Exam 5: E-Commerce Security and Payment Systems
Exam 1: The Revolution Is Just Beginning75 Questions
Exam 2: E-Commerce Business Models and Concepts75 Questions
Exam 3: E-Commerce Infrastructure: the Internet, Web, and Mobile Platform75 Questions
Exam 4: Building an E-Commerce Presence: Web Sites, Mobile Sites, and Apps75 Questions
Exam 5: E-Commerce Security and Payment Systems75 Questions
Exam 6: E-Commerce Marketing and Advertising Concepts75 Questions
Exam 7: Ethical, Social, and Political Issues in E-Commerce75 Questions
Exam 8: Online Retail and Services75 Questions
Exam 9: Online Content and Media75 Questions
Exam 10: Social Networks, Auctions, and Portals75 Questions
Exam 11: B2b E-Commerce: Supply Chain Management and Collaborative Commerce75 Questions
Select questions type
A(n)________ vulnerability involves a vulnerability unknown to security experts that is actively exploited before there is a patch available.
(Short Answer)
4.8/5
(42)
________ involves misrepresenting oneself by using a fake e-mail address or masquerading as someone else.
(Short Answer)
4.8/5
(40)
________ refers to the ability to ensure that messages and data are only available to those authorized to view them.
(Multiple Choice)
4.8/5
(46)
A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.
(Multiple Choice)
4.8/5
(34)
________ refers to the ability to ensure that an e-commerce site continues to function as intended.
(Multiple Choice)
4.8/5
(42)
All of the following are examples of malicious code except:
(Multiple Choice)
4.9/5
(41)
Malicious code that is designed to take advantage of a security hole in computer software or operating system is called a(n)________.
(Short Answer)
4.9/5
(44)
Explain the difference between symmetric key encryption and public key encryption. Which dimensions of e-commerce security does encryption address?
(Essay)
4.9/5
(34)
Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties.
(True/False)
4.8/5
(33)
The research firm Cybersource estimated that online credit card fraud in the United States amounted to about ________ in 2011.
(Multiple Choice)
4.9/5
(45)
In order to accept payments by credit card, online merchants typically must have a merchant account established with a bank or financial institution.
(True/False)
4.7/5
(33)
The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and:
(Multiple Choice)
4.7/5
(32)
All of the following are methods of securing channels of communication except:
(Multiple Choice)
4.9/5
(38)
What is the most frequent cause of stolen credit cards and card information today?
(Multiple Choice)
4.8/5
(40)
According to the Computer Security Institute's 2011 Computer Crime and Security Survey, which of the following was the most commonly reported type of attack?
(Multiple Choice)
4.8/5
(36)
There are around ________ smartphone users in the United States.
(Multiple Choice)
4.7/5
(40)
Linden Dollars, created for use in Second Life, are an example of:
(Multiple Choice)
4.8/5
(41)
Malware that comes with a downloaded file that a user requests is called a:
(Multiple Choice)
4.9/5
(38)
To allow employees to connect securely over the Internet to their corporate network, you would use a(n)________
(Short Answer)
4.8/5
(39)
Showing 41 - 60 of 75
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)