Exam 5: E-Commerce Security and Payment Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

________ typically handle verification of accounts and balances in the credit card system.

(Essay)
4.9/5
(39)

________ refers to the ability to ensure that e-commerce participants do not deny their online actions.

(Multiple Choice)
4.9/5
(30)

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

(Multiple Choice)
4.9/5
(31)

P2P payment systems are a variation on what type of payment system?

(Multiple Choice)
4.7/5
(36)

In order to accept payments by credit card, online merchants typically must have a merchant account established with a bank or financial institution.

(True/False)
4.9/5
(29)

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.

(True/False)
4.7/5
(41)

An example of a privacy violation of e-commerce security is:

(Multiple Choice)
4.9/5
(31)

A worm does not need to be activated by a user in order for it to replicate itself.

(True/False)
4.8/5
(38)

The United States federal government has historically not been in favor of the development and export of strong encryption systems.

(True/False)
4.8/5
(33)

Which of the following is a prominent hacktivist group?

(Multiple Choice)
5.0/5
(33)

A(n) ________ is a hacker that believes he or she is pursing some greater good by breaking in and revealing system flaws.

(Short Answer)
4.9/5
(33)

Credit cards are the dominant form of online payment throughout the world.

(True/False)
4.8/5
(29)

TLS does not guarantee server-side authentication.

(True/False)
4.9/5
(30)

Most of the world's spam is delivered via which of the following?

(Multiple Choice)
4.9/5
(35)

The exploitation of human fallibility and gullibility to distribute malware is known as ________.

(Short Answer)
4.8/5
(37)

Phishing attacks rely on browser parasites.

(True/False)
4.9/5
(33)

Botnets are typically used for all of the following except:

(Multiple Choice)
4.9/5
(35)

Which of the following is not an example of an access control?

(Multiple Choice)
4.9/5
(35)

To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:

(Multiple Choice)
4.8/5
(35)

The Data Encryption Standard uses a(n) ________-bit key.

(Multiple Choice)
4.9/5
(38)
Showing 21 - 40 of 86
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)