Exam 9: E-Commerce Security and Fraud Protection

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Creating a rogue copy of a popular website that shows contents similar to the original to a Web crawler.Once there,an unsuspecting user is redirected to malicious websites.This description is indicative of

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

C

The Internet was designed for maximum efficiency and security by providing for error checking to ensure that the message was sent and received correctly,user authentication,and access control.

Free
(True/False)
4.8/5
(38)
Correct Answer:
Verified

False

A mathematical computation that is applied to a message,using a private key to encrypt the message,best defines

Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
Verified

C

Data leaks were the most important EC security management concern for 2011.

(True/False)
4.8/5
(35)

The ________ translates or converts domain names to their IP addresses.

(Multiple Choice)
4.9/5
(42)

Which of the following refers to the assurance of data privacy and accuracy?

(Multiple Choice)
4.7/5
(32)

Software that gathers user information over an Internet connection without the user's knowledge best defines

(Multiple Choice)
4.8/5
(40)

Someone who gains unauthorized access to a computer system best describes a

(Multiple Choice)
4.8/5
(31)

Protecting information and information systems from unauthorized access,use,disclosure,disruption,modification,perusal,inspection,recording,or destruction best defines

(Multiple Choice)
4.9/5
(37)

There is a clear shift in the nature of the operation of computer criminals from the desire for fame to the desire for financial gain.

(True/False)
4.8/5
(32)

Phishing is an example of a technical attack.

(True/False)
4.8/5
(27)

Acceptable use policies (AUP)inform users of their responsibilities when a cyberattack or network intrusion has occurred.

(True/False)
4.9/5
(36)

A page that uses techniques that deliberately subvert a search engine's algorithms to artificially inflate the page's ranking best describes

(Multiple Choice)
4.8/5
(35)

A type of nontechnical attack that uses some ruse to trick users into revealing information or performing an action that compromises a computer or network best describes

(Multiple Choice)
4.9/5
(35)

An intrusion detection system uses the public Internet to carry information but remains private by using encryption,authentication,and access control to verify the identity of anyone using the network.

(True/False)
4.8/5
(36)

An IP address uniquely identifies each computer connected to a network or the Internet.

(True/False)
4.8/5
(30)

Computers infected with malware that are under the control of a spammer,hacker,or other criminal best describes

(Multiple Choice)
4.9/5
(38)

Why does the success of an EC security strategy and program depend on the commitment and involvement of executive management?

(Essay)
4.8/5
(27)

Social engineering refers to criminals tricking unsuspecting people into giving them information or access that they should not have.

(True/False)
4.8/5
(38)

Malvertising is fake online advertising designed to trick you into downloading malicious software onto your computer.

(True/False)
4.8/5
(34)
Showing 1 - 20 of 85
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)