Exam 10: Electronic Commerce Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_____ is the coding of information by using a mathematically based program and a secret key to produce a string of characters that is unintelligible.

Free
(Short Answer)
4.8/5
(32)
Correct Answer:
Verified

Encryption

Describe the security dangers inherent in ActiveX controls.

Free
(Essay)
4.7/5
(27)
Correct Answer:
Verified

The security danger with ActiveX controls is that once they are downloaded, they execute like any other program on a client computer.They have full access to all system resources, including operating system code.An ill-intentioned ActiveX control could reformat a user's hard disk, rename or delete files, send e-mails to all the people listed in the user's address book, or simply shut down the computer.Because ActiveX controls have full access to client computers, they can cause secrecy, integrity, or necessity violations.

The purpose of a _____ is to provide a way for a third-party Web site to place cookies from that third-party site on a visitor's computer.

Free
(Multiple Choice)
4.8/5
(28)
Correct Answer:
Verified

C

Active content can pose a threat to the security of client devices.

(True/False)
4.8/5
(38)

Signed code or messages serve the same function as a photo on a driver's license or passport.

(True/False)
4.8/5
(44)

A(n) _____ security device is one that uses an element of a person's biological makeup to perform identification.

(Short Answer)
4.7/5
(26)

Cookies placed on a client computer by a Web server site are called _____.

(Short Answer)
5.0/5
(32)

​A ___________ virus can enter a computer system in several different ways.

(Short Answer)
4.9/5
(30)

A Trojan horse erasing or altering information in a client computer is said to be a secrecy violation.

(True/False)
4.8/5
(37)

The science that studies encryption is called _____.

(Short Answer)
4.7/5
(38)

_____ are computer sleuths who are hired to probe PCs and locate information that can be used in legal proceedings.

(Multiple Choice)
4.9/5
(40)

A(n) _____ is an object that contains programs and properties that Web designers place on Web pages to perform particular tasks.

(Multiple Choice)
4.8/5
(40)

In the context of encryption, shorter keys usually provide significantly better protection than longer keys.

(True/False)
4.7/5
(38)

A(n) _____ occurs when an Internet e-mail message is intercepted and its contents are changed before it is forwarded to its original destination.

(Short Answer)
4.8/5
(32)

The process of proposing and accepting various transmission conditions is called _____.

(Short Answer)
4.9/5
(40)

Java applets operating in a sandbox can perform file input, output, or delete operations.

(True/False)
4.8/5
(37)

_____ encodes a message with an algorithm that uses a single numeric key to encode and decode data.

(Multiple Choice)
4.9/5
(35)

In some cities that have large concentrations of wireless networks, attackers, called _____, drive around in cars using their wireless-equipped laptop computers to search for accessible networks.

(Short Answer)
4.8/5
(31)

A(n) _____ is a type of virus that replicates itself on the computers that it infects.

(Short Answer)
4.9/5
(36)

Applets typically run within the Web browser and are most often written in the Java programming language.

(True/False)
4.8/5
(33)
Showing 1 - 20 of 84
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)