Exam 9: E-Commerce Security and Fraud Protection
Exam 1: Overview of Electronic Commerce85 Questions
Exam 2: E-Commerce: Mechanisms, Infrastructure, and Tools85 Questions
Exam 3: Retailing in Electronic Commerce: Products and Services85 Questions
Exam 4: B2B E-Commerce85 Questions
Exam 5: Innovative EC Systems: From E-Government to E-Learning, collaborative Commerce, and C2C Commerce85 Questions
Exam 6: Mobile Commerce and Ubiquitous Computing85 Questions
Exam 7: Social Commerce85 Questions
Exam 8: Marketing and Advertising in E-Commerce85 Questions
Exam 9: E-Commerce Security and Fraud Protection85 Questions
Exam 10: Electronic Commerce Payment Systems85 Questions
Exam 11: Order Fulfillment Along the Supply Chain and Other Ec Support Services85 Questions
Exam 12: EC Strategy, Globalization, and Smes85 Questions
Exam 13: Implementing EC Systems: From Justification to Successful Performance85 Questions
Exam 14: E-Commerce: Regulatory, Ethical, and Social Environments85 Questions
Exam 15: Launching a Successful Online Business and EC Projects85 Questions
Select questions type
Creating a rogue copy of a popular website that shows contents similar to the original to a Web crawler.Once there,an unsuspecting user is redirected to malicious websites.This description is indicative of
Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
C
The Internet was designed for maximum efficiency and security by providing for error checking to ensure that the message was sent and received correctly,user authentication,and access control.
Free
(True/False)
4.8/5
(38)
Correct Answer:
False
A mathematical computation that is applied to a message,using a private key to encrypt the message,best defines
Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
C
Data leaks were the most important EC security management concern for 2011.
(True/False)
4.8/5
(35)
The ________ translates or converts domain names to their IP addresses.
(Multiple Choice)
4.9/5
(42)
Which of the following refers to the assurance of data privacy and accuracy?
(Multiple Choice)
4.7/5
(32)
Software that gathers user information over an Internet connection without the user's knowledge best defines
(Multiple Choice)
4.8/5
(40)
Someone who gains unauthorized access to a computer system best describes a
(Multiple Choice)
4.8/5
(31)
Protecting information and information systems from unauthorized access,use,disclosure,disruption,modification,perusal,inspection,recording,or destruction best defines
(Multiple Choice)
4.9/5
(37)
There is a clear shift in the nature of the operation of computer criminals from the desire for fame to the desire for financial gain.
(True/False)
4.8/5
(32)
Acceptable use policies (AUP)inform users of their responsibilities when a cyberattack or network intrusion has occurred.
(True/False)
4.9/5
(36)
A page that uses techniques that deliberately subvert a search engine's algorithms to artificially inflate the page's ranking best describes
(Multiple Choice)
4.8/5
(35)
A type of nontechnical attack that uses some ruse to trick users into revealing information or performing an action that compromises a computer or network best describes
(Multiple Choice)
4.9/5
(35)
An intrusion detection system uses the public Internet to carry information but remains private by using encryption,authentication,and access control to verify the identity of anyone using the network.
(True/False)
4.8/5
(36)
An IP address uniquely identifies each computer connected to a network or the Internet.
(True/False)
4.8/5
(30)
Computers infected with malware that are under the control of a spammer,hacker,or other criminal best describes
(Multiple Choice)
4.9/5
(38)
Why does the success of an EC security strategy and program depend on the commitment and involvement of executive management?
(Essay)
4.8/5
(27)
Social engineering refers to criminals tricking unsuspecting people into giving them information or access that they should not have.
(True/False)
4.8/5
(38)
Malvertising is fake online advertising designed to trick you into downloading malicious software onto your computer.
(True/False)
4.8/5
(34)
Showing 1 - 20 of 85
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)