Exam 5: E-Commerce Security and Payment Systems
Exam 1: The Revolution Is Just Beginning86 Questions
Exam 2: E-Commerce Business Models and Concepts86 Questions
Exam 3: E-Commerce Infrastructure: the Internet, Web, and Mobile Platform86 Questions
Exam 4: Building an E-Commerce Presence: Web Sites, Mobile Sites, and Apps86 Questions
Exam 5: E-Commerce Security and Payment Systems86 Questions
Exam 6: E-Commerce Marketing Concepts: Social, Mobile, Local86 Questions
Exam 7: E-Commerce Marketing Communications86 Questions
Exam 8: Ethical, Social, and Political Issues in E-Commerce86 Questions
Exam 9: Online Retail and Services86 Questions
Exam 10: Online Content and Media86 Questions
Exam 11: Social Networks, Auctions, and Portals86 Questions
Exam 12: B2B E-Commerce: Supply Chain Management and Collaborative Commerce86 Questions
Select questions type
________ typically handle verification of accounts and balances in the credit card system.
(Essay)
4.9/5
(39)
________ refers to the ability to ensure that e-commerce participants do not deny their online actions.
(Multiple Choice)
4.9/5
(30)
A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.
(Multiple Choice)
4.9/5
(31)
P2P payment systems are a variation on what type of payment system?
(Multiple Choice)
4.7/5
(36)
In order to accept payments by credit card, online merchants typically must have a merchant account established with a bank or financial institution.
(True/False)
4.9/5
(29)
The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.
(True/False)
4.7/5
(41)
An example of a privacy violation of e-commerce security is:
(Multiple Choice)
4.9/5
(31)
A worm does not need to be activated by a user in order for it to replicate itself.
(True/False)
4.8/5
(38)
The United States federal government has historically not been in favor of the development and export of strong encryption systems.
(True/False)
4.8/5
(33)
A(n) ________ is a hacker that believes he or she is pursing some greater good by breaking in and revealing system flaws.
(Short Answer)
4.9/5
(33)
Credit cards are the dominant form of online payment throughout the world.
(True/False)
4.8/5
(29)
Most of the world's spam is delivered via which of the following?
(Multiple Choice)
4.9/5
(35)
The exploitation of human fallibility and gullibility to distribute malware is known as ________.
(Short Answer)
4.8/5
(37)
Botnets are typically used for all of the following except:
(Multiple Choice)
4.9/5
(35)
Which of the following is not an example of an access control?
(Multiple Choice)
4.9/5
(35)
To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:
(Multiple Choice)
4.8/5
(35)
Showing 21 - 40 of 86
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)