Exam 5: E-Commerce Security and Payment Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

All of the following are factors in contributing to the increase in cybercrime except:

(Multiple Choice)
4.9/5
(41)

An example of a privacy violation of e-commerce security is:

(Multiple Choice)
4.9/5
(37)

Which of the following statements about public key encryption is not true?

(Multiple Choice)
4.8/5
(36)

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

(Multiple Choice)
4.8/5
(30)

Define and explain how EBPP systems work. Describe each of the main EBPP business models.

(Essay)
4.9/5
(37)

Which of the following left the WikiLeaks Web site effectively inoperable in August 2012?

(Multiple Choice)
4.8/5
(47)

P2P payment systems are a variation on what type of payment system?

(Multiple Choice)
4.8/5
(39)

Which of the following is not a key point of vulnerability when dealing with e-commerce?

(Multiple Choice)
4.8/5
(33)

PayPal requires the recipient of a payment to have a PayPal account to receive funds.

(True/False)
4.9/5
(36)

Which of the following dimensions of e-commerce security is not provided for by encryption?

(Multiple Choice)
4.8/5
(41)

Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other?

(Multiple Choice)
4.7/5
(34)

Which of the following statements about symmetric key encryption is not true?

(Multiple Choice)
4.8/5
(28)

Insiders present a greater security threat to e-commerce sites than outsiders.

(True/False)
4.8/5
(36)

Most of the world's spam is delivered via which of the following?

(Multiple Choice)
4.8/5
(38)

The most common form of securing a digital channel of communication is ________.

(Short Answer)
4.8/5
(36)

A worm does not need to be activated by a user in order for it to replicate itself.

(True/False)
4.9/5
(33)

A Trojan horse appears to be benign, but then does something other than expected.

(True/False)
4.9/5
(44)

Symmetric key encryption is also known as:

(Multiple Choice)
4.7/5
(44)

The ________ worm was designed to disarm computers that control the centrifuges in Iran's uranium enrichment process.

(Short Answer)
4.9/5
(41)

The exploitation of human fallibility and gullibility to distribute malware is known as ________.

(Short Answer)
4.8/5
(34)
Showing 21 - 40 of 75
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)