Exam 10: Electronic Commerce Security
Exam 1: Introduction to Electronic Commerce80 Questions
Exam 2: Technology Infrastructure: the Internet and the World Wide Web80 Questions
Exam 3: Selling on the Web80 Questions
Exam 4: Marketing on the Web80 Questions
Exam 5: Business-To-Business Activities: Improving Efficiency and Reducing Costs80 Questions
Exam 6: Social Networking, Mobile Commerce, and Online Auctions80 Questions
Exam 7: The Environment of Electronic Commerce: Legal, Ethical, and Tax Issues80 Questions
Exam 8: Web Server Hardware and Software80 Questions
Exam 9: Electronic Commerce Software80 Questions
Exam 10: Electronic Commerce Security80 Questions
Exam 11: Payment Systems for Electronic Commerce80 Questions
Exam 12: Planning for Electronic Commerce80 Questions
Select questions type
______________________________ are the computers on the Internet that maintain directories that link domain names to IP addresses.
(Essay)
4.8/5
(33)
Software applications called ____ provide the means to record information that passes through a computer or router that is handling Internet traffic.
(Multiple Choice)
4.8/5
(27)
____________________ Java applets are those that have not been established as secure.
(Short Answer)
4.8/5
(31)
A(n)____________________ occurs when an Internet e-mail message is intercepted and its contents are changed before it is forwarded to its original destination.
(Short Answer)
4.9/5
(34)
The purpose of a(n)____ is to provide a way for a third-party Web site to place cookies from that third-party site on a visitor's computer.
(Multiple Choice)
4.9/5
(32)
A Web ____________________ is a tiny graphic that a third-party Web site places on another site's Web page.
(Short Answer)
4.7/5
(32)
Asymmetric encryption is also known as ____________________ encryption.
(Short Answer)
4.7/5
(41)
The protection of assets using nonphysical means is called ____ security.
(Multiple Choice)
4.8/5
(42)
____________________ is the general name for a procedure, either physical or logical, that recognizes, reduces, or eliminates a threat.
(Short Answer)
4.7/5
(25)
ActiveX controls run only on computers with ____ operating systems.
(Multiple Choice)
4.9/5
(42)
____________________ is used in electronic commerce to place items into a shopping cart and compute a total invoice amount, including sales tax, handling, and shipping costs.
(Short Answer)
4.8/5
(22)
E-mail secrecy issues address whether company supervisors should be permitted to read employees' messages randomly.
(True/False)
4.7/5
(26)
____________________ cookies exists until the Web client ends the connection.
(Short Answer)
4.8/5
(34)
One significant threat to electronic commerce is theft of sensitive or personal information.
(True/False)
4.8/5
(42)
The element of necessity in computer security refers to preventing data delays or denials (removal).
(True/False)
4.8/5
(37)
The science that studies encryption is called ____________________.
(Short Answer)
4.9/5
(37)
Showing 21 - 40 of 80
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)