Exam 5: E-Commerce Security and Payment Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Typically, the more security measures added to an e-commerce site, the faster and easier it becomes to use.

Free
(True/False)
4.8/5
(32)
Correct Answer:
Verified

False

ShellShock is an example of a software vulnerability.

Free
(True/False)
4.8/5
(36)
Correct Answer:
Verified

True

All of the following statements about Apple Pay are true except which of the following?

Free
(Multiple Choice)
4.7/5
(26)
Correct Answer:
Verified

A

A fingerprint scan is an example of which of the following?

(Multiple Choice)
4.7/5
(30)

A Trojan horse appears to be benign, but then does something other than expected.

(True/False)
4.8/5
(33)

To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:

(Multiple Choice)
4.7/5
(35)

All of the following are prominent hacktivist groups except:

(Multiple Choice)
4.9/5
(20)

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

(Multiple Choice)
4.7/5
(42)

Which of the following is not an example of an access control?

(Multiple Choice)
4.8/5
(35)

Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?

(Multiple Choice)
4.8/5
(26)

All of the following are used for authentication except:

(Multiple Choice)
4.8/5
(24)

Which of the following is an example of an online privacy violation?

(Multiple Choice)
4.8/5
(24)

Which of the following is not an example of malicious code?

(Multiple Choice)
4.9/5
(31)

Spoofing a Web site is a threat to the integrity of the Web site.

(True/False)
4.8/5
(36)

Which of the following is an example of an integrity violation of e-commerce security?

(Multiple Choice)
4.7/5
(28)

________ refers to the ability to ensure that e-commerce participants do not deny their online actions.

(Multiple Choice)
4.9/5
(37)

Malware that comes with a downloaded file that a user requests is called a:

(Multiple Choice)
4.9/5
(37)

PCI-DSS is a standard established by which of the following?

(Multiple Choice)
4.8/5
(37)

Proxy servers are also known as:

(Multiple Choice)
4.8/5
(35)

Which of the following statements is not true?

(Multiple Choice)
4.8/5
(34)
Showing 1 - 20 of 85
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)