Exam 4: E-Commerce Security and Payment Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is not an example of an access control?

(Multiple Choice)
4.8/5
(29)

According to Ponemon Institute's 2019 survey, which of the following was not among the causes of the most costly cybercrimes?

(Multiple Choice)
4.9/5
(32)

________ is the ability to ensure that an e-commerce site continues to function as intended.

(Multiple Choice)
4.9/5
(38)

Define the terms tiger team, white hat, black hat, and grey hat and discuss the difference between them.

(Essay)
4.7/5
(41)

Which of the following did the Internet Advertising Bureau urge advertisers to abandon?

(Multiple Choice)
4.8/5
(39)

According to the Identity Theft Resource Center, the number of data breaches in 2018 decreased by ________ compared to 2017.

(Multiple Choice)
5.0/5
(30)

All of the following are used for authentication except:

(Multiple Choice)
4.9/5
(29)

The overall rate of online credit card fraud is ________ of all online card transactions.

(Multiple Choice)
4.8/5
(30)

Confidentiality is sometimes confused with:

(Multiple Choice)
4.7/5
(40)

________ is the ability to ensure that messages and data are only available to those authorized to view them.

(Multiple Choice)
4.8/5
(31)

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

(Multiple Choice)
4.9/5
(30)

Malware that comes with a downloaded file that a user requests is called a:

(Multiple Choice)
4.8/5
(35)

Which dimension(s) of security is spoofing a threat to?

(Multiple Choice)
4.9/5
(37)

Beebone is an example of which of the following?

(Multiple Choice)
4.8/5
(31)

What is the first step in developing an e-commerce security plan?

(Multiple Choice)
4.7/5
(35)

All of the following are features of WPA3 except:

(Multiple Choice)
4.8/5
(43)

Bluetooth is the primary enabling technology for mobile wallets.

(True/False)
4.7/5
(29)

Which of the following is not an example of a potentially unwanted program (PUP)?

(Multiple Choice)
4.8/5
(39)

All of the following are methods of securing channels of communication except:

(Multiple Choice)
4.8/5
(38)

Which of the following statements about Bitcoin is not true?

(Multiple Choice)
4.9/5
(36)
Showing 41 - 60 of 85
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)