
A. Temporary file
B. Cookies
C. Hidden form fields
D. All of the above ✔
Question #2 What is the role of servlets in maintaining state in a stateless system? A. To make
the processing faster
B. To write scripts
C. To act as a web server
D. To act as a database management system ✔
Question #3 What are the different methods available for maintaining state in a stateless system?
A. Temporary file
B. Cookies
C. Hidden form fields
D. All of the above ✔
Question #5 What is the primary goal of Customer Relationship Management (CRM) software?
A. To integrate all aspects of a business
B. To control the large amounts of data used in conducting business
C. To understand each customer’s needs and customize the product/service ✔
D. To manage the knowledge itself regardless of documentary representation
Question #7 What are the steps to protect against viruses in e-commerce? A. Install anti-virus
software and avoid downloading plug-ins from the internet
B. Download plug-ins from the vendor’s official website and install a firewall
C. Scan newly obtained disks, programs or files for viruses before use
D. All of the above ✔
Question #8 What type of firewall operates at the network and data link layer of the OSI model?
A. Circuit-level firewall
B. Application gateway firewall
C. Packet filter firewall ✔
D. Hybrid firewall
Question #10 What is the process of scrambling a message with the help of a key called?
A. Encryption ✔
B. Decryption
C. Authentication
D. Verification
Question #11 What is the name of a popular cryptographic system available for general public
use?
A. RSA
B. PGP ✔
C. AES
D. DES
Question #15 What is the purpose of using a hash function and message digest in cryptography?
A. To decrypt the original text
B. To check the authenticity of a message ✔
C. To encrypt a message
D. To create a digital signature
Question #16 What is Public Key Infrastructure (PKI)? A. A structured system for key
management in cryptography
B. A digital certificate management system
C. A method to create electronic signatures
D. All of the above ✔
Question #17 What is the key length of DES (Data Encryption Standard)?
A. 56 bits ✔
B. 128 bits
C. 2048 bits
D. 256 bits
A. DES ✔
B. IDEA
C. RC2
D. RC4
Question #19 What type of attack is Key Search Attacks on Public Key Algorithms?
A. Cryptanalysis
B. System-based attacks
C. Attempt to derive the private key from its corresponding public key ✔
D. Analytical Attacks
Question #20 What is the key feature of the E-cash payment system?
A. Speed of transaction
B. Anonymity of the buyer ✔
C. Security of the transaction
D. Traceability of the transaction
Question #21 Who are the participants in the E-cash payment system?
Question #24 What does SSL do at the OSI model? A. It operates at the Application layer
B. It operates at the Presentation layer
C. It operates at the Session layer ✔
D. It operates at the TCP/IP layer
Question#25: How is the secret symmetric key established during an SSL handshake? A.
By the client generating it and sending it to the server in plaintext
B. By the server generating it and sending it to the client in plaintext
C. By the client generating it and encrypting it using the public key received from the server ✔
D. By the server generating it and encrypting it using the private key
Question#28: What are the advantages of electronic catalogs over paper catalogs?
A. Easy to create
B. Good search and comparison capabilities ✔
C. Portable
D. Only a limited number of products can be displayed
Question#29: Which e-business model represents the basic form of e-commerce where
buyers and sellers interact directly?
A. Storefront Model ✔
B. Auction Model
C. Drop-Shipping Model
D. Subscription Model
Question#30: Which of the following is the most common type of e-business revenue
model?
