Exam 10: Electronic Commerce Security
Exam 1: Introduction to Electronic Commerce80 Questions
Exam 2: Technology Infrastructure: the Internet and the World Wide Web80 Questions
Exam 3: Selling on the Web80 Questions
Exam 4: Marketing on the Web80 Questions
Exam 5: Business-To-Business Activities: Improving Efficiency and Reducing Costs80 Questions
Exam 6: Social Networking, Mobile Commerce, and Online Auctions80 Questions
Exam 7: The Environment of Electronic Commerce: Legal, Ethical, and Tax Issues80 Questions
Exam 8: Web Server Hardware and Software80 Questions
Exam 9: Electronic Commerce Software80 Questions
Exam 10: Electronic Commerce Security80 Questions
Exam 11: Payment Systems for Electronic Commerce80 Questions
Exam 12: Planning for Electronic Commerce80 Questions
Select questions type
____ encryption encodes a message with an algorithm that uses a single numeric key, such as 456839420783, to encode and decode data.
Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
B
A Web browser that has entered into an SSL session indicates that it is in an encrypted session.
Free
(True/False)
4.8/5
(35)
Correct Answer:
True
When Java applets are run within the constraints of the sandbox, they have full access to the client computer.
Free
(True/False)
4.8/5
(38)
Correct Answer:
False
____________________ exists when an unauthorized party can alter a message stream of information.
(Short Answer)
4.9/5
(29)
Any message traveling on the Internet is subject to secrecy, integrity, and necessity threats.
(True/False)
4.9/5
(39)
____ is the protection of computer assets from unauthorized access, use, alteration, or destruction.
(Multiple Choice)
4.8/5
(29)
____ refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data source.
(Multiple Choice)
4.8/5
(39)
Message packets on the Internet travel a planned path from a source node to a destination node.
(True/False)
4.8/5
(32)
Active content is launched in a Web browser automatically when that browser loads a Web page containing active content.
(True/False)
4.7/5
(32)
The shorter the session key, the more resistant the encryption is to attack.
(True/False)
4.8/5
(43)
____ is the electronic defacing of an existing Web site's page.
(Multiple Choice)
4.9/5
(36)
In some cities that have large concentrations of wireless networks, attackers, called ____________________, drive around in cars using their wireless-equipped laptop computers to search for accessible networks.
(Short Answer)
4.8/5
(32)
A(n)____ is an object that contains programs and properties that Web designers place on Web pages to perform particular tasks.
(Multiple Choice)
4.8/5
(30)
The process of proposing and accepting (or rejecting)various transmission conditions is called session ____________________.
(Short Answer)
4.8/5
(39)
JavaScript programs, like Java applets, operate under the restrictions of the Java sandbox security model.
(True/False)
5.0/5
(27)
A(n)____________________ is a Trojan horse that secretly takes over another computer for the purpose of launching attacks on other computers.
(Short Answer)
4.9/5
(36)
____ is pretending to be someone you are not or representing a Web site as an original when it is really a fake.
(Multiple Choice)
4.9/5
(36)
Showing 1 - 20 of 80
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)