Exam 5: E-Commerce Security and Payment Systems
Exam 1: The Revolution Is Just Beginning86 Questions
Exam 2: E-Commerce Business Models and Concepts86 Questions
Exam 3: E-Commerce Infrastructure: the Internet, Web, and Mobile Platform86 Questions
Exam 4: Building an E-Commerce Presence: Web Sites, Mobile Sites, and Apps86 Questions
Exam 5: E-Commerce Security and Payment Systems86 Questions
Exam 6: E-Commerce Marketing Concepts: Social, Mobile, Local86 Questions
Exam 7: E-Commerce Marketing Communications86 Questions
Exam 8: Ethical, Social, and Political Issues in E-Commerce86 Questions
Exam 9: Online Retail and Services86 Questions
Exam 10: Online Content and Media86 Questions
Exam 11: Social Networks, Auctions, and Portals86 Questions
Exam 12: B2B E-Commerce: Supply Chain Management and Collaborative Commerce86 Questions
Select questions type
Which of the following is an example of an integrity violation of e-commerce security?
(Multiple Choice)
4.8/5
(39)
The Computer Security Institute reported in its 2011 survey that approximately ________ percent of responding organizations experienced a computer security incident within the previous 12 months.
(Multiple Choice)
4.7/5
(31)
All of the following are limitations of the existing online credit card payment system except:
(Multiple Choice)
4.8/5
(29)
________ is a widely used e-mail public key encryption software tool.
(Short Answer)
4.8/5
(29)
Linden Dollars, created for use in Second Life, are an example of:
(Multiple Choice)
4.7/5
(34)
________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.
(Multiple Choice)
4.8/5
(35)
The overall rate of online credit card fraud is ________ percent of all online card transactions.
(Multiple Choice)
4.7/5
(32)
A digital certificate contains all of the following except the:
(Multiple Choice)
4.7/5
(30)
Which of the following is the primary federal statute used to combat computer crime?
(Multiple Choice)
4.8/5
(36)
Explain the difference between symmetric key encryption and public key encryption. Which dimensions of e-commerce security does encryption address?
(Essay)
4.8/5
(35)
Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties.
(True/False)
4.8/5
(45)
The most common form of securing a digital channel of communication is ________.
(Short Answer)
4.9/5
(37)
Drive-by downloads are now the most common method of infecting computers.
(True/False)
4.8/5
(35)
Which of the following dimensions of e-commerce security is not provided for by encryption?
(Multiple Choice)
4.7/5
(44)
The study of measurable biological or physical characteristics is called ________.
(Short Answer)
4.8/5
(24)
Showing 61 - 80 of 86
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)