Exam 4: E-Commerce Security and Payment Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

All the following statements about symmetric key cryptography are true except:

Free
(Multiple Choice)
4.8/5
(26)
Correct Answer:
Verified

C

FREAK is an example of a software vulnerability.

Free
(True/False)
4.8/5
(29)
Correct Answer:
Verified

True

Today, online bill payment accounts for ________ of all bill payments, while paper checks account for ________.

Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
Verified

C

Automatically redirecting a web link to a different address is an example of which of the following?

(Multiple Choice)
4.8/5
(28)

Zelle is an example of a P2P mobile payment app.

(True/False)
4.8/5
(36)

PayPal is an example of what type of payment system?

(Multiple Choice)
4.8/5
(36)

What is a sniffing attack and how does it differ from a MitM attack?

(Essay)
4.7/5
(31)

________ is the ability to ensure that e-commerce participants do not deny their online actions.

(Multiple Choice)
4.7/5
(22)

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

(Multiple Choice)
4.8/5
(33)

Which of the following is not a major trend in e-commerce payments in 2018-2019?

(Multiple Choice)
4.9/5
(38)

Why is it difficult to accurately estimate the actual amount of cybercrime?

(Essay)
4.8/5
(27)

Phishing attacks rely on browser parasites.

(True/False)
4.9/5
(35)

All of the following statements about Apple Pay are true except which of the following?

(Multiple Choice)
4.8/5
(28)

To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:

(Multiple Choice)
4.7/5
(33)

Conficker is an example of a:

(Multiple Choice)
4.7/5
(41)

Which of the following was designed to cripple Iranian nuclear centrifuges?

(Multiple Choice)
4.8/5
(33)

Which of the following statements is not true?

(Multiple Choice)
4.9/5
(39)

What is the Internet of Things (IoT) and what security issues and challenges does it raise?

(Essay)
4.8/5
(41)

There is a finite number of Bitcoins that can be created.

(True/False)
4.9/5
(37)

Define and explain how electronic billing presentment and payment systems (EBPP) systems work. Describe each of the main EBPP business models.

(Essay)
4.9/5
(32)
Showing 1 - 20 of 85
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)