Exam 5: E-Commerce Security and Payment Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Automatically redirecting a web link to a different address is an example of:

(Multiple Choice)
4.9/5
(36)

Which of the following is the most common protocol for securing a digital channel of communication?

(Multiple Choice)
4.9/5
(34)

All the following statements about symmetric key cryptography are true except:

(Multiple Choice)
4.9/5
(27)

______________ refers to the ability to ensure that e-commerce participants do not deny their online actions.

(Multiple Choice)
4.9/5
(40)

Describe the Great Cannon.Who developed it,how has it been used,and how does it differ from the Great Firewall?

(Essay)
4.9/5
(34)

Define and explain how EBPP systems work.Describe each of the main EBPP business models.

(Essay)
4.8/5
(33)

What dimensions do digital signatures and hash digests add to public key cryptography? Describe how this technology works.

(Essay)
4.8/5
(41)

_____________ is the current standard used to protect Wi-Fi networks.

(Multiple Choice)
4.9/5
(34)

Vishing attacks exploit SMS messages.

(True/False)
4.8/5
(38)

Which of the following statements is not true?

(Multiple Choice)
4.8/5
(27)

To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents,you would use:

(Multiple Choice)
4.9/5
(29)

A ________ is hardware or software component that acts as a filter to prevent unwanted packets from entering a network.

(Multiple Choice)
4.9/5
(31)

There is a finite number of Bitcoins that can be created.

(True/False)
4.9/5
(37)

Discuss the security of communications channels.Include definitions and explanations for the terms Secure Sockets Layer/Transport Layer Security (SSL/TLS),secure negotiated session,session key,and VPN.

(Essay)
4.9/5
(32)

Which of the following was designed to cripple Iranian nuclear centrifuges?

(Multiple Choice)
4.7/5
(35)

What is the first step in developing an e-commerce security plan?

(Multiple Choice)
4.9/5
(40)

Exploit kits are often rented or sold as a commercial product.

(True/False)
4.8/5
(46)

______________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.

(Multiple Choice)
4.9/5
(32)

In 2016,Yahoo revealed that it had experienced which of the following?

(Multiple Choice)
4.7/5
(33)

Angler is an example of a:

(Multiple Choice)
4.8/5
(24)
Showing 41 - 60 of 85
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)