Exam 5: E-Commerce Security and Payment Systems
Exam 1: The Revolution Continues86 Questions
Exam 2: E-Commerce Business Models and Concepts86 Questions
Exam 3: E-Commerce Infrastructure: the Internet, Web, and Mobile Platform86 Questions
Exam 4: Building an E-Commerce Presence: Web Sites, Mobile Sites, and Apps86 Questions
Exam 5: E-Commerce Security and Payment Systems86 Questions
Exam 6: E-Commerce Marketing and Advertising Concepts86 Questions
Exam 7: E-Commerce Marketing Communications86 Questions
Exam 8: Ethical, Social, and Political Issues in E-Commerce86 Questions
Exam 9: Online Retailing and Services86 Questions
Exam 10: Online Content and Media86 Questions
Exam 11: Social Networks, Auctions, and Portals86 Questions
Exam 12: B2b E-Commerce: Supply Chain Management and Collaborative Commerce86 Questions
Select questions type
All of the following are limitations of the existing online credit card payment system except:
(Multiple Choice)
4.9/5
(36)
None of the following payment systems offers immediate monetary value except:
(Multiple Choice)
4.8/5
(32)
Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties.
(True/False)
4.8/5
(40)
Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other?
(Multiple Choice)
4.8/5
(37)
All of the following are methods of securing channels of communication except:
(Multiple Choice)
4.8/5
(44)
The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and:
(Multiple Choice)
4.9/5
(40)
The ________ worm was designed to disarm computers that control the centrifuges in Iran's uranium enrichment process.
(Short Answer)
4.8/5
(38)
Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.
(True/False)
4.9/5
(32)
Explain how an online credit card transaction works, identifying the parties involved and describing how SSL/TLS is involved.What are the limitations of online credit card payment systems?
(Essay)
4.8/5
(42)
All of the following are examples of malicious code except:
(Multiple Choice)
4.9/5
(25)
Drive-by downloads are now the most common method of infecting computers.
(True/False)
4.8/5
(30)
The overall rate of online credit card fraud is ________ % of all online card transactions.
(Multiple Choice)
4.9/5
(39)
What is the most frequent cause of stolen credit cards and card information today?
(Multiple Choice)
4.9/5
(34)
Spoofing involves attempting to hide a true identity by using someone else's e-mail or IP address.
(True/False)
4.8/5
(34)
Insiders present a greater security threat to e-commerce sites than outsiders.
(True/False)
4.9/5
(37)
What dimensions do digital signatures and hash digests add to public key encryption and how do they work?
(Essay)
4.7/5
(29)
Credit cards are the dominant form of online payment throughout the world.
(True/False)
4.8/5
(26)
Which of the following did Dropbox implement after a series of security snafus in 2011 and 2012?
(Multiple Choice)
4.8/5
(43)
Showing 41 - 60 of 86
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)