E - Commerce Set 3

Which type of attack is a method of defeating a cryptographic scheme of trying a large number of possibilities?
(A) Teardrop attack
(B) Brute force attack
(C) Phlashing
(D) Smurf attack
Brute force attack
Which is the model in E - Commerce, if the seller and buyer are both business firms?
(A) Consumer to Business
(B) Business to Consumer
(C) Business to Business
(D) Consumer to Consumer
Business to Business
Which is the model in E - Commerce, if the seller is a business and the individual is an consumer?
(A) Consumer to Business
(B) Business to Consumer
(C) Business to Business
(D) Consumer to Consumer
Business to Consumer
Which is the model in E - Commerce, if the seller is an individual and the buyer is a business firm?
(A) Consumer to Business
(B) Business to Consumer
(C) Business to Business
(D) Consumer to Consumer
Consumer to Business
Which is the model in E - Commerce, if the seller and the buyer are the both individuals?
(A) Consumer to Business
(B) Business to Consumer
(C) Business to Business
(D) Consumer to Consumer
Consumer to Consumer