Exam 10: Electronic Commerce Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

______________________________ are the computers on the Internet that maintain directories that link domain names to IP addresses.

(Essay)
4.8/5
(33)

Software applications called ____ provide the means to record information that passes through a computer or router that is handling Internet traffic.

(Multiple Choice)
4.8/5
(27)

____________________ Java applets are those that have not been established as secure.

(Short Answer)
4.8/5
(31)

A(n)____________________ occurs when an Internet e-mail message is intercepted and its contents are changed before it is forwarded to its original destination.

(Short Answer)
4.9/5
(34)

The purpose of a(n)____ is to provide a way for a third-party Web site to place cookies from that third-party site on a visitor's computer.

(Multiple Choice)
4.9/5
(32)

A Web ____________________ is a tiny graphic that a third-party Web site places on another site's Web page.

(Short Answer)
4.7/5
(32)

Asymmetric encryption is also known as ____________________ encryption.

(Short Answer)
4.7/5
(41)

The protection of assets using nonphysical means is called ____ security.

(Multiple Choice)
4.8/5
(42)

____________________ is the general name for a procedure, either physical or logical, that recognizes, reduces, or eliminates a threat.

(Short Answer)
4.7/5
(25)

What is the difference between a virus and a worm?

(Essay)
4.7/5
(32)

ActiveX controls run only on computers with ____ operating systems.

(Multiple Choice)
4.9/5
(42)

____________________ is used in electronic commerce to place items into a shopping cart and compute a total invoice amount, including sales tax, handling, and shipping costs.

(Short Answer)
4.8/5
(22)

Java is a programming language developed by ____.

(Multiple Choice)
4.7/5
(36)

Describe the security dangers inherent in ActiveX controls.

(Essay)
4.7/5
(38)

E-mail secrecy issues address whether company supervisors should be permitted to read employees' messages randomly.

(True/False)
4.7/5
(26)

____________________ cookies exists until the Web client ends the connection.

(Short Answer)
4.8/5
(34)

One significant threat to electronic commerce is theft of sensitive or personal information.

(True/False)
4.8/5
(42)

The element of necessity in computer security refers to preventing data delays or denials (removal).

(True/False)
4.8/5
(37)

The science that studies encryption is called ____________________.

(Short Answer)
4.9/5
(37)

Secrecy protection is a legal matter.

(True/False)
4.7/5
(33)
Showing 21 - 40 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)