Exam 3: Financial Transactions, Security Measures, and IT Infrastructure

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which factor determines who has the right to access different types of IT systems and information?

Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
Verified

B

Public key encryption uses multiple keys. One key is used to encrypt data, while another is usedto decrypt data. The key used to encrypt data is called the _____ key, while the key used todecrypt data is called the _____ key.

Free
(Multiple Choice)
4.8/5
(40)
Correct Answer:
Verified

D

Which factor represents a system's ability to change quickly?

Free
(Multiple Choice)
4.7/5
(34)
Correct Answer:
Verified

A

What is a model of a proposed product, service, or system?

(Multiple Choice)
4.8/5
(32)

What is the name for direct computer-to-computer transfer of transaction information contained in standard business documents?

(Multiple Choice)
4.9/5
(30)

Which of the following is a method of transferring money from one person's account to another?

(Multiple Choice)
4.9/5
(38)

What is an internal organizational Internet that is guarded against outside access by a specialsecurity feature called a firewall (which can be software, hardware, or a combination of thetwo)?

(Multiple Choice)
4.8/5
(36)

Which of the following permits the transmission of a bill, along with payment of that bill, to be conducted over the Internet?

(Multiple Choice)
4.9/5
(34)

Secure Sockets Layers does which of the following?

(Multiple Choice)
4.9/5
(31)

Which of the following is used in B2B to pay for purchases?

(Multiple Choice)
4.9/5
(36)

When a transaction is processed online, how can the merchant verify the customer's identity?

(Multiple Choice)
4.9/5
(36)

If you need to transfer money to another person via the internet, which of the following methods could you use?

(Multiple Choice)
4.9/5
(29)

What is a set of conditions used to measure how well a product or system functions?

(Multiple Choice)
4.8/5
(41)

What is an intranet that is restricted to an organization and certain outsiders, such as customers and suppliers?

(Multiple Choice)
4.7/5
(35)

A combination of software and information designed to provide security and information for payment is called a what?

(Multiple Choice)
4.9/5
(42)

The practice of forging a return address on an e-mail so that the recipient is fooled into revealing private information is termed?

(Multiple Choice)
4.8/5
(44)

Which factor determines when your IT system will be available for knowledge workers to access?

(Multiple Choice)
4.8/5
(36)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)