Exam 5: E-Commerce Security and Payment Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is the first step in developing an e-commerce security plan?

(Multiple Choice)
4.8/5
(37)

Which of the following is the current standard used to protect Wi-Fi networks?

(Multiple Choice)
4.8/5
(33)

TLS does not guarantee server-side authentication.

(True/False)
4.9/5
(34)

Define and explain how EBPP systems work.Describe each of the main EBPP business models.

(Essay)
4.9/5
(40)

In encryption, the method used to transform plain text to encrypted text is called a(n)________.

(Short Answer)
4.8/5
(32)

Malicious code that is designed to take advantage of a security hole in computer software or operating system is called a(n)________.

(Short Answer)
4.8/5
(36)

To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:

(Multiple Choice)
4.8/5
(29)

Bitcoins are an example of:

(Multiple Choice)
4.9/5
(38)

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

(Multiple Choice)
5.0/5
(31)

Smishing attacks exploit SMS messages.

(True/False)
4.7/5
(22)

Botnets are typically used for all of the following except:

(Multiple Choice)
4.8/5
(40)

Which of the following is not an example of a PUP?

(Multiple Choice)
4.9/5
(34)

________ refers to the ability to ensure that an e-commerce site continues to function as intended.

(Multiple Choice)
4.8/5
(29)

Which of the following left the WikiLeaks Web site effectively inoperable in August 2012?

(Multiple Choice)
4.7/5
(32)

The study of measurable biological or physical characteristics is called ________.

(Short Answer)
4.9/5
(38)

A(n)________ is a feature of viruses, worms, and Trojans that allows an attacker to remotely access a compromised computer.

(Short Answer)
5.0/5
(36)

In order to accept payments by credit card, online merchants typically must have a merchant account established with a bank or financial institution.

(True/False)
4.7/5
(38)

Explain the difference between symmetric key encryption and public key encryption.Which dimensions of e-commerce security does encryption address?

(Essay)
4.7/5
(39)

To internal computers, a proxy server is known as the ________.

(Short Answer)
4.8/5
(40)

All the following statements about symmetric key encryption are true except:

(Multiple Choice)
4.9/5
(25)
Showing 21 - 40 of 86
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)