Exam 10: Electronic Commerce Security
Exam 1: Introduction to Electronic Commerce80 Questions
Exam 2: Technology Infrastructure: the Internet and the World Wide Web80 Questions
Exam 3: Selling on the Web80 Questions
Exam 4: Marketing on the Web80 Questions
Exam 5: Business-To-Business Activities: Improving Efficiency and Reducing Costs80 Questions
Exam 6: Social Networking, Mobile Commerce, and Online Auctions80 Questions
Exam 7: The Environment of Electronic Commerce: Legal, Ethical, and Tax Issues80 Questions
Exam 8: Web Server Hardware and Software80 Questions
Exam 9: Electronic Commerce Software80 Questions
Exam 10: Electronic Commerce Security80 Questions
Exam 11: Payment Systems for Electronic Commerce80 Questions
Exam 12: Planning for Electronic Commerce80 Questions
Select questions type
____ refers to programs that are embedded transparently in Web pages and that cause action to occur.
(Multiple Choice)
4.8/5
(40)
A(n)____ is a person or device that is able to listen in on and copy Internet transmissions.
(Multiple Choice)
4.9/5
(38)
A(n)____ is software that attaches itself to another program and can cause damage when the host program is activated.
(Multiple Choice)
4.9/5
(25)
JavaScript can be used to record the URLs of Web pages a user visits.
(True/False)
4.9/5
(34)
____________________ are programs that enhance the capabilities of browsers.
(Short Answer)
4.8/5
(34)
The best-known active content forms are crackers and ActiveScript.
(True/False)
4.7/5
(33)
Cookies can be placed on the client computer by the Web server site, in which case they are called ____________________ cookies.
(Short Answer)
4.8/5
(42)
____________________ security means having all security measures working together to prevent unauthorized disclosure, destruction, or modification of assets.
(Short Answer)
4.9/5
(31)
Developers use active content because it extends the functionality of HTML and moves some data processing chores from the busy server machine to the user's client computer.
(True/False)
4.8/5
(39)
Any organization concerned about protecting its electronic commerce assets should have a(n)____________________ in place.
(Short Answer)
4.8/5
(22)
____ is the protection of individual rights to nondisclosure.
(Multiple Choice)
4.8/5
(35)
Originally, the term ____ was used to describe a dedicated programmer who enjoyed writing complex code that tested the limits of technology.
(Multiple Choice)
4.8/5
(44)
Any act or object that poses a danger to computer assets is known as a ____.
(Multiple Choice)
4.8/5
(29)
A(n)____________________ cookie originates from a Web site other than the site being visited.
(Short Answer)
4.8/5
(31)
A(n)____ is a program hidden inside another program or Web page that masks its true purpose.
(Multiple Choice)
4.8/5
(37)
Apps that contain malware or that collect information from the mobile device and forward it to perpetrators are called a(n)____________________ app.
(Short Answer)
4.9/5
(33)
____ is an area of memory set aside to hold data read from a file or database.
(Multiple Choice)
4.9/5
(35)
Showing 61 - 80 of 80
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)