Exam 5: E-Commerce Security and Payment Systems
Exam 1: The Revolution Continues86 Questions
Exam 2: E-Commerce Business Models and Concepts86 Questions
Exam 3: E-Commerce Infrastructure: the Internet, Web, and Mobile Platform86 Questions
Exam 4: Building an E-Commerce Presence: Web Sites, Mobile Sites, and Apps86 Questions
Exam 5: E-Commerce Security and Payment Systems86 Questions
Exam 6: E-Commerce Marketing and Advertising Concepts86 Questions
Exam 7: E-Commerce Marketing Communications86 Questions
Exam 8: Ethical, Social, and Political Issues in E-Commerce86 Questions
Exam 9: Online Retailing and Services86 Questions
Exam 10: Online Content and Media86 Questions
Exam 11: Social Networks, Auctions, and Portals86 Questions
Exam 12: B2b E-Commerce: Supply Chain Management and Collaborative Commerce86 Questions
Select questions type
An intrusion detection system can perform all of the following functions except:
(Multiple Choice)
4.8/5
(39)
Which of the following is an example of an integrity violation of e-commerce security?
(Multiple Choice)
4.8/5
(34)
The most common form of securing a digital channel of communication is ________.
(Essay)
4.8/5
(28)
Discuss the security of communications channels.Include definitions and explanations for the terms Secure Sockets Layer/Transport Layer Security (SSL/TLS), secure negotiated session, session key, and VPN.
(Essay)
4.9/5
(42)
Online bill payments are believed to cost ________ to process compared to ________ for paper bills.
(Multiple Choice)
4.8/5
(30)
Which of the following is not a key point of vulnerability when dealing with e-commerce?
(Multiple Choice)
4.8/5
(36)
The research firm Cybersource estimated that online credit card fraud in the United States amounted to about ________ in 2012.
(Multiple Choice)
4.8/5
(37)
________ refers to the ability to ensure that e-commerce participants do not deny their online actions.
(Multiple Choice)
4.9/5
(36)
________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.
(Multiple Choice)
4.9/5
(38)
Linden Dollars, created for use in Second Life, are an example of:
(Multiple Choice)
4.8/5
(34)
A(n)________ is a hacker that believes he or she is pursing some greater good by breaking in and revealing system flaws.
(Short Answer)
4.7/5
(30)
Which of the following dimensions of e-commerce security is not provided for by encryption?
(Multiple Choice)
4.9/5
(29)
Which of the following countries has been found to have engaged in cyberespionage against Google?
(Multiple Choice)
4.9/5
(40)
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:
(Multiple Choice)
5.0/5
(38)
Most of the world's spam is delivered via which of the following?
(Multiple Choice)
4.8/5
(32)
All of the following statements about public key encryption are true except:
(Multiple Choice)
4.7/5
(33)
A(n)________ vulnerability involves a vulnerability unknown to security experts that is actively exploited before there is a patch available.
(Short Answer)
4.8/5
(35)
A digital certificate contains all of the following except the:
(Multiple Choice)
4.9/5
(35)
Showing 61 - 80 of 86
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)