Exam 5: E-Commerce Security and Payment Systems
Exam 1: The Revolution Is Just Beginning85 Questions
Exam 2: E-Commerce Business Models and Concepts85 Questions
Exam 3: E-Commerce Infrastructure: the Internet, Web, and Mobile Platform85 Questions
Exam 4: Building an E-Commerce Presence: Web Sites, Mobile Sites, and Apps85 Questions
Exam 5: E-Commerce Security and Payment Systems85 Questions
Exam 6: E-Commerce Marketing and Advertising Concepts85 Questions
Exam 7: Social, Mobile, and Local Marketing85 Questions
Exam 8: Ethical, Social, and Political Issues in E-Commerce85 Questions
Exam 9: Online Retailing and Services85 Questions
Exam 10: Online Content and Media85 Questions
Exam 11: Social Networks, Auctions, and Portals85 Questions
Exam 12: B2b E-Commerce: Supply Chain Management and Collaborative Commerce85 Questions
Select questions type
Typically, the more security measures added to an e-commerce site, the faster and easier it becomes to use.
Free
(True/False)
4.8/5
(32)
Correct Answer:
False
ShellShock is an example of a software vulnerability.
Free
(True/False)
4.8/5
(36)
Correct Answer:
True
All of the following statements about Apple Pay are true except which of the following?
Free
(Multiple Choice)
4.7/5
(26)
Correct Answer:
A
A Trojan horse appears to be benign, but then does something other than expected.
(True/False)
4.8/5
(33)
To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:
(Multiple Choice)
4.7/5
(35)
All of the following are prominent hacktivist groups except:
(Multiple Choice)
4.9/5
(20)
A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.
(Multiple Choice)
4.7/5
(42)
Which of the following is not an example of an access control?
(Multiple Choice)
4.8/5
(35)
Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?
(Multiple Choice)
4.8/5
(26)
Which of the following is an example of an online privacy violation?
(Multiple Choice)
4.8/5
(24)
Which of the following is not an example of malicious code?
(Multiple Choice)
4.9/5
(31)
Spoofing a Web site is a threat to the integrity of the Web site.
(True/False)
4.8/5
(36)
Which of the following is an example of an integrity violation of e-commerce security?
(Multiple Choice)
4.7/5
(28)
________ refers to the ability to ensure that e-commerce participants do not deny their online actions.
(Multiple Choice)
4.9/5
(37)
Malware that comes with a downloaded file that a user requests is called a:
(Multiple Choice)
4.9/5
(37)
PCI-DSS is a standard established by which of the following?
(Multiple Choice)
4.8/5
(37)
Showing 1 - 20 of 85
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)