Exam 9: E-Commerce Security and Fraud Protection
Exam 1: Overview of Electronic Commerce85 Questions
Exam 2: E-Commerce: Mechanisms, Infrastructure, and Tools85 Questions
Exam 3: Retailing in Electronic Commerce: Products and Services85 Questions
Exam 4: B2B E-Commerce85 Questions
Exam 5: Innovative EC Systems: From E-Government to E-Learning, collaborative Commerce, and C2C Commerce85 Questions
Exam 6: Mobile Commerce and Ubiquitous Computing85 Questions
Exam 7: Social Commerce85 Questions
Exam 8: Marketing and Advertising in E-Commerce85 Questions
Exam 9: E-Commerce Security and Fraud Protection85 Questions
Exam 10: Electronic Commerce Payment Systems85 Questions
Exam 11: Order Fulfillment Along the Supply Chain and Other Ec Support Services85 Questions
Exam 12: EC Strategy, Globalization, and Smes85 Questions
Exam 13: Implementing EC Systems: From Justification to Successful Performance85 Questions
Exam 14: E-Commerce: Regulatory, Ethical, and Social Environments85 Questions
Exam 15: Launching a Successful Online Business and EC Projects85 Questions
Select questions type
A macro virus or macro worm is executed when the application object that contains the macro is opened or a particular procedure is executed.
(True/False)
4.8/5
(35)
Access control is a mechanism that determines who can legitimately use a network resource.
(True/False)
4.8/5
(22)
Ninety-three percent of companies that suffer a significant data loss go out of business within 5 years.
(True/False)
4.8/5
(40)
Security functions or characteristics of digital signatures include all of the following except
(Multiple Choice)
4.9/5
(38)
According to Sullivan (2011),vulnerabilities in IT and EC systems include each of the following except
(Multiple Choice)
4.8/5
(41)
The protection of information systems against unauthorized access to or modification of information that is stored,processed,or being sent over a network is referred to as
(Multiple Choice)
4.9/5
(35)
________ is a crimeware technique used to steal the identity of target companies to get the identities of their customers.
(Multiple Choice)
4.9/5
(29)
Fingerprint scanners,facial recognition systems,and voice recognition are examples of ________ that recognize a person by some physical trait.
(Multiple Choice)
4.8/5
(33)
The Internet,or more specifically the Internet and network protocols,was never intended for use by untrusted users or components.
(True/False)
4.8/5
(38)
The key reasons why EC criminals cannot be stopped include each of the following except
(Multiple Choice)
4.9/5
(44)
Advantages of virtual private networks include each of the following except
(Multiple Choice)
4.9/5
(44)
A honeypot is a production system that looks like it does real work,but acts as a decoy and is watched to study how network intrusions occur.
(True/False)
4.8/5
(32)
The success of an EC security strategy and program depends on the commitment and involvement of senior management.
(True/False)
4.9/5
(49)
Computer security refers to the protection of data,networks,computer programs,computer power,and other elements of computerized information systems.
(True/False)
4.8/5
(30)
Which of the following refers to the assurance that access to data,the website,or other EC data service is timely,available,reliable,and restricted to authorized users?
(Multiple Choice)
4.8/5
(39)
Detection measures are actions that will make criminals abandon their idea of attacking a specific system.
(True/False)
4.8/5
(34)
Splogs are software applications that have some degree of reactivity,autonomy,and adaptability.An agent is able to adapt itself based on changes occurring in its environment.
(True/False)
4.9/5
(36)
Seattle's Northwest Hospital and Medical Center was attacked by malware that was able to enter their network through a Windows flaw.
(True/False)
4.9/5
(40)
Spam and spyware are the most frequently used technical security attack methods used by cybercriminals.
(True/False)
4.9/5
(34)
Network viruses can enter through unprotected ports and compromise the whole network.
(True/False)
4.9/5
(38)
Showing 41 - 60 of 85
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)