Exam 5: E-Commerce Security and Payment Systems
Exam 1: The Revolution Continues86 Questions
Exam 2: E-Commerce Business Models and Concepts86 Questions
Exam 3: E-Commerce Infrastructure: the Internet, Web, and Mobile Platform86 Questions
Exam 4: Building an E-Commerce Presence: Web Sites, Mobile Sites, and Apps86 Questions
Exam 5: E-Commerce Security and Payment Systems86 Questions
Exam 6: E-Commerce Marketing and Advertising Concepts86 Questions
Exam 7: E-Commerce Marketing Communications86 Questions
Exam 8: Ethical, Social, and Political Issues in E-Commerce86 Questions
Exam 9: Online Retailing and Services86 Questions
Exam 10: Online Content and Media86 Questions
Exam 11: Social Networks, Auctions, and Portals86 Questions
Exam 12: B2b E-Commerce: Supply Chain Management and Collaborative Commerce86 Questions
Select questions type
Automatically redirecting a Web link to a different address is called ________.
Free
(Short Answer)
4.9/5
(24)
Correct Answer:
pharming
A Trojan horse appears to be benign, but then does something other than expected.
Free
(True/False)
4.8/5
(27)
Correct Answer:
True
Malware that comes with a downloaded file that a user requests is called a:
Free
(Multiple Choice)
4.7/5
(33)
Correct Answer:
C
________ involves cybervandalism and data theft for political purposes.
(Short Answer)
4.9/5
(33)
PayPal requires the recipient of a payment to have a PayPal account to receive funds.
(True/False)
4.7/5
(28)
The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.
(True/False)
4.9/5
(37)
An example of a privacy violation of e-commerce security is:
(Multiple Choice)
4.8/5
(43)
P2P payment systems are a variation on what type of payment system?
(Multiple Choice)
4.9/5
(31)
To allow employees to connect securely over the Internet to their corporate network, you would use a(n)________.
(Short Answer)
4.7/5
(38)
Online bill payment now accounts for ________ of all bill payments.
(Multiple Choice)
4.8/5
(33)
All of the following are factors in contributing to the increase in cybercrime except:
(Multiple Choice)
4.8/5
(27)
________ typically handle verification of accounts and balances in the credit card system.
(Essay)
4.8/5
(34)
In the United States, the primary form of online payment is:
(Multiple Choice)
4.7/5
(39)
Which of the following is not an example of an access control?
(Multiple Choice)
4.8/5
(32)
The exploitation of human fallibility and gullibility to distribute malware is known as ________.
(Short Answer)
4.9/5
(30)
Showing 1 - 20 of 86
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)