Exam 10: Electronic Commerce Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

One disadvantage of private-key systems is that encryption and decryption are significantly slower than public-key systems.

(True/False)
4.8/5
(35)

A(n)____________________ security device is one that uses an element of a person's biological makeup to perform the identification.

(Short Answer)
4.7/5
(42)

Java applets operating in a sandbox can perform file input, output, or delete operations.

(True/False)
4.9/5
(39)

Briefly describe the requirements for secure electronic commerce.

(Essay)
4.7/5
(26)

____ refers to preventing data delays or denials.

(Multiple Choice)
4.8/5
(37)

A(n)____________________ is an attachment to an e-mail message or program embedded in a Web page that verifies that the sender or Web site is who it claims to be.

(Short Answer)
4.7/5
(29)

Threats that are deemed low risk and unlikely to occur can be ignored when the cost to protect against the threat exceeds the value of the protected asset.

(True/False)
4.8/5
(33)

____________________ is the coding of information by using a mathematically based program and a secret key to produce a string of characters that is unintelligible.

(Short Answer)
4.8/5
(30)

A(n)____ allows anyone with knowledge of its existence to cause damage by observing transactions, deleting data, or stealing data.

(Multiple Choice)
4.8/5
(38)

Java is a programming language used widely in Web pages to provide active content.

(True/False)
4.8/5
(37)

The term ____ describes the process of hiding information within another piece of information.

(Multiple Choice)
4.9/5
(46)

What are the six main elements included on a digital certificate?

(Essay)
4.7/5
(36)

A Web server can compromise ____ if it allows automatic directory listings.

(Multiple Choice)
4.8/5
(30)

____________________ cookies remain on the client machine indefinitely.

(Short Answer)
4.9/5
(36)

A computer that has experienced a necessity threat slows processing to an intolerably slow speed.

(True/False)
5.0/5
(36)

When a Windows-based Web browser downloads a Web page containing an embedded ActiveX control, the control is executed on the client computer.

(True/False)
4.9/5
(33)

The most complete way for Web site visitors to protect themselves from revealing private information or being tracked by cookies is to disable cookies entirely.

(True/False)
4.8/5
(34)

A digital certificate for software can attest to the quality of the software.

(True/False)
4.9/5
(41)

The program that transforms normal text into cipher text is called a(n)____________________ program.

(Short Answer)
4.9/5
(38)

A(n)____________________ is simply a number that is used with the encryption algorithm to "lock" the characters of the message being protected so that they are undecipherable without the key.

(Short Answer)
4.9/5
(38)
Showing 41 - 60 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)