Exam 11: Payment Systems for Electronic Commerce

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Offline cash storage is similar to money kept in a wallet.

(True/False)
4.9/5
(36)

Google Wallet, Microsoft Windows Live ID, and Yahoo! Wallet are examples of _____ digital wallets.

(Short Answer)
4.8/5
(43)

Some online merchants accept direct deductions from customers' checking accounts which are done through a network of banks called the _____.

(Multiple Choice)
4.7/5
(26)

In an offline cash storage system, a consumer does not personally possess digital cash, instead a trusted party holds the consumers' cash accounts.

(True/False)
4.8/5
(24)

U.S. laws define _____, as unlawful activities conducted by a highly organized, disciplined association for profit.

(Short Answer)
4.9/5
(34)

How are phishing attacks used for identity theft?

(Essay)
4.9/5
(35)

A set of connections between banks that issue credit cards, the associations that own the credit cards, and merchants' banks is called a(n) _____.

(Multiple Choice)
4.9/5
(38)

In phishing, _____ use the collected information.

(Short Answer)
4.8/5
(41)

_____ are also called "electronic funds transfer at point of sale cards," especially outside the United States.

(Multiple Choice)
4.7/5
(34)

With a(n) _____, a user can pay off the entire card balance or pay a minimum amount each billing period.

(Short Answer)
4.8/5
(30)

Payment card service companies charge merchants per-transaction fees and monthly processing fees for processing payments.

(True/False)
4.7/5
(39)

A _____ is a three- or four-digit number printed on a credit card, and is required for card not present transactions.

(Short Answer)
4.8/5
(34)

When the right to use a zombie farm is sold to an organized crime association that wants to launch a phishing attack, the attack is called a(n) _____.

(Short Answer)
4.7/5
(32)

When the e-mails used in a phishing expedition are carefully designed to target a particular person or organization, the exploit is called _____.

(Short Answer)
4.8/5
(21)

Credit cards provide assurances for both the consumer and the merchant.

(True/False)
4.9/5
(33)

With a(n) _____, credit theft is much more difficult because the key to unlock the encrypted information is a PIN.

(Multiple Choice)
5.0/5
(30)

Digital cash ought to be anonymous, just as currency is.

(True/False)
4.8/5
(30)

_____ is a criminal act in which the perpetrator gathers personal information about a victim and then uses that information to obtain credit.

(Multiple Choice)
4.9/5
(42)

Which of the following is true about credit cards?

(Multiple Choice)
4.8/5
(28)

_____ are fees charged by banks for providing payment card processing services to merchants.

(Short Answer)
4.7/5
(33)
Showing 61 - 80 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)