Exam 5: E-Commerce Security and Payment Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is an example of an integrity violation of e-commerce security?

(Multiple Choice)
4.8/5
(39)

The Computer Security Institute reported in its 2011 survey that approximately ________ percent of responding organizations experienced a computer security incident within the previous 12 months.

(Multiple Choice)
4.7/5
(31)

All of the following are limitations of the existing online credit card payment system except:

(Multiple Choice)
4.8/5
(29)

________ is a widely used e-mail public key encryption software tool.

(Short Answer)
4.8/5
(29)

All of the following are features of cash except:

(Multiple Choice)
4.8/5
(43)

Linden Dollars, created for use in Second Life, are an example of:

(Multiple Choice)
4.7/5
(34)

________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.

(Multiple Choice)
4.8/5
(35)

The overall rate of online credit card fraud is ________ percent of all online card transactions.

(Multiple Choice)
4.7/5
(32)

A digital certificate contains all of the following except the:

(Multiple Choice)
4.7/5
(30)

Which of the following is the primary federal statute used to combat computer crime?

(Multiple Choice)
4.8/5
(36)

The Conficker worm targeted:

(Multiple Choice)
4.9/5
(36)

Spoofing a Web site is also called ________.

(Short Answer)
4.7/5
(33)

Explain the difference between symmetric key encryption and public key encryption. Which dimensions of e-commerce security does encryption address?

(Essay)
4.8/5
(35)

Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties.

(True/False)
4.8/5
(45)

The most common form of securing a digital channel of communication is ________.

(Short Answer)
4.9/5
(37)

Drive-by downloads are now the most common method of infecting computers.

(True/False)
4.8/5
(35)

Proxy servers are also known as:

(Multiple Choice)
4.9/5
(39)

Symmetric key encryption is also known as:

(Multiple Choice)
4.9/5
(38)

Which of the following dimensions of e-commerce security is not provided for by encryption?

(Multiple Choice)
4.7/5
(44)

The study of measurable biological or physical characteristics is called ________.

(Short Answer)
4.8/5
(24)
Showing 61 - 80 of 86
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)