Exam 10: Electronic Commerce Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____ encryption encodes a message with an algorithm that uses a single numeric key, such as 456839420783, to encode and decode data.

Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
Verified

B

A Web browser that has entered into an SSL session indicates that it is in an encrypted session.

Free
(True/False)
4.8/5
(35)
Correct Answer:
Verified

True

When Java applets are run within the constraints of the sandbox, they have full access to the client computer.

Free
(True/False)
4.8/5
(38)
Correct Answer:
Verified

False

____________________ exists when an unauthorized party can alter a message stream of information.

(Short Answer)
4.9/5
(29)

Any message traveling on the Internet is subject to secrecy, integrity, and necessity threats.

(True/False)
4.9/5
(39)

____ is the protection of computer assets from unauthorized access, use, alteration, or destruction.

(Multiple Choice)
4.8/5
(29)

____ refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data source.

(Multiple Choice)
4.8/5
(39)

Message packets on the Internet travel a planned path from a source node to a destination node.

(True/False)
4.8/5
(32)

Active content is launched in a Web browser automatically when that browser loads a Web page containing active content.

(True/False)
4.7/5
(32)

The shorter the session key, the more resistant the encryption is to attack.

(True/False)
4.8/5
(43)

____ is the electronic defacing of an existing Web site's page.

(Multiple Choice)
4.9/5
(36)

In some cities that have large concentrations of wireless networks, attackers, called ____________________, drive around in cars using their wireless-equipped laptop computers to search for accessible networks.

(Short Answer)
4.8/5
(32)

Worms can spread quickly through the Internet.

(True/False)
4.8/5
(30)

Absolute security is relatively easy to achieve.

(True/False)
4.8/5
(28)

A(n)____ is an object that contains programs and properties that Web designers place on Web pages to perform particular tasks.

(Multiple Choice)
4.8/5
(30)

Digital certificates never expire.

(True/False)
4.8/5
(34)

The process of proposing and accepting (or rejecting)various transmission conditions is called session ____________________.

(Short Answer)
4.8/5
(39)

JavaScript programs, like Java applets, operate under the restrictions of the Java sandbox security model.

(True/False)
5.0/5
(27)

A(n)____________________ is a Trojan horse that secretly takes over another computer for the purpose of launching attacks on other computers.

(Short Answer)
4.9/5
(36)

____ is pretending to be someone you are not or representing a Web site as an original when it is really a fake.

(Multiple Choice)
4.9/5
(36)
Showing 1 - 20 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)