Exam 5: E-Commerce Security and Payment Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is not a major trend in e-commerce payments in 2016-2017?

(Multiple Choice)
4.8/5
(40)

Next generation firewalls provide all of the following except:

(Multiple Choice)
4.8/5
(38)

SLS/TLS cannot provide irrefutability.

(True/False)
4.9/5
(31)

________ refers to the ability to ensure that messages and data are only available to those authorized to view them.

(Multiple Choice)
4.8/5
(42)

In 2015,online bill payment accounted for ________ of all bill payments,while paper checks accounted for ________.

(Multiple Choice)
4.8/5
(33)

Why is it difficult to accurately estimate the actual amount of cybercrime?

(Essay)
4.8/5
(27)

________ typically attack governments,organizations,and sometimes individuals for political purposes.

(Multiple Choice)
4.8/5
(34)

Which of the following statements is not true?

(Multiple Choice)
4.9/5
(38)

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

(Multiple Choice)
4.8/5
(32)

All of the following are used for authentication except:

(Multiple Choice)
4.8/5
(40)

Which of the following statements is not true?

(Multiple Choice)
4.8/5
(38)

What is the most frequent cause of stolen credit cards and card information today?

(Multiple Choice)
4.8/5
(34)

Proxy servers are also known as:

(Multiple Choice)
4.8/5
(38)

According to Ponemon Institute's 2015 survey,which of the following was not among the causes of the costliest cybercrimes?

(Multiple Choice)
4.8/5
(34)

CryptoLocker is an example of ransomware.

(True/False)
4.7/5
(39)

Explain the difference between symmetric key cryptography and public key cryptography.Which dimensions of e-commerce security does encryption address?

(Essay)
5.0/5
(35)

Which of the following is not an example of an access control?

(Multiple Choice)
5.0/5
(33)

All of the following statements about public key cryptography are true except:

(Multiple Choice)
5.0/5
(47)

Which of the following is the leading cause of data breaches?

(Multiple Choice)
4.8/5
(39)

Bitcoins are an example of:

(Multiple Choice)
4.8/5
(36)
Showing 61 - 80 of 85
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)