Exam 5: E-Commerce Security and Payment Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

______________ is not an example of malicious code.

Free
(Multiple Choice)
4.7/5
(37)
Correct Answer:
Verified

D

Which dimension(s)of security is spoofing a threat to?

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

C

____________ refers to the ability to ensure that an e-commerce site continues to function as intended.

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

C

Symmetric key cryptography is also known as:

(Multiple Choice)
4.8/5
(37)

Linden Dollars,created for use in Second Life,are an example of:

(Multiple Choice)
4.8/5
(36)

An intrusion detection system can perform all of the following functions except:

(Multiple Choice)
4.8/5
(35)

Typically,the more security measures added to an e-commerce site,the slower and more difficult it becomes to use.

(True/False)
4.9/5
(30)

Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties.

(True/False)
4.9/5
(29)

All of the following statements about PKI are true except:

(Multiple Choice)
4.9/5
(32)

What is the Internet of Things (IoT)and what security issues and challenges does it raise?

(Essay)
4.9/5
(38)

All of the following are methods of securing channels of communication except:

(Multiple Choice)
4.9/5
(39)

A Trojan horse appears to be benign,but then does something other than expected.

(True/False)
4.8/5
(28)

Which of the following has the Internet Advertising Bureau urged advertisers to abandon?

(Multiple Choice)
4.8/5
(40)

Spoofing a website is a threat to the integrity of the website.

(True/False)
4.9/5
(31)

Factoring Attack on RSA-Export Keys (FREAK)is an example of a software vulnerability.

(True/False)
4.7/5
(35)

PayPal is the most popular alternative payment method in the United States.

(True/False)
4.8/5
(34)

PayPal is an example of a(n):

(Multiple Choice)
4.7/5
(35)

A worm does not need to be activated by a user for it to replicate itself.

(True/False)
4.8/5
(37)

Discuss and explain malicious code threats and how they work.Include the different types of viruses.

(Essay)
4.8/5
(42)

Accessing data without authorization on Dropbox is an example of which of the following?

(Multiple Choice)
4.7/5
(35)
Showing 1 - 20 of 85
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)