Exam 5: E-Commerce Security and Payment Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Automatically redirecting a Web link to a different address is called ________.

Free
(Short Answer)
4.9/5
(24)
Correct Answer:
Verified

pharming

A Trojan horse appears to be benign, but then does something other than expected.

Free
(True/False)
4.8/5
(27)
Correct Answer:
Verified

True

Malware that comes with a downloaded file that a user requests is called a:

Free
(Multiple Choice)
4.7/5
(33)
Correct Answer:
Verified

C

Proxy servers are also known as:

(Multiple Choice)
4.7/5
(26)

The Data Encryption Standard uses a(n)________-bit key.

(Multiple Choice)
4.8/5
(32)

________ involves cybervandalism and data theft for political purposes.

(Short Answer)
4.9/5
(33)

PayPal requires the recipient of a payment to have a PayPal account to receive funds.

(True/False)
4.7/5
(28)

All of the following are used for authentication except:

(Multiple Choice)
4.9/5
(35)

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.

(True/False)
4.9/5
(37)

An example of a privacy violation of e-commerce security is:

(Multiple Choice)
4.8/5
(43)

P2P payment systems are a variation on what type of payment system?

(Multiple Choice)
4.9/5
(31)

Which dimension(s)of security is spoofing a threat to?

(Multiple Choice)
4.7/5
(34)

To allow employees to connect securely over the Internet to their corporate network, you would use a(n)________.

(Short Answer)
4.7/5
(38)

Online bill payment now accounts for ________ of all bill payments.

(Multiple Choice)
4.8/5
(33)

All of the following are factors in contributing to the increase in cybercrime except:

(Multiple Choice)
4.8/5
(27)

________ typically handle verification of accounts and balances in the credit card system.

(Essay)
4.8/5
(34)

In the United States, the primary form of online payment is:

(Multiple Choice)
4.7/5
(39)

Which of the following is not an example of an access control?

(Multiple Choice)
4.8/5
(32)

All of the following statements about PKI are true except:

(Multiple Choice)
4.9/5
(30)

The exploitation of human fallibility and gullibility to distribute malware is known as ________.

(Short Answer)
4.9/5
(30)
Showing 1 - 20 of 86
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)