Exam 9: E-Commerce Security and Fraud Protection

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Biometric systems are authentication systems that identify a person by measurement of a biological characteristic,such as fingerprints,iris patterns,facial features,or voice.

(True/False)
4.8/5
(39)

A cyberwarrior is a person who intentionally carries out crimes over the Internet.

(True/False)
4.7/5
(38)

The large number of possible key values created by the algorithm to use when transforming the message best describes

(Multiple Choice)
5.0/5
(33)

Each of the following is a characteristic of access control except

(Multiple Choice)
4.8/5
(43)

Exposure is the estimated cost,loss,or damage that can result if a threat exploits a vulnerability.

(True/False)
4.7/5
(37)

Define biometric system.Identify four common biometrics.

(Essay)
4.8/5
(39)

The estimated cost,loss,or damage that can result if a threat exploits a vulnerability best describes

(Multiple Choice)
4.8/5
(36)

The assurance that an online customer or trading partner cannot falsely deny their purchase or transaction is referred to as

(Multiple Choice)
4.8/5
(35)

The probability that a vulnerability will be known and used best describes

(Multiple