Exam 10: Electronic Commerce Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____ refers to programs that are embedded transparently in Web pages and that cause action to occur.

(Multiple Choice)
4.8/5
(40)

A(n)____ is a person or device that is able to listen in on and copy Internet transmissions.

(Multiple Choice)
4.9/5
(38)

A(n)____ is software that attaches itself to another program and can cause damage when the host program is activated.

(Multiple Choice)
4.9/5
(25)

How might a buffer in a Web server cause security threats?

(Essay)
4.8/5
(31)

JavaScript can be used to record the URLs of Web pages a user visits.

(True/False)
4.9/5
(34)

____________________ are programs that enhance the capabilities of browsers.

(Short Answer)
4.8/5
(34)

The best-known active content forms are crackers and ActiveScript.

(True/False)
4.7/5
(33)

Cookies can be placed on the client computer by the Web server site, in which case they are called ____________________ cookies.

(Short Answer)
4.8/5
(42)

____________________ security means having all security measures working together to prevent unauthorized disclosure, destruction, or modification of assets.

(Short Answer)
4.9/5
(31)

Developers use active content because it extends the functionality of HTML and moves some data processing chores from the busy server machine to the user's client computer.

(True/False)
4.8/5
(39)

Any organization concerned about protecting its electronic commerce assets should have a(n)____________________ in place.

(Short Answer)
4.8/5
(22)

____ is the protection of individual rights to nondisclosure.

(Multiple Choice)
4.8/5
(35)

A(n)____ is a small application program.

(Multiple Choice)
4.8/5
(39)

____ refers to preventing unauthorized data modification.

(Multiple Choice)
4.8/5
(39)

Originally, the term ____ was used to describe a dedicated programmer who enjoyed writing complex code that tested the limits of technology.

(Multiple Choice)
4.8/5
(44)

Any act or object that poses a danger to computer assets is known as a ____.

(Multiple Choice)
4.8/5
(29)

A(n)____________________ cookie originates from a Web site other than the site being visited.

(Short Answer)
4.8/5
(31)

A(n)____ is a program hidden inside another program or Web page that masks its true purpose.

(Multiple Choice)
4.8/5
(37)

Apps that contain malware or that collect information from the mobile device and forward it to perpetrators are called a(n)____________________ app.

(Short Answer)
4.9/5
(33)

____ is an area of memory set aside to hold data read from a file or database.

(Multiple Choice)
4.9/5
(35)
Showing 61 - 80 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)