Rajasthan Board Class 10 Information Technology Chapter 8 Solution E-Business Security, Privacy, and Legal Requirements RBSE Class 10 Information Technology Solution for Chapter 8
1 Objective type questions
1) Essential requirement for safe E- payment
A) Confidential
B) Integrity
C) Authenticity
D) All of these
Ans- D) All of these
2) UTM stands for
A) Universal threat management
B) Unified threat management
C) Unified threshold management
D) None
Ans- B) Unified threat management
3) NGFW stands for
A) New general firewall
B)Next general firewall
C)Next generation firewall
D)None
Ans- B) Next generation firewall
2 very short answer type question.
1) Define Digital signature.
Ans– Digital signatures are define as the public-key which is primitives of message authentication. And it will done in the physical world and it is done like handwritten and type message.
2) Define Intranet.
Ans- An intranet is define as a computer or any device network for sharing information and look. The information at the same time and the same information for people who work there organization and send information to each other.
3) Define content Integrity.
Ans- Guaranteeing that message which is not altered by other since the message were sent.
4) Define privacy
Ans- privacy is define as the enabling only the intended recipient to view an encrypted message.
5) what is the use of proxy server.
Ans- theuse proxy server is to hides the true network addresses effectively.
6) what is the full from of HTTP ?
Ans– full from of HTTP is Hypertext transfer Protocol.
3 Short answer types questions.
2) why security is required in E- Commerce?
Ans– to protect your physical business you have to ensure the online security of your customers. For the E- commerce you need to secure from cyber. If you use the credit and debit cards then you need to learn about the applying information security.
3) what is Extranet at its use?
Ans- the Extranet is define as there are a variety of technique is appear to address that security holes within it.
The use of Extranet is to reduce the costs and improve operations by using Extranet. we can reduce the costs of distributing information by using Extranet. We can reduce the costs of distributing information by using Extranet. We can lowering administrative costs and Improving the collaboration.
4) what is Authentication.
Ans- the Authentication is define as, you have the privilege to undertake the actions for sending messages and the receiving messages and accessing system.
5) what is the use of proxy firewall.
Ans- the use of proxy firewall is to serve As the gateway for specific application from one network to another. And it is used to impact throughput the capabilities and application which can support.
6) What is cryptography?
Ans- Cryptography is defined as the techniques such as microdots merging words with the images and other type of to hide information in the storage and transit, the cryptography is related to the cryptology and the crypto analysis and it is associated with scrambling plain text into cipher text.
Q. 4) Essays type questions
1) What is VPN ?explain its types
Ans- The VPN is virtual private network. The VPN network Is an network which is enable you for the creating a secure connection to all the public Internet private networks with remote location. by the virtual private network all the data other things Argos through secure virtual tunnel in between the host device or VPN provides servers.
The type of (VPN) virtual private network
There are two types of VPN
- Site to site VPN
- Remote access VPN
- Site to site VPN- It is used for the corporate environment. it is insure the shape encrypted connection or more than two local area in tour from the same company or different.
- Remote access VPN- It connect an individual computer to a private network. there are two type of remote access virtual private network the first is corporate virtual private network and second is personal virtual private network.
2) what is firewall ? explain its uses
Ans- The firewall is a network which is security device which brands are reject network access to traffic in between the untrusted . Turn on trusted zone. it can inforce access control through a positive control model. That state the only traffic define in the firewall policy is allowed onto the network.
Use of firewall -the firewall is used for the protecting home and corporate networks. The firewall helps to protect your network by the filtering traffic and blocking outsider form the gaining of unauthorised access to the private data on your computer. The firewall is used for caring of your computer from the undesired and malignaint content from the Internet. the firewall prevent add an unauthorized remote access and prevent from the indecent content. The firewall protects seamless operation in enterprises.
(3) Explain firewall filtering technique
Ans- The firewall program filter all the information which is come through the Internet to our computer system. There are more than 4 type of firewall filter technique which is prevent potentially harmful information from the getting through.
- Pocket filter – the pocket filter firewall is effective and transparent to user but it difficult to configure
- Application gateway – application gateway applies security mechanism to application for FTP and talent server
- Circuit -level gateway – in the circuit level gateway apply security mechanism when a TCP or UDP connection is established. in the gateway the pocket can follow between the hosts.
- Proxy server – the proxy server is hide the network address effectively. it intercept the message which entering and leaving the network.
4) Explain the benefit of extranet and Internet
Ans-The extranet and Internet is reduce the cost and improve the operation in the many ways. It can reduce the cost of distributing information. By using the Internet and extranet it is easier and faster to distribute policies and procedures companies news to employee. it can be distribute the online catalogs and price list. By using Internet and extranet the user can complete many task at a time with a required administrative assistance . by using the Internet and extranet the user use more productive with online team and it can collaborate without any expense for frequent travel. it can delay of sending information. The extranet alone businesses to collaborate closely with each other.