Exam 5: E-Commerce Security and Payment Systems
Exam 1: The Revolution Is Just Beginning75 Questions
Exam 2: E-Commerce Business Models and Concepts75 Questions
Exam 3: E-Commerce Infrastructure: the Internet, Web, and Mobile Platform75 Questions
Exam 4: Building an E-Commerce Presence: Web Sites, Mobile Sites, and Apps75 Questions
Exam 5: E-Commerce Security and Payment Systems75 Questions
Exam 6: E-Commerce Marketing and Advertising Concepts75 Questions
Exam 7: Ethical, Social, and Political Issues in E-Commerce75 Questions
Exam 8: Online Retail and Services75 Questions
Exam 9: Online Content and Media75 Questions
Exam 10: Social Networks, Auctions, and Portals75 Questions
Exam 11: B2b E-Commerce: Supply Chain Management and Collaborative Commerce75 Questions
Select questions type
All of the following are factors in contributing to the increase in cybercrime except:
(Multiple Choice)
4.9/5
(41)
An example of a privacy violation of e-commerce security is:
(Multiple Choice)
4.9/5
(37)
Which of the following statements about public key encryption is not true?
(Multiple Choice)
4.8/5
(36)
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:
(Multiple Choice)
4.8/5
(30)
Define and explain how EBPP systems work. Describe each of the main EBPP business models.
(Essay)
4.9/5
(37)
Which of the following left the WikiLeaks Web site effectively inoperable in August 2012?
(Multiple Choice)
4.8/5
(47)
P2P payment systems are a variation on what type of payment system?
(Multiple Choice)
4.8/5
(39)
Which of the following is not a key point of vulnerability when dealing with e-commerce?
(Multiple Choice)
4.8/5
(33)
PayPal requires the recipient of a payment to have a PayPal account to receive funds.
(True/False)
4.9/5
(36)
Which of the following dimensions of e-commerce security is not provided for by encryption?
(Multiple Choice)
4.8/5
(41)
Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other?
(Multiple Choice)
4.7/5
(34)
Which of the following statements about symmetric key encryption is not true?
(Multiple Choice)
4.8/5
(28)
Insiders present a greater security threat to e-commerce sites than outsiders.
(True/False)
4.8/5
(36)
Most of the world's spam is delivered via which of the following?
(Multiple Choice)
4.8/5
(38)
The most common form of securing a digital channel of communication is ________.
(Short Answer)
4.8/5
(36)
A worm does not need to be activated by a user in order for it to replicate itself.
(True/False)
4.9/5
(33)
A Trojan horse appears to be benign, but then does something other than expected.
(True/False)
4.9/5
(44)
The ________ worm was designed to disarm computers that control the centrifuges in Iran's uranium enrichment process.
(Short Answer)
4.9/5
(41)
The exploitation of human fallibility and gullibility to distribute malware is known as ________.
(Short Answer)
4.8/5
(34)
Showing 21 - 40 of 75
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)