Exam 5: E-Commerce Security and Payment Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.

(True/False)
4.9/5
(32)

________ is the ability to ensure that messages and data are only available to those authorized to view them.

(Multiple Choice)
4.9/5
(31)

According to Symantec, the number of data breaches in 2016 increased by ________ compared to 2015.

(Multiple Choice)
4.8/5
(36)

Malware that comes with a downloaded file that a user requests is called a:

(Multiple Choice)
5.0/5
(44)

Discuss the Great Cannon. Who developed it, how has it been used, and how does it differ from the Great Firewall?

(Essay)
4.8/5
(36)

All of the following statements about public key cryptography are true except:

(Multiple Choice)
4.7/5
(39)

Which of the following is the most common protocol for securing a digital channel of communication?

(Multiple Choice)
4.8/5
(43)

The overall rate of online credit card fraud is ________ of all online card transactions.

(Multiple Choice)
4.9/5
(46)

Which of the following is an example of an online privacy violation?

(Multiple Choice)
4.9/5
(42)

Which of the following is the leading cause of data breaches?

(Multiple Choice)
4.9/5
(45)

PCI-DSS is a standard established by which of the following?

(Multiple Choice)
4.9/5
(38)

The Internet Advertising Bureau has urged advertisers to abandon Adobe Flash in favor of HTML5.

(True/False)
4.7/5
(32)

________ is the ability to ensure that an e-commerce site continues to function as intended.

(Multiple Choice)
5.0/5
(43)

All of the following statements about Apple Pay are true except which of the following?

(Multiple Choice)
4.8/5
(37)

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

(Multiple Choice)
4.8/5
(33)

Bitcoins are an example of:

(Multiple Choice)
5.0/5
(37)

Proxy servers are also known as:

(Multiple Choice)
4.8/5
(40)

Exploit kits can be purchased by users to protect their computers from malware.

(True/False)
4.9/5
(28)

Confidentiality is sometimes confused with:

(Multiple Choice)
4.9/5
(45)

Which of the following statements is not true?

(Multiple Choice)
4.9/5
(40)
Showing 21 - 40 of 85
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)