Exam 5: E-Commerce Security and Payment Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

All of the following experienced high-profile data breaches in 2013 except:

(Multiple Choice)
4.8/5
(35)

________ typically attack governments, organizations, and sometimes individuals for political purposes.

(Short Answer)
4.8/5
(41)

Accessing data without authorization on Dropbox is an example of which of the following?

(Multiple Choice)
4.9/5
(40)

Linden Dollars, created for use in Second Life, are an example of:

(Multiple Choice)
4.8/5
(39)

A worm needs to be activated by a user in order for it to replicate itself.

(True/False)
4.8/5
(29)

________ relies on human curiosity, greed, and gullibility to trick people into taking action that will result in the downloading of malware.

(Short Answer)
4.9/5
(27)

All of the following are methods of securing channels of communication except:

(Multiple Choice)
4.8/5
(43)

A(n) ________ vulnerability involves a vulnerability unknown to security experts that is actively exploited before there is a patch available.

(Short Answer)
4.9/5
(42)

All of the following statements about public key cryptography are True except:

(Multiple Choice)
4.8/5
(31)

An intrusion detection system can perform all of the following functions except:

(Multiple Choice)
5.0/5
(38)

________ refers to the ability to ensure that messages and data are only available to those authorized to view them.

(Multiple Choice)
4.8/5
(41)

Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.

(True/False)
4.7/5
(31)

A Trojan horse appears to be benign, but then does something other than expected.

(True/False)
4.9/5
(42)

PayPal is an example of what type of payment system?

(Multiple Choice)
4.9/5
(35)

Which of the following dimensions of e-commerce security is not provided for by encryption?

(Multiple Choice)
4.8/5
(36)

In 2013, the Target retail chain experienced which of the following?

(Multiple Choice)
4.8/5
(32)

All of the following are limitations of the existing online credit card payment system except:

(Multiple Choice)
4.7/5
(37)

There is a finite number of Bitcoins that can be created.

(True/False)
4.9/5
(32)

All of the following statements about PKI are True except:

(Multiple Choice)
4.8/5
(40)

A fingerprint or retina (eye) scan is an example of ________.

(Short Answer)
4.8/5
(40)
Showing 41 - 60 of 86
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)