E - Commerce Set 3


Which type of attack is a method of defeating a cryptographic scheme of trying a large number of possibilities?
  
    (A) Teardrop attack
    (B) Brute force attack
    (C) Phlashing
    (D) Smurf attack

Brute force attack

Which is the model in E - Commerce, if the seller and buyer are both business firms?
  
    (A) Consumer to Business
    (B) Business to Consumer
    (C) Business to Business
    (D) Consumer to Consumer

Business to Business

Which is the model in E - Commerce, if the seller is a business and the individual is an consumer?
  
    (A) Consumer to Business
    (B) Business to Consumer
    (C) Business to Business
    (D) Consumer to Consumer

Business to Consumer

Which is the model in E - Commerce, if the seller is an individual and the buyer is a business firm?
  

    (A) Consumer to Business
    (B) Business to Consumer
    (C) Business to Business
    (D) Consumer to Consumer

Consumer to Business

Which is the model in E - Commerce, if the seller and the buyer are the both individuals?
  
    (A) Consumer to Business
    (B) Business to Consumer
    (C) Business to Business
    (D) Consumer to Consumer

Consumer to Consumer