Exam 5: E-Commerce Security and Payment Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is the most frequent cause of stolen credit cards and card information today?

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

B

A(n) ________ is a type of firewall that filters communications based on the application being requested.

Free
(Short Answer)
4.8/5
(37)
Correct Answer:
Verified

application gateway

What is the last step in developing an e-commerce security plan?

Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
Verified

A

All of the following are examples of stored value payment systems except:

(Multiple Choice)
4.9/5
(32)

Which of the following is not a key point of vulnerability when dealing with e-commerce?

(Multiple Choice)
4.8/5
(36)

All of the following statements about debit cards are true except:

(Multiple Choice)
4.9/5
(26)

A(n) ________ vulnerability involves a vulnerability unknown to security experts that is actively exploited before there is a patch available.

(Short Answer)
4.9/5
(31)

To allow employees to connect securely over the Internet to their corporate network, you would use a(n) ________

(Short Answer)
4.9/5
(26)

All of the following statements about PKI are true except:

(Multiple Choice)
4.8/5
(39)

Typically, the more security measures added to a Web site, the slower and more difficult it becomes to use.

(True/False)
4.8/5
(40)

Insiders present a greater security threat to e-commerce sites than outsiders.

(True/False)
5.0/5
(32)

To internal computers, a proxy server is known as the ________.

(Short Answer)
4.9/5
(42)

All of the following are methods of securing channels of communication except:

(Multiple Choice)
4.9/5
(40)

If you used a symmetric key encryption for large documents, with public key encryption to encrypt and send the symmetric key, you would be using a digital:

(Multiple Choice)
4.8/5
(38)

Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other?

(Multiple Choice)
4.9/5
(31)

All of the following statements about public key encryption are true except:

(Multiple Choice)
4.8/5
(34)

All the following statements about symmetric key encryption are true except:

(Multiple Choice)
4.8/5
(38)

________ refers to the ability to ensure that information being displayed on a Web site, or transmitted or received over the Internet, has not been altered in any way by an unauthorized party.

(Short Answer)
4.8/5
(39)

What is the first step in developing an e-commerce security plan?

(Multiple Choice)
4.9/5
(38)

Define and explain how EBPP systems work. Describe each of the main EBPP business models.

(Essay)
4.9/5
(33)
Showing 1 - 20 of 86
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)