Exam 5: E-Commerce Security and Payment Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is a sniffing attack and how does it differ from a MitM attack?

(Essay)
4.8/5
(33)

All of the following are prominent hacktivist groups except:

(Multiple Choice)
4.9/5
(32)

All of the following experienced high-profile data breaches in 2015 except:

(Multiple Choice)
4.9/5
(28)

The Data Encryption Standard uses a(n)________-bit key.

(Multiple Choice)
4.7/5
(29)

Which of the following dimensions of e-commerce security does not involve encryption?

(Multiple Choice)
4.8/5
(38)

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.

(True/False)
4.8/5
(44)

Malware that comes with a downloaded file requested by a user is called a:

(Multiple Choice)
4.7/5
(38)

Conficker is an example of a:

(Multiple Choice)
4.8/5
(31)

Which of the following is an example of an integrity violation of e-commerce security?

(Multiple Choice)
4.8/5
(32)

All of the following are limitations of the existing online credit card payment system except:

(Multiple Choice)
4.9/5
(36)

The attack on Dyn,Twitter,Amazon,and other major organizations in October 2016,is an example of which of the following?

(Multiple Choice)
4.8/5
(43)

Shellshock is an example of which of the following?

(Multiple Choice)
4.9/5
(27)

The overall rate of online credit card fraud is ________ of all online card transactions.

(Multiple Choice)
4.8/5
(29)

All of the following statements about Apple Pay are true except which of the following?

(Multiple Choice)
4.8/5
(34)

Explain how an online credit card transaction works,identifying the parties involved and describing how SSL/TLS is involved.What are the limitations of online credit card payment systems?

(Essay)
4.9/5
(28)

Apple Pay uses near field communication (NFC)chips.

(True/False)
4.9/5
(44)

Confidentiality is sometimes confused with:

(Multiple Choice)
4.9/5
(33)

Which of the following is not an example of a PUP?

(Multiple Choice)
4.9/5
(35)

PCI-DSS is a standard established by which of the following?

(Multiple Choice)
4.7/5
(33)

Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?

(Multiple Choice)
4.7/5
(32)
Showing 21 - 40 of 85
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)