Exam 10: Electronic Commerce Security
Exam 1: Introduction to Electronic Commerce81 Questions
Exam 2: Technology Infrastructure: the Internet and the World Wide Web85 Questions
Exam 3: Selling on the Web81 Questions
Exam 4: Marketing on the Web86 Questions
Exam 5: Business-To-Business Activities: Improving Efficiency and Reducing Costs82 Questions
Exam 6: Social Networking, Mobile Commerce, and Online Auctions80 Questions
Exam 7: The Environment of Electronic Commerce: Legal, Ethical, and Tax Issues83 Questions
Exam 8: Web Server Hardware and Software80 Questions
Exam 9: Electronic Commerce Software80 Questions
Exam 10: Electronic Commerce Security84 Questions
Exam 11: Payment Systems for Electronic Commerce81 Questions
Exam 12: Managing Electronic Commerce Implementations84 Questions
Select questions type
_____ is the coding of information by using a mathematically based program and a secret key to produce a string of characters that is unintelligible.
Free
(Short Answer)
4.8/5
(32)
Correct Answer:
Encryption
Describe the security dangers inherent in ActiveX controls.
Free
(Essay)
4.7/5
(27)
Correct Answer:
The security danger with ActiveX controls is that once they are downloaded, they execute like any other program on a client computer.They have full access to all system resources, including operating system code.An ill-intentioned ActiveX control could reformat a user's hard disk, rename or delete files, send e-mails to all the people listed in the user's address book, or simply shut down the computer.Because ActiveX controls have full access to client computers, they can cause secrecy, integrity, or necessity violations.
The purpose of a _____ is to provide a way for a third-party Web site to place cookies from that third-party site on a visitor's computer.
Free
(Multiple Choice)
4.8/5
(28)
Correct Answer:
C
Active content can pose a threat to the security of client devices.
(True/False)
4.8/5
(38)
Signed code or messages serve the same function as a photo on a driver's license or passport.
(True/False)
4.8/5
(44)
A(n) _____ security device is one that uses an element of a person's biological makeup to perform identification.
(Short Answer)
4.7/5
(26)
Cookies placed on a client computer by a Web server site are called _____.
(Short Answer)
5.0/5
(32)
A ___________ virus can enter a computer system in several different ways.
(Short Answer)
4.9/5
(30)
A Trojan horse erasing or altering information in a client computer is said to be a secrecy violation.
(True/False)
4.8/5
(37)
_____ are computer sleuths who are hired to probe PCs and locate information that can be used in legal proceedings.
(Multiple Choice)
4.9/5
(40)
A(n) _____ is an object that contains programs and properties that Web designers place on Web pages to perform particular tasks.
(Multiple Choice)
4.8/5
(40)
In the context of encryption, shorter keys usually provide significantly better protection than longer keys.
(True/False)
4.7/5
(38)
A(n) _____ occurs when an Internet e-mail message is intercepted and its contents are changed before it is forwarded to its original destination.
(Short Answer)
4.8/5
(32)
The process of proposing and accepting various transmission conditions is called _____.
(Short Answer)
4.9/5
(40)
Java applets operating in a sandbox can perform file input, output, or delete operations.
(True/False)
4.8/5
(37)
_____ encodes a message with an algorithm that uses a single numeric key to encode and decode data.
(Multiple Choice)
4.9/5
(35)
In some cities that have large concentrations of wireless networks, attackers, called _____, drive around in cars using their wireless-equipped laptop computers to search for accessible networks.
(Short Answer)
4.8/5
(31)
A(n) _____ is a type of virus that replicates itself on the computers that it infects.
(Short Answer)
4.9/5
(36)
Applets typically run within the Web browser and are most often written in the Java programming language.
(True/False)
4.8/5
(33)
Showing 1 - 20 of 84
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)