Exam 5: E-Commerce Security and Payment Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Symmetric key cryptography is also known as:

(Multiple Choice)
4.9/5
(35)

Malware that comes with a downloaded file that a user requests is called a:

(Multiple Choice)
4.9/5
(41)

Which dimension(s) of security is spoofing a threat to?

(Multiple Choice)
4.9/5
(36)

Discuss and explain the various types of malicious code and how they work. Include the different types of viruses.

(Essay)
4.8/5
(31)

Explain the difference between symmetric key cryptography and public key cryptography. Which dimensions of e-commerce security does encryption address?

(Essay)
4.7/5
(27)

________ refers to the ability to ensure that an e-commerce site continues to function as intended.

(Multiple Choice)
4.8/5
(36)

Zeus is an example of which of the following?

(Multiple Choice)
4.7/5
(35)

Proxy servers are also known as:

(Multiple Choice)
4.8/5
(28)

Using a technique referred to as ________, mobile application developers use their private key to encrypt a digital signature.

(Short Answer)
4.9/5
(38)

Which of the following is the current standard used to protect Wi-Fi networks?

(Multiple Choice)
4.8/5
(30)

To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:

(Multiple Choice)
4.7/5
(31)

Define and explain how EBPP systems work. Describe each of the main EBPP business models.

(Essay)
4.9/5
(35)

Credit cards are the dominant form of online payment throughout the world.

(True/False)
4.8/5
(42)

To internal computers, a proxy server is known as the ________.

(Short Answer)
4.9/5
(39)

A(n) ________ helps organizations locate and fix security flaws.

(Short Answer)
4.9/5
(34)

________ was designed to cripple Iranian nuclear centrifuges.

(Short Answer)
4.8/5
(35)

Which of the following is not a key point of vulnerability when dealing with e-commerce?

(Multiple Choice)
4.7/5
(28)

All of the following are used for authentication except:

(Multiple Choice)
4.8/5
(33)

What dimensions do digital signatures and hash digests add to public key cryptography and how do they work?

(Essay)
4.7/5
(31)

To allow employees to connect securely over the Internet to their corporate network, you would use a(n) ________.

(Short Answer)
4.9/5
(30)
Showing 61 - 80 of 86
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)