Exam 5: E-Commerce Security and Payment Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

All of the following are limitations of the existing online credit card payment system except:

(Multiple Choice)
4.9/5
(36)

None of the following payment systems offers immediate monetary value except:

(Multiple Choice)
4.8/5
(32)

Reventon is an example of:

(Multiple Choice)
4.8/5
(42)

Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties.

(True/False)
4.8/5
(40)

Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other?

(Multiple Choice)
4.8/5
(37)

All of the following are methods of securing channels of communication except:

(Multiple Choice)
4.8/5
(44)

The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and:

(Multiple Choice)
4.9/5
(40)

The ________ worm was designed to disarm computers that control the centrifuges in Iran's uranium enrichment process.

(Short Answer)
4.8/5
(38)

Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.

(True/False)
4.9/5
(32)

Explain how an online credit card transaction works, identifying the parties involved and describing how SSL/TLS is involved.What are the limitations of online credit card payment systems?

(Essay)
4.8/5
(42)

All of the following are examples of malicious code except:

(Multiple Choice)
4.9/5
(25)

Drive-by downloads are now the most common method of infecting computers.

(True/False)
4.8/5
(30)

The overall rate of online credit card fraud is ________ % of all online card transactions.

(Multiple Choice)
4.9/5
(39)

What is the most frequent cause of stolen credit cards and card information today?

(Multiple Choice)
4.9/5
(34)

Phishing attacks rely on browser parasites.

(True/False)
4.9/5
(36)

Spoofing involves attempting to hide a true identity by using someone else's e-mail or IP address.

(True/False)
4.8/5
(34)

Insiders present a greater security threat to e-commerce sites than outsiders.

(True/False)
4.9/5
(37)

What dimensions do digital signatures and hash digests add to public key encryption and how do they work?

(Essay)
4.7/5
(29)

Credit cards are the dominant form of online payment throughout the world.

(True/False)
4.8/5
(26)

Which of the following did Dropbox implement after a series of security snafus in 2011 and 2012?

(Multiple Choice)
4.8/5
(43)
Showing 41 - 60 of 86
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)