Exam 5: E-Commerce Security and Payment Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Smishing attacks exploit SMS messages.

Free
(True/False)
4.8/5
(45)
Correct Answer:
Verified

True

All of the following are limitations of the existing online credit card payment system except:

Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
Verified

B

In encryption, the method used to transform plain text to encrypted text is called a(n)________.

Free
(Short Answer)
4.7/5
(30)
Correct Answer:
Verified

key, cipher

A digital certificate contains all of the following except the:

(Multiple Choice)
4.7/5
(32)

Which of the following is an example of an integrity violation of e-commerce security?

(Multiple Choice)
4.8/5
(34)

Which dimension(s)of security is spoofing a threat to?

(Multiple Choice)
4.8/5
(34)

Which of the following is a prominent hacktivist group?

(Multiple Choice)
4.8/5
(31)

Online payments are believed to cost ________ to process compared to ________ for paper bills.

(Multiple Choice)
4.8/5
(35)

Rustock is an example of which of the following?

(Multiple Choice)
5.0/5
(41)

Phishing attacks rely on browser parasites.

(True/False)
4.7/5
(40)

Discuss the security of communications channels. Include definitions and explanations for the terms Secure Sockets Layer/Transport Layer Security (SSL/TLS), secure negotiated session, session key, and VPN.

(Essay)
4.8/5
(36)

Which of the following did Dropbox implement after a series of security snafus in 2011 and 2012?

(Multiple Choice)
4.7/5
(38)

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.

(True/False)
4.8/5
(47)

A(n)________ is a feature of viruses, worms, and Trojans that allows an attacker to remotely access a compromised computer.

(Short Answer)
5.0/5
(35)

Online bill payment now accounts for ________ of all bill payments.

(Multiple Choice)
4.9/5
(37)

The use of a digital signature helps to ensure integrity, authenticity, and nonrepudiation.

(True/False)
5.0/5
(40)

The Computer Security Institute reported in its 2011 survey that approximately ________ percent of responding organizations experienced a computer security incident within the previous 12 months.

(Multiple Choice)
4.9/5
(41)

Which of the following is not an example of a PUP?

(Multiple Choice)
4.8/5
(39)

Drive-by downloads are now the most common method of infecting computers.

(True/False)
4.9/5
(42)

Botnets are typically used for all of the following except:

(Multiple Choice)
4.9/5
(42)
Showing 1 - 20 of 75
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)