Exam 5: E-Commerce Security and Payment Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

________ refers to the ability to ensure that messages and data are only available to those authorized to view them.

(Multiple Choice)
4.8/5
(43)

All of the following experienced high-profile data breaches in 2014 except:

(Multiple Choice)
4.8/5
(31)

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

(Multiple Choice)
4.8/5
(39)

Confidentiality is sometimes confused with:

(Multiple Choice)
4.9/5
(35)

Explain how an online credit card transaction works, identifying the parties involved and describing how SSL/TLS is involved. What are the limitations of online credit card payment systems?

(Essay)
4.9/5
(38)

What is the Internet of Things (Io T)and what security issues and challenges does it raise?

(Essay)
4.9/5
(33)

Which of the following is not an example of a PUP?

(Multiple Choice)
4.9/5
(49)

Explain the difference between symmetric key cryptography and public key cryptography. Which dimensions of e-commerce security does encryption address?

(Essay)
4.8/5
(39)

All the following statements about symmetric key cryptography are true except:

(Multiple Choice)
4.8/5
(44)

Which of the following is the most common protocol for securing a digital channel of communication?

(Multiple Choice)
4.9/5
(38)

Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties.

(True/False)
4.8/5
(33)

There is a finite number of Bitcoins that can be created.

(True/False)
4.8/5
(38)

Linden Dollars, created for use in Second Life, are an example of:

(Multiple Choice)
4.9/5
(40)

FREAK is an example of which of the following?

(Multiple Choice)
4.9/5
(39)

Exploit kits are often rented or sold as a commercial product.

(True/False)
4.9/5
(36)

All of the following statements about PKI are true except:

(Multiple Choice)
4.9/5
(48)

What is a sniffing attack and how does it differ from a MitM attack?

(Essay)
4.9/5
(35)

PayPal is an example of what type of payment system?

(Multiple Choice)
4.8/5
(33)

Next generation firewalls provide all of the following except:

(Multiple Choice)
4.8/5
(33)

Which of the following is the current standard used to protect Wi-Fi networks?

(Multiple Choice)
4.8/5
(33)
Showing 21 - 40 of 85
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)