Exam 5: E-Commerce Security and Payment Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A worm does not need to be activated by a user in order for it to replicate itself.

(True/False)
4.8/5
(43)

Bitcoins are an example of:

(Multiple Choice)
4.9/5
(34)

Discuss the security of communications channels. Include definitions and explanations for the terms Secure Sockets Layer/Transport Layer Security (SSL/TL S), secure negotiated session, session key, and VPN.

(Essay)
4.9/5
(24)

What is the first step in developing an e-commerce security plan?

(Multiple Choice)
4.9/5
(36)

Symmetric key cryptography is also known as:

(Multiple Choice)
4.8/5
(39)

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.

(True/False)
4.9/5
(39)

Vishing attacks exploit SMS messages.

(True/False)
4.9/5
(34)

Automatically redirecting a Web link to a different address is an example of which of the following?

(Multiple Choice)
4.9/5
(36)

Which of the following statements is not true?

(Multiple Choice)
4.8/5
(32)

________ refers to the ability to ensure that an e-commerce site continues to function as intended.

(Multiple Choice)
4.8/5
(37)

Which of the following dimensions of e-commerce security is not provided for by encryption?

(Multiple Choice)
4.8/5
(41)

Which of the following has the Internet Advertising Bureau urged advertisers to abandon?

(Multiple Choice)
4.8/5
(41)

A digital certificate contains all of the following except the:

(Multiple Choice)
4.9/5
(28)

Accessing data without authorization on Dropbox is an example of which of the following?

(Multiple Choice)
4.9/5
(34)

The Data Encryption Standard uses a(n)________-bit key.

(Multiple Choice)
4.8/5
(40)

All of the following statements about public key cryptography are true except:

(Multiple Choice)
4.8/5
(31)

All of the following are limitations of the existing online credit card payment system except:

(Multiple Choice)
4.9/5
(43)

Which of the following is not a major trend in e-commerce payments in 2015-2016?

(Multiple Choice)
4.9/5
(35)

Which of the following is the leading cause of data breaches?

(Multiple Choice)
4.9/5
(38)

Discuss and explain the various types of malicious code and how they work. Include the different types of viruses.

(Essay)
4.9/5
(46)
Showing 41 - 60 of 85
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)