Exam 5: E-Commerce Security and Payment Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

All of the following are methods of securing channels of communication except:

(Multiple Choice)
4.8/5
(42)

The attack on Dyn Inc. , in October 2016 is an example of which of the following?

(Multiple Choice)
4.9/5
(38)

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

(Multiple Choice)
4.9/5
(34)

What is the most frequent cause of stolen credit cards and card information today?

(Multiple Choice)
4.9/5
(40)

Accessing data without authorization on Dropbox is an example of a:

(Multiple Choice)
4.8/5
(29)

Changeup is an example of a software vulnerability.

(True/False)
4.9/5
(38)

PayPal is an example of what type of payment system?

(Multiple Choice)
4.9/5
(39)

Explain how an online credit card transaction works, identifying the parties involved and describing how SSL/TLS is involved. What are the limitations of online credit card payment systems?

(Essay)
4.8/5
(33)

Linden Dollars, created for use in Second Life, are an example of:

(Multiple Choice)
4.9/5
(44)

All of the following are examples of social/mobile peer-to-peer payment systems except:

(Multiple Choice)
4.8/5
(34)

________ is the ability to ensure that e-commerce participants do not deny their online actions.

(Multiple Choice)
4.8/5
(38)

Spoofing is the attempt to hide a hacker's true identity by using someone else's e-mail or IP address.

(True/False)
4.8/5
(38)

Which of the following is not a major trend in e-commerce payments in 2017-2018?

(Multiple Choice)
4.9/5
(38)

Conficker is an example of a:

(Multiple Choice)
4.8/5
(48)

Which of the following is the current standard used to protect Wi-Fi networks?

(Multiple Choice)
5.0/5
(31)

According to Ponemon Institute's 2017 survey, which of the following was not among the causes of the most costly cybercrimes?

(Multiple Choice)
4.8/5
(29)

To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:

(Multiple Choice)
4.8/5
(31)

Automatically redirecting a web link to a different address is an example of which of the following?

(Multiple Choice)
4.8/5
(39)

Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties.

(True/False)
4.8/5
(47)

Explain the difference between symmetric key cryptography and public key cryptography. Which dimensions of e-commerce security does encryption address?

(Essay)
4.9/5
(31)
Showing 41 - 60 of 85
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)