Exam 10: Electronic Commerce Security
Exam 1: Introduction to Electronic Commerce80 Questions
Exam 2: Technology Infrastructure: the Internet and the World Wide Web80 Questions
Exam 3: Selling on the Web80 Questions
Exam 4: Marketing on the Web80 Questions
Exam 5: Business-To-Business Activities: Improving Efficiency and Reducing Costs80 Questions
Exam 6: Social Networking, Mobile Commerce, and Online Auctions80 Questions
Exam 7: The Environment of Electronic Commerce: Legal, Ethical, and Tax Issues80 Questions
Exam 8: Web Server Hardware and Software80 Questions
Exam 9: Electronic Commerce Software80 Questions
Exam 10: Electronic Commerce Security80 Questions
Exam 11: Payment Systems for Electronic Commerce80 Questions
Exam 12: Planning for Electronic Commerce80 Questions
Select questions type
One disadvantage of private-key systems is that encryption and decryption are significantly slower than public-key systems.
(True/False)
4.8/5
(35)
A(n)____________________ security device is one that uses an element of a person's biological makeup to perform the identification.
(Short Answer)
4.7/5
(42)
Java applets operating in a sandbox can perform file input, output, or delete operations.
(True/False)
4.9/5
(39)
A(n)____________________ is an attachment to an e-mail message or program embedded in a Web page that verifies that the sender or Web site is who it claims to be.
(Short Answer)
4.7/5
(29)
Threats that are deemed low risk and unlikely to occur can be ignored when the cost to protect against the threat exceeds the value of the protected asset.
(True/False)
4.8/5
(33)
____________________ is the coding of information by using a mathematically based program and a secret key to produce a string of characters that is unintelligible.
(Short Answer)
4.8/5
(30)
A(n)____ allows anyone with knowledge of its existence to cause damage by observing transactions, deleting data, or stealing data.
(Multiple Choice)
4.8/5
(38)
Java is a programming language used widely in Web pages to provide active content.
(True/False)
4.8/5
(37)
The term ____ describes the process of hiding information within another piece of information.
(Multiple Choice)
4.9/5
(46)
A Web server can compromise ____ if it allows automatic directory listings.
(Multiple Choice)
4.8/5
(30)
____________________ cookies remain on the client machine indefinitely.
(Short Answer)
4.9/5
(36)
A computer that has experienced a necessity threat slows processing to an intolerably slow speed.
(True/False)
5.0/5
(36)
When a Windows-based Web browser downloads a Web page containing an embedded ActiveX control, the control is executed on the client computer.
(True/False)
4.9/5
(33)
The most complete way for Web site visitors to protect themselves from revealing private information or being tracked by cookies is to disable cookies entirely.
(True/False)
4.8/5
(34)
A digital certificate for software can attest to the quality of the software.
(True/False)
4.9/5
(41)
The program that transforms normal text into cipher text is called a(n)____________________ program.
(Short Answer)
4.9/5
(38)
A(n)____________________ is simply a number that is used with the encryption algorithm to "lock" the characters of the message being protected so that they are undecipherable without the key.
(Short Answer)
4.9/5
(38)
Showing 41 - 60 of 80
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)