Exam 5: E-Commerce Security and Payment Systems
Exam 1: The Revolution Is Just Beginning75 Questions
Exam 2: E-Commerce Business Models and Concepts75 Questions
Exam 3: E-Commerce Infrastructure: the Internet, Web, and Mobile Platform75 Questions
Exam 4: Building an E-Commerce Presence: Web Sites, Mobile Sites, and Apps75 Questions
Exam 5: E-Commerce Security and Payment Systems75 Questions
Exam 6: E-Commerce Marketing and Advertising Concepts75 Questions
Exam 7: Ethical, Social, and Political Issues in E-Commerce75 Questions
Exam 8: Online Retail and Services75 Questions
Exam 9: Online Content and Media75 Questions
Exam 10: Social Networks, Auctions, and Portals75 Questions
Exam 11: B2b E-Commerce: Supply Chain Management and Collaborative Commerce75 Questions
Select questions type
All of the following are limitations of the existing online credit card payment system except:
Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
B
In encryption, the method used to transform plain text to encrypted text is called a(n)________.
Free
(Short Answer)
4.7/5
(30)
Correct Answer:
key, cipher
A digital certificate contains all of the following except the:
(Multiple Choice)
4.7/5
(32)
Which of the following is an example of an integrity violation of e-commerce security?
(Multiple Choice)
4.8/5
(34)
Online payments are believed to cost ________ to process compared to ________ for paper bills.
(Multiple Choice)
4.8/5
(35)
Discuss the security of communications channels. Include definitions and explanations for the terms Secure Sockets Layer/Transport Layer Security (SSL/TLS), secure negotiated session, session key, and VPN.
(Essay)
4.8/5
(36)
Which of the following did Dropbox implement after a series of security snafus in 2011 and 2012?
(Multiple Choice)
4.7/5
(38)
The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.
(True/False)
4.8/5
(47)
A(n)________ is a feature of viruses, worms, and Trojans that allows an attacker to remotely access a compromised computer.
(Short Answer)
5.0/5
(35)
Online bill payment now accounts for ________ of all bill payments.
(Multiple Choice)
4.9/5
(37)
The use of a digital signature helps to ensure integrity, authenticity, and nonrepudiation.
(True/False)
5.0/5
(40)
The Computer Security Institute reported in its 2011 survey that approximately ________ percent of responding organizations experienced a computer security incident within the previous 12 months.
(Multiple Choice)
4.9/5
(41)
Drive-by downloads are now the most common method of infecting computers.
(True/False)
4.9/5
(42)
Botnets are typically used for all of the following except:
(Multiple Choice)
4.9/5
(42)
Showing 1 - 20 of 75
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)