Exam 5: E-Commerce Security and Payment Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Phishing attacks rely on browser parasites.

(True/False)
4.8/5
(39)

Zeus is an example of which of the following?

(Multiple Choice)
4.8/5
(36)

CryptoLocker is an example of ransomware.

(True/False)
4.7/5
(42)

In 2014, online bill payment accounted for ________ of all bill payments, while paper checks accounted for ________.

(Multiple Choice)
4.8/5
(38)

What is the most frequent cause of stolen credit cards and card information today?

(Multiple Choice)
4.8/5
(23)

Which dimension(s)of security is spoofing a threat to?

(Multiple Choice)
4.8/5
(37)

What dimensions do digital signatures and hash digests add to public key cryptography and how do they work?

(Essay)
4.8/5
(35)

Define and explain how EBPP systems work. Describe each of the main EBPP business models.

(Essay)
4.9/5
(41)

Apple Pay uses near field communication (NF C)chips.

(True/False)
4.8/5
(36)

An intrusion detection system can perform all of the following functions except:

(Multiple Choice)
4.9/5
(34)

SLS/TLS cannot provide irrefutability.

(True/False)
4.8/5
(46)

In 2014, Sony experienced which of the following?

(Multiple Choice)
4.7/5
(27)

________ typically attack governments, organizations, and sometimes individuals for political purposes.

(Multiple Choice)
4.8/5
(45)

Why is it difficult to accurately estimate the actual amount of cybercrime?

(Essay)
4.8/5
(41)

________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.

(Multiple Choice)
4.9/5
(32)

Which of the following was designed to cripple Iranian nuclear centrifuges?

(Multiple Choice)
4.8/5
(43)

According to Ponemon Institute's 2015 survey, which of the following was not among the causes of the most costly cybercrimes?

(Multiple Choice)
4.8/5
(31)

PayPal is the most popular alternative payment method in the United States.

(True/False)
4.8/5
(44)

Which of the following statements is not true?

(Multiple Choice)
4.9/5
(45)

All of the following are methods of securing channels of communication except:

(Multiple Choice)
4.8/5
(37)
Showing 61 - 80 of 85
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)