Exam 9: E-Commerce Security and Fraud Protection

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A macro virus or macro worm is executed when the application object that contains the macro is opened or a particular procedure is executed.

(True/False)
4.8/5
(35)

Access control is a mechanism that determines who can legitimately use a network resource.

(True/False)
4.8/5
(22)

Ninety-three percent of companies that suffer a significant data loss go out of business within 5 years.

(True/False)
4.8/5
(40)

Security functions or characteristics of digital signatures include all of the following except

(Multiple Choice)
4.9/5
(38)

According to Sullivan (2011),vulnerabilities in IT and EC systems include each of the following except

(Multiple Choice)
4.8/5
(41)

The protection of information systems against unauthorized access to or modification of information that is stored,processed,or being sent over a network is referred to as

(Multiple Choice)
4.9/5
(35)

________ is a crimeware technique used to steal the identity of target companies to get the identities of their customers.

(Multiple Choice)
4.9/5
(29)

Fingerprint scanners,facial recognition systems,and voice recognition are examples of ________ that recognize a person by some physical trait.

(Multiple Choice)
4.8/5
(33)

The Internet,or more specifically the Internet and network protocols,was never intended for use by untrusted users or components.

(True/False)
4.8/5
(38)

The key reasons why EC criminals cannot be stopped include each of the following except

(Multiple Choice)
4.9/5
(44)

Advantages of virtual private networks include each of the following except

(Multiple Choice)
4.9/5
(44)

A honeypot is a production system that looks like it does real work,but acts as a decoy and is watched to study how network intrusions occur.

(True/False)
4.8/5
(32)

The success of an EC security strategy and program depends on the commitment and involvement of senior management.

(True/False)
4.9/5
(49)

Computer security refers to the protection of data,networks,computer programs,computer power,and other elements of computerized information systems.

(True/False)
4.8/5
(30)

Which of the following refers to the assurance that access to data,the website,or other EC data service is timely,available,reliable,and restricted to authorized users?

(Multiple Choice)
4.8/5
(39)

Detection measures are actions that will make criminals abandon their idea of attacking a specific system.

(True/False)
4.8/5
(34)

Splogs are software applications that have some degree of reactivity,autonomy,and adaptability.An agent is able to adapt itself based on changes occurring in its environment.

(True/False)
4.9/5
(36)

Seattle's Northwest Hospital and Medical Center was attacked by malware that was able to enter their network through a Windows flaw.

(True/False)
4.9/5
(40)

Spam and spyware are the most frequently used technical security attack methods used by cybercriminals.

(True/False)
4.9/5
(34)

Network viruses can enter through unprotected ports and compromise the whole network.

(True/False)
4.9/5
(38)
Showing 41 - 60 of 85
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)