Exam 5: E-Commerce Security and Payment Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

________ is the ability to identify the person or entity with whom you are dealing on the Internet.

Free
(Multiple Choice)
4.8/5
(26)
Correct Answer:
Verified

B

All of the following are limitations of the existing online credit card payment system except:

Free
(Multiple Choice)
4.7/5
(29)
Correct Answer:
Verified

B

Why is it difficult to accurately estimate the actual amount of cybercrime?

Free
(Essay)
4.8/5
(30)
Correct Answer:
Verified

It is difficult to accurately estimate the actual amount of cybercrime, in part, because many companies are hesitant to report it due to the fear of losing the trust of their customers, and because even if crime is reported, it may be difficult to quantify the actual dollar amount of the loss.

Which of the following is not an example of an access control?

(Multiple Choice)
5.0/5
(25)

Which dimension(s)of security is spoofing a threat to?

(Multiple Choice)
4.7/5
(36)

Which of the following is not an example of malicious code?

(Multiple Choice)
4.8/5
(27)

What is the Internet of Things (IoT)and what security issues and challenges does it raise?

(Essay)
4.8/5
(33)

Angler is an example of which of the following?

(Multiple Choice)
4.9/5
(38)

According to Symantec, almost half of the e-mail addresses involved in business e-mail compromise (BEC)phishing that it analyzed had an IP address originating in:

(Multiple Choice)
4.8/5
(32)

Phishing attacks rely on browser parasites.

(True/False)
4.9/5
(41)

Which of the following is not a key factor for establishing e-commerce security?

(Multiple Choice)
4.8/5
(40)

Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?

(Multiple Choice)
4.8/5
(30)

All the following statements about symmetric key cryptography are true except:

(Multiple Choice)
4.9/5
(33)

Define and explain how EBPP systems work. Describe each of the main EBPP business models.

(Essay)
4.9/5
(40)

A Trojan horse appears to be benign, but then does something other than expected.

(True/False)
4.8/5
(34)

What is the first step in developing an e-commerce security plan?

(Multiple Choice)
4.8/5
(37)

Discuss and explain the various types of malicious code and how they work. Include the different types of viruses.

(Essay)
4.7/5
(44)

Which of the following has the Internet Advertising Bureau urged advertisers to abandon?

(Multiple Choice)
5.0/5
(38)

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.

(True/False)
4.9/5
(39)

The Data Encryption Standard uses a(n)________-bit key.

(Multiple Choice)
4.8/5
(36)
Showing 1 - 20 of 85
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)