Exam 5: E-Commerce Security and Payment Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n)________ vulnerability involves a vulnerability unknown to security experts that is actively exploited before there is a patch available.

(Short Answer)
4.8/5
(42)

________ involves misrepresenting oneself by using a fake e-mail address or masquerading as someone else.

(Short Answer)
4.8/5
(40)

________ refers to the ability to ensure that messages and data are only available to those authorized to view them.

(Multiple Choice)
4.8/5
(46)

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

(Multiple Choice)
4.8/5
(34)

________ refers to the ability to ensure that an e-commerce site continues to function as intended.

(Multiple Choice)
4.8/5
(42)

All of the following are examples of malicious code except:

(Multiple Choice)
4.9/5
(41)

Malicious code that is designed to take advantage of a security hole in computer software or operating system is called a(n)________.

(Short Answer)
4.9/5
(44)

TLS does not guarantee server-side authentication.

(True/False)
4.9/5
(31)

Explain the difference between symmetric key encryption and public key encryption. Which dimensions of e-commerce security does encryption address?

(Essay)
4.9/5
(34)

Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties.

(True/False)
4.8/5
(33)

The research firm Cybersource estimated that online credit card fraud in the United States amounted to about ________ in 2011.

(Multiple Choice)
4.9/5
(45)

In order to accept payments by credit card, online merchants typically must have a merchant account established with a bank or financial institution.

(True/False)
4.7/5
(33)

The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and:

(Multiple Choice)
4.7/5
(32)

All of the following are methods of securing channels of communication except:

(Multiple Choice)
4.9/5
(38)

What is the most frequent cause of stolen credit cards and card information today?

(Multiple Choice)
4.8/5
(40)

According to the Computer Security Institute's 2011 Computer Crime and Security Survey, which of the following was the most commonly reported type of attack?

(Multiple Choice)
4.8/5
(36)

There are around ________ smartphone users in the United States.

(Multiple Choice)
4.7/5
(40)

Linden Dollars, created for use in Second Life, are an example of:

(Multiple Choice)
4.8/5
(41)

Malware that comes with a downloaded file that a user requests is called a:

(Multiple Choice)
4.9/5
(38)

To allow employees to connect securely over the Internet to their corporate network, you would use a(n)________

(Short Answer)
4.8/5
(39)
Showing 41 - 60 of 75
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)