Exam 10: Electronic Commerce Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The process of proposing and accepting various transmission conditions is called _____.

Free
(Short Answer)
4.8/5
(32)
Correct Answer:
Verified

session negotiation

An integrity threat, also known as _____, exists when an unauthorized party can alter a message stream of information.

Free
(Short Answer)
4.8/5
(33)
Correct Answer:
Verified

active wiretapping

One significant threat to electronic commerce is theft of sensitive or personal information.

Free
(True/False)
4.8/5
(40)
Correct Answer:
Verified

True

In the context of encryption, shorter keys usually provide significantly better protection than longer keys.

(True/False)
4.8/5
(39)

Software applications called _____ provide the means to record information that passes through a computer or router that is handling Internet traffic.

(Multiple Choice)
4.8/5
(35)

A(n) _____ is a procedure that recognizes, reduces, or eliminates a threat.

(Short Answer)
4.7/5
(38)

Applets typically run within the Web browser and are most often written in the Java programming language.

(True/False)
4.8/5
(30)

Cookies are categorized as session or persistent based on _____.

(Short Answer)
4.9/5
(34)

A(n) _____ is an object that contains programs and properties that Web designers place on Web pages to perform particular tasks.

(Multiple Choice)
4.7/5
(34)

A(n) _____ is a small application program that typically runs within a Web browser.

(Multiple Choice)
4.8/5
(38)

In the context of computer security, the protection of assets using nonphysical means is called _____.

(Multiple Choice)
4.7/5
(36)

First-party cookies and third-party cookies represent classification of cookies by their _____.

(Short Answer)
4.7/5
(33)

Networks outside a firewall are referred to as trusted networks.

(True/False)
4.8/5
(31)

_____ are computer sleuths who are hired to probe PCs and locate information that can be used in legal proceedings.

(Multiple Choice)
4.8/5
(38)

A(n) _____ is an attachment to an e-mail message or program embedded in a Web page that verifies that the sender or Web site is who it claims to be.

(Short Answer)
4.8/5
(35)

The purpose of a _____ is to provide a way for a third-party Web site to place cookies from that third-party site on a visitor's computer.

(Multiple Choice)
4.8/5
(23)

One disadvantage of private-key systems is that encryption and decryption are significantly slower than public-key systems.

(True/False)
4.8/5
(44)

Active content can be delivered as an e-mail attachment.

(True/False)
4.8/5
(33)

A _____ is an element of a program that allows users to run the program without going through the normal authentication procedure for access to the program.

(Multiple Choice)
4.8/5
(41)

Persistent cookies refer to the category of cookies which exist until the Web client ends the connection.

(True/False)
4.7/5
(43)
Showing 1 - 20 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)