Exam 4: E-Commerce Security and Payment Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The Data Encryption Standard uses a(n) ________-bit key.

(Multiple Choice)
4.9/5
(39)

All of the following are limitations of the existing online credit card payment system except:

(Multiple Choice)
4.9/5
(29)

Which of the following is not a key factor for establishing e-commerce security?

(Multiple Choice)
4.9/5
(34)

A digital certificate contains all of the following except the:

(Multiple Choice)
4.8/5
(26)

Which of the following statements is not true?

(Multiple Choice)
4.8/5
(35)

Which of the following is the most common protocol for securing a digital channel of communication?

(Multiple Choice)
4.8/5
(32)

The creation of Bitcoins consumes a significant amount of energy.

(True/False)
4.8/5
(31)

What dimensions do digital signatures and hash digests add to public key cryptography and how do they work?

(Essay)
4.8/5
(35)

Which of the following dimensions of e-commerce security is not provided for by encryption?

(Multiple Choice)
4.8/5
(31)

Which of the following is the leading cause of data breaches?

(Multiple Choice)
4.9/5
(25)

Accessing data without authorization on Dropbox is an example of a:

(Multiple Choice)
4.8/5
(33)

Proxy servers are also known as:

(Multiple Choice)
4.8/5
(38)

WannaCry is an example of ransomware.

(True/False)
4.9/5
(40)

Asymmetric key cryptography is also known as:

(Multiple Choice)
4.7/5
(30)

PCI-DSS is a standard established by which of the following?

(Multiple Choice)
4.9/5
(37)

Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?

(Multiple Choice)
4.9/5
(44)

________ typically attack governments, organizations, and sometimes individuals for political purposes.

(Multiple Choice)
4.8/5
(37)

According to Symantec, almost half of the e-mail addresses involved in business e-mail compromise (BEC) phishing that it analyzed had an IP address originating in:

(Multiple Choice)
4.7/5
(37)

All of the following statements about public key cryptography are true except:

(Multiple Choice)
4.8/5
(37)

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.

(True/False)
4.8/5
(40)
Showing 61 - 80 of 85
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)