Exam 5: E-Commerce Security and Payment Systems
Exam 1: The Revolution Continues86 Questions
Exam 2: E-Commerce Business Models and Concepts86 Questions
Exam 3: E-Commerce Infrastructure: the Internet, Web, and Mobile Platform86 Questions
Exam 4: Building an E-Commerce Presence: Web Sites, Mobile Sites, and Apps86 Questions
Exam 5: E-Commerce Security and Payment Systems86 Questions
Exam 6: E-Commerce Marketing and Advertising Concepts86 Questions
Exam 7: E-Commerce Marketing Communications86 Questions
Exam 8: Ethical, Social, and Political Issues in E-Commerce86 Questions
Exam 9: Online Retailing and Services86 Questions
Exam 10: Online Content and Media86 Questions
Exam 11: Social Networks, Auctions, and Portals86 Questions
Exam 12: B2b E-Commerce: Supply Chain Management and Collaborative Commerce86 Questions
Select questions type
What is the first step in developing an e-commerce security plan?
(Multiple Choice)
4.8/5
(37)
Which of the following is the current standard used to protect Wi-Fi networks?
(Multiple Choice)
4.8/5
(33)
Define and explain how EBPP systems work.Describe each of the main EBPP business models.
(Essay)
4.9/5
(40)
In encryption, the method used to transform plain text to encrypted text is called a(n)________.
(Short Answer)
4.8/5
(32)
Malicious code that is designed to take advantage of a security hole in computer software or operating system is called a(n)________.
(Short Answer)
4.8/5
(36)
To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:
(Multiple Choice)
4.8/5
(29)
A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.
(Multiple Choice)
5.0/5
(31)
Botnets are typically used for all of the following except:
(Multiple Choice)
4.8/5
(40)
________ refers to the ability to ensure that an e-commerce site continues to function as intended.
(Multiple Choice)
4.8/5
(29)
Which of the following left the WikiLeaks Web site effectively inoperable in August 2012?
(Multiple Choice)
4.7/5
(32)
The study of measurable biological or physical characteristics is called ________.
(Short Answer)
4.9/5
(38)
A(n)________ is a feature of viruses, worms, and Trojans that allows an attacker to remotely access a compromised computer.
(Short Answer)
5.0/5
(36)
In order to accept payments by credit card, online merchants typically must have a merchant account established with a bank or financial institution.
(True/False)
4.7/5
(38)
Explain the difference between symmetric key encryption and public key encryption.Which dimensions of e-commerce security does encryption address?
(Essay)
4.7/5
(39)
To internal computers, a proxy server is known as the ________.
(Short Answer)
4.8/5
(40)
All the following statements about symmetric key encryption are true except:
(Multiple Choice)
4.9/5
(25)
Showing 21 - 40 of 86
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)