Exam 10: Electronic Commerce Security
Exam 1: Introduction to Electronic Commerce80 Questions
Exam 2: Technology Infrastructure the Internet and the World Wide Web80 Questions
Exam 3: Selling on the Web80 Questions
Exam 4: Marketing on the Web80 Questions
Exam 5: Business-To-Business Activities: Improving Efficiency and Reducing Costs80 Questions
Exam 6: Social Networking Mobile Commerce and Online Auctions80 Questions
Exam 7: The Environment of Electronic Commerce Legal Ethical and Tax Issues80 Questions
Exam 8: Web Server Hardware and Software80 Questions
Exam 9: Electronic Commerce Software80 Questions
Exam 10: Electronic Commerce Security80 Questions
Exam 11: Payment Systems for Electronic Commerce80 Questions
Exam 12: Managing Electronic Commerce Implementations80 Questions
Select questions type
The process of proposing and accepting various transmission conditions is called _____.
Free
(Short Answer)
4.8/5
(32)
Correct Answer:
session negotiation
An integrity threat, also known as _____, exists when an unauthorized party can alter a message stream of information.
Free
(Short Answer)
4.8/5
(33)
Correct Answer:
active wiretapping
One significant threat to electronic commerce is theft of sensitive or personal information.
Free
(True/False)
4.8/5
(40)
Correct Answer:
True
In the context of encryption, shorter keys usually provide significantly better protection than longer keys.
(True/False)
4.8/5
(39)
Software applications called _____ provide the means to record information that passes through a computer or router that is handling Internet traffic.
(Multiple Choice)
4.8/5
(35)
A(n) _____ is a procedure that recognizes, reduces, or eliminates a threat.
(Short Answer)
4.7/5
(38)
Applets typically run within the Web browser and are most often written in the Java programming language.
(True/False)
4.8/5
(30)
Cookies are categorized as session or persistent based on _____.
(Short Answer)
4.9/5
(34)
A(n) _____ is an object that contains programs and properties that Web designers place on Web pages to perform particular tasks.
(Multiple Choice)
4.7/5
(34)
A(n) _____ is a small application program that typically runs within a Web browser.
(Multiple Choice)
4.8/5
(38)
In the context of computer security, the protection of assets using nonphysical means is called _____.
(Multiple Choice)
4.7/5
(36)
First-party cookies and third-party cookies represent classification of cookies by their _____.
(Short Answer)
4.7/5
(33)
Networks outside a firewall are referred to as trusted networks.
(True/False)
4.8/5
(31)
_____ are computer sleuths who are hired to probe PCs and locate information that can be used in legal proceedings.
(Multiple Choice)
4.8/5
(38)
A(n) _____ is an attachment to an e-mail message or program embedded in a Web page that verifies that the sender or Web site is who it claims to be.
(Short Answer)
4.8/5
(35)
The purpose of a _____ is to provide a way for a third-party Web site to place cookies from that third-party site on a visitor's computer.
(Multiple Choice)
4.8/5
(23)
One disadvantage of private-key systems is that encryption and decryption are significantly slower than public-key systems.
(True/False)
4.8/5
(44)
A _____ is an element of a program that allows users to run the program without going through the normal authentication procedure for access to the program.
(Multiple Choice)
4.8/5
(41)
Persistent cookies refer to the category of cookies which exist until the Web client ends the connection.
(True/False)
4.7/5
(43)
Showing 1 - 20 of 80
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)