Exam 4: E-Commerce Security and Payment Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is the most frequent cause of stolen credit cards and card information today?

(Multiple Choice)
4.8/5
(41)

Face ID is an example of which of the following?

(Multiple Choice)
4.9/5
(35)

IoT botnets became the preferred platform for launching DDoS attacks in 2017.

(True/False)
4.9/5
(41)

Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.

(True/False)
4.8/5
(38)

Explain the difference between symmetric key cryptography and public key cryptography. Which dimensions of e-commerce security does encryption address?

(Essay)
4.9/5
(40)

Which of the following statements is not true?

(Multiple Choice)
4.9/5
(35)

Discuss and explain the various types of malicious code and how they work. Include the different types of viruses.

(Essay)
4.8/5
(36)

Exploit kits can be purchased by users to protect their computers from malware.

(True/False)
4.9/5
(33)

A Trojan horse appears to be benign, but then does something other than expected.

(True/False)
5.0/5
(41)

Which of the following is not an example of malicious code?

(Multiple Choice)
4.9/5
(38)

Which of the following statements about data breaches in 2018 is not true?

(Multiple Choice)
4.9/5
(32)

Spoofing is the attempt to hide a hacker's true identity by using someone else's e-mail or IP address.

(True/False)
4.9/5
(39)

Which of the following is an example of an integrity violation of e-commerce security?

(Multiple Choice)
4.9/5
(28)

Discuss the security of communications channels. Include definitions and explanations for the terms Secure Sockets Layer/Transport Layer Security (SSL/TLS), secure negotiated session, session key, and VPN.

(Essay)
4.7/5
(33)

Which of the following statements about blockchain is not true?

(Multiple Choice)
4.9/5
(35)

All of the following are examples of cryptocurrencies except:

(Multiple Choice)
4.8/5
(38)

A drive-by download is malware that comes with a downloaded file that a user intentionally or unintentionally requests.

(True/False)
4.8/5
(36)

SSL/TLS cannot provide irrefutability.

(True/False)
4.9/5
(31)

All of the following statements about PKI are true except:

(Multiple Choice)
4.8/5
(34)

________ is the ability to identify the person or entity with whom you are dealing on the Internet.

(Multiple Choice)
4.8/5
(28)
Showing 21 - 40 of 85
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)