Exam 5: E-Commerce Security and Payment Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An intrusion detection system can perform all of the following functions except:

(Multiple Choice)
4.8/5
(39)

Which of the following is an example of an integrity violation of e-commerce security?

(Multiple Choice)
4.8/5
(34)

The most common form of securing a digital channel of communication is ________.

(Essay)
4.8/5
(28)

Discuss the security of communications channels.Include definitions and explanations for the terms Secure Sockets Layer/Transport Layer Security (SSL/TLS), secure negotiated session, session key, and VPN.

(Essay)
4.9/5
(42)

Online bill payments are believed to cost ________ to process compared to ________ for paper bills.

(Multiple Choice)
4.8/5
(30)

Which of the following is not a key point of vulnerability when dealing with e-commerce?

(Multiple Choice)
4.8/5
(36)

The research firm Cybersource estimated that online credit card fraud in the United States amounted to about ________ in 2012.

(Multiple Choice)
4.8/5
(37)

________ refers to the ability to ensure that e-commerce participants do not deny their online actions.

(Multiple Choice)
4.9/5
(36)

________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.

(Multiple Choice)
4.9/5
(38)

Which of the following is a prominent hacktivist group?

(Multiple Choice)
4.8/5
(30)

Linden Dollars, created for use in Second Life, are an example of:

(Multiple Choice)
4.8/5
(34)

A(n)________ is a hacker that believes he or she is pursing some greater good by breaking in and revealing system flaws.

(Short Answer)
4.7/5
(30)

Which of the following dimensions of e-commerce security is not provided for by encryption?

(Multiple Choice)
4.9/5
(29)

Which of the following countries has been found to have engaged in cyberespionage against Google?

(Multiple Choice)
4.9/5
(40)

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

(Multiple Choice)
5.0/5
(38)

Most of the world's spam is delivered via which of the following?

(Multiple Choice)
4.8/5
(32)

Symmetric key encryption is also known as:

(Multiple Choice)
4.8/5
(32)

All of the following statements about public key encryption are true except:

(Multiple Choice)
4.7/5
(33)

A(n)________ vulnerability involves a vulnerability unknown to security experts that is actively exploited before there is a patch available.

(Short Answer)
4.8/5
(35)

A digital certificate contains all of the following except the:

(Multiple Choice)
4.9/5
(35)
Showing 61 - 80 of 86
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)