Exam 9: E-Commerce Security and Fraud Protection

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Define encryption.Identify five major benefits of encryption.

(Essay)
4.9/5
(34)

A summary of a message converted into a string of digits after the hash has been applied best describes

(Multiple Choice)
4.9/5
(39)

A program that appears to have a useful function but that contains a hidden function that presents a security risk best defines

(Multiple Choice)
4.7/5
(38)

________ refers to the e-markets for stolen information.

(Multiple Choice)
4.9/5
(27)

A botnet is a

(Multiple Choice)
4.9/5
(34)

Validation is the assurance that online customers or trading partners cannot falsely deny their purchase or transaction.

(True/False)
4.8/5
(35)

Briefly describe nonrepudiation and its importance for EC and electronic transactions.

(Essay)
4.8/5
(36)

A generic term for malicious software is

(Multiple Choice)
4.9/5
(43)

An EC security strategy and program begins with

(Multiple Choice)
4.9/5
(33)

An attack on a website in which an attacker uses specialized software to send a flood of data packets to the target computer with the aim of overloading its resources best describes

(Multiple Choice)
4.9/5
(29)

A strategy that views EC security as the process of preventing and detecting unauthorized use of the organization's brand,identity,website,e-mail,information,or other asset and attempts to defraud the organization,its customers,and employees best describes

(Multiple Choice)
4.8/5
(42)

Girlfriend Trojans come to life when computer owners visit one of a number of online banking or e-commerce sites.

(True/False)
4.8/5
(45)

A digital envelope is the combination of the encrypted original message and the digital signature,using the recipient's public key.

(True/False)
4.9/5
(39)

The CyberCop Portal analyzes and combats cyberthreats and vulnerabilities.

(True/False)
4.7/5
(35)

Protection of the U.S.computer networks is in the hands of the Department of the Interior (DOI).

(True/False)
4.9/5
(47)

The process of determining what the authenticated entity is allowed to access and what operations it is allowed to perform is known as

(Multiple Choice)
4.7/5
(39)

A method of evaluating the security of a computer system or a network by simulating an attack from a malicious source best describes

(Multiple Choice)
4.8/5
(39)

Which of the following refers to the process of identifying,quantifying,and prioritizing the vulnerabilities in a system?

(Multiple Choice)
4.9/5
(36)

Due care in EC are those actions that a company is reasonably expected to take based on the risks affecting its business and online transactions.

(True/False)
4.8/5
(37)

A malicious hacker who may represent a serious problem for a corporation best describes a

(Multiple Choice)
4.8/5
(34)
Showing 21 - 40 of 85
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)