Exam 5: E-Commerce Security and Payment Systems
Exam 1: The Revolution Is Just Beginning86 Questions
Exam 2: E-Commerce Business Models and Concepts86 Questions
Exam 3: E-Commerce Infrastructure: the Internet, Web, and Mobile Platform86 Questions
Exam 4: Building an E-Commerce Presence: Web Sites, Mobile Sites, and Apps86 Questions
Exam 5: E-Commerce Security and Payment Systems86 Questions
Exam 6: E-Commerce Marketing Concepts: Social, Mobile, Local86 Questions
Exam 7: E-Commerce Marketing Communications86 Questions
Exam 8: Ethical, Social, and Political Issues in E-Commerce86 Questions
Exam 9: Online Retail and Services86 Questions
Exam 10: Online Content and Media86 Questions
Exam 11: Social Networks, Auctions, and Portals86 Questions
Exam 12: B2B E-Commerce: Supply Chain Management and Collaborative Commerce86 Questions
Select questions type
What is the most frequent cause of stolen credit cards and card information today?
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
B
A(n) ________ is a type of firewall that filters communications based on the application being requested.
Free
(Short Answer)
4.8/5
(37)
Correct Answer:
application gateway
What is the last step in developing an e-commerce security plan?
Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
A
All of the following are examples of stored value payment systems except:
(Multiple Choice)
4.9/5
(32)
Which of the following is not a key point of vulnerability when dealing with e-commerce?
(Multiple Choice)
4.8/5
(36)
All of the following statements about debit cards are true except:
(Multiple Choice)
4.9/5
(26)
A(n) ________ vulnerability involves a vulnerability unknown to security experts that is actively exploited before there is a patch available.
(Short Answer)
4.9/5
(31)
To allow employees to connect securely over the Internet to their corporate network, you would use a(n) ________
(Short Answer)
4.9/5
(26)
Typically, the more security measures added to a Web site, the slower and more difficult it becomes to use.
(True/False)
4.8/5
(40)
Insiders present a greater security threat to e-commerce sites than outsiders.
(True/False)
5.0/5
(32)
To internal computers, a proxy server is known as the ________.
(Short Answer)
4.9/5
(42)
All of the following are methods of securing channels of communication except:
(Multiple Choice)
4.9/5
(40)
If you used a symmetric key encryption for large documents, with public key encryption to encrypt and send the symmetric key, you would be using a digital:
(Multiple Choice)
4.8/5
(38)
Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other?
(Multiple Choice)
4.9/5
(31)
All of the following statements about public key encryption are true except:
(Multiple Choice)
4.8/5
(34)
All the following statements about symmetric key encryption are true except:
(Multiple Choice)
4.8/5
(38)
________ refers to the ability to ensure that information being displayed on a Web site, or transmitted or received over the Internet, has not been altered in any way by an unauthorized party.
(Short Answer)
4.8/5
(39)
What is the first step in developing an e-commerce security plan?
(Multiple Choice)
4.9/5
(38)
Define and explain how EBPP systems work. Describe each of the main EBPP business models.
(Essay)
4.9/5
(33)
Showing 1 - 20 of 86
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)