Question#31: Which of the following revenue models provides service/information for free
and earns revenue through advertisements? A. Web Catalogue Revenue Model
B. Digital Content Revenue Model
C. Advertising-Supported Revenue Model ✔
D. Fee-for-Service Revenue Model
Question#36: What is the benefit of transferring an existing brand to the web? A. It is much
easier and less expensive
B. It requires more effort and investment
C. It can help in creating an entirely new brand
D. It is not possible to transfer an existing brand to the web
A. Grouping data objects that are similar to each other and dissimilar to objects in other groups
✔
B. A measure of the percentage of time two items occur together
C. A measure of the percentage of time the relationship between two items holds true
D. None of the above
A. To help each company to meet the needs of the consumer at the end of the supply chain ✔
B. To increase the quality of the product and reduce the production cost
C. To manage the internal activities of a business
D. Supply, transformation, and end-user
A. Monthly charges
B. Cost per thousand
C. Pay-Per-Performance
D. All of the above ✔
SUBJECTIVE PORTION
Short questions
Question #3: Can the original message be retrieved from a message digest?
Answer: No, the original message cannot be retrieved from a message digest. A message digest
is a fixed-size hash value generated by a hash function from the original message. It is designed
to be a one-way process, meaning that it is not possible to reverse-engineer or reconstruct the
original message from the digest.
Answer: When a customer pays with a credit card, the payment process involves several steps:
1. Authorization: The merchant's payment processor sends the transaction details to the
credit card issuer for approval.
2. Clearing: The credit card issuer approves the transaction and transfers the funds to the
merchant's bank.
3. Settlement: The merchant's bank receives the funds and deposits them into the
merchant's account, minus any processing fees.
1. Issuance: Users acquire e-cash from an e-cash provider, which is stored in their digital
wallet.
2. Transactions: Users spend e-cash by transferring it to merchants or other users, similar
to physical cash transactions.
3. Verification: Transactions are verified and recorded by the e-cash system to ensure
authenticity and prevent double-spending.
4. Redemption: Merchants can convert e-cash back into traditional currency through the e-
cash provider.
Long Questions
Question #1: Analyze the different tiers of the client-server architecture and explain each
tier's role in data processing. Discuss the different operating systems used for web servers
and the factors that determine the choice of a web server in an organization. Provide an
example to illustrate your explanation.
Answer:
Windows Server: Known for compatibility with Microsoft technologies and easy
integration with enterprise solutions.
Linux (e.g., Ubuntu, CentOS): Popular for its stability, security, and cost-effectiveness.
Many web servers use Linux due to its open-source nature and flexibility.
Example: A company might choose a Linux-based server for its web applications because it’s
cost-effective, secure, and performs well with high traffic, using Apache or Nginx as the web
server software.
Question #2: What is the process of registration for a buyer and a merchant in the Virtual
PIN system?
Answer:
1. Sign-Up: The buyer fills out a registration form providing personal information such as
name, address, and contact details.
2. Verification: The system verifies the information provided and creates a unique Virtual
PIN for the buyer.
3. Activation: The buyer receives the Virtual PIN via email or SMS and activates their
account by following the provided instructions.
Question #3: Explain the minting process of an e-cash coin in the E-cash payment system.
Answer:
1. Creation: The system generates a new e-cash coin, which includes a unique digital
signature and a value.
2. Issuance: The coin is issued to the user’s account after successful authentication and
verification.
3. Storage: The e-cash coin is stored in the user's digital wallet or account, where it can be
used for transactions.
Example: When a user purchases e-cash, the system mints new coins and credits them to the
user's account, allowing them to spend or transfer the e-cash.
Question #4: Explain the concept of market segmentation and its importance in Internet
Marketing.
Answer:
Market Segmentation is the process of dividing a broad target market into smaller, more
defined groups of consumers with similar needs or characteristics.
1. Targeted Advertising: It allows businesses to create tailored ads for specific segments,
increasing the effectiveness of their campaigns.
2. Personalization: Helps in delivering personalized content and offers to different groups,
enhancing user engagement and satisfaction.
3. Efficient Resource Allocation: Businesses can focus their marketing efforts on segments
with the highest potential, optimizing their budget and resources.
Example: An online clothing store might segment its market into categories like "women's
fashion," "men's fashion," and "children's wear" to tailor its marketing strategies and product
offerings for each group.