Search Header Logo

ICTM- Payment Gateways

Authored by Joey Suba

Computers

University

Used 1+ times

ICTM- Payment Gateways
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some common security protocols used by payment gateways to ensure secure transactions?

Base64 encoding

TLS, SSL, PCI DSS compliance, tokenization, end-to-end encryption

MD5 encryption

SHA-1 hashing

Answer explanation

Payment gateways use TLS, SSL, PCI DSS compliance, tokenization, and end-to-end encryption to ensure secure transactions.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Explain how transaction fees are calculated by payment gateways.

Transaction fees are calculated based on the number of emojis in the transaction description

Transaction fees are calculated based on a percentage of the transaction amount and sometimes a fixed fee per transaction.

Transaction fees are calculated based on the phase of the moon

Transaction fees are calculated based on the weather forecast

Answer explanation

Transaction fees are calculated based on a percentage of the transaction amount and sometimes a fixed fee per transaction.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Describe the different user authentication methods employed by payment gateways.

Pattern authentication

SMS authentication

Face recognition authentication

Password authentication, two-factor authentication (2FA), biometric authentication, token-based authentication, OAuth

Answer explanation

The correct choice includes password authentication, two-factor authentication (2FA), biometric authentication, token-based authentication, and OAuth as user authentication methods employed by payment gateways.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do payment gateways integrate with e-commerce platforms to facilitate online transactions?

Through carrier pigeons delivering payment information

By telepathically transferring payment details

By sending physical checks in the mail

Through APIs and secure data transmission

Answer explanation

Payment gateways integrate with e-commerce platforms through APIs and secure data transmission, not carrier pigeons, telepathy, or physical checks.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of a payment processor in the payment gateway ecosystem?

Payment processors are responsible for customer service in the payment gateway ecosystem

The role of a payment processor is to design the payment gateway interface

The role of a payment processor in the payment gateway ecosystem is to securely transmit transaction data, verify details, process payments, and facilitate fund transfers.

Payment processors handle marketing and promotional activities for the payment gateway

Answer explanation

The role of a payment processor in the payment gateway ecosystem is to securely transmit transaction data, verify details, process payments, and facilitate fund transfers.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Differentiate between a payment gateway and a payment processor.

A payment gateway authorizes transactions, while a payment processor actually processes the transaction.

A payment gateway processes transactions, while a payment processor authorizes transactions.

A payment gateway is software-based, while a payment processor is hardware-based.

A payment gateway encrypts data, while a payment processor decrypts data.

Answer explanation

A payment gateway authorizes transactions, while a payment processor actually processes the transaction.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do payment gateways protect sensitive customer data during transactions?

By using weak passwords for authentication

By sharing data openly with third-party vendors

By encrypting data, tokenizing information, and implementing strict security measures.

By storing data in plain text format

Answer explanation

Payment gateways protect sensitive customer data during transactions by encrypting data, tokenizing information, and implementing strict security measures.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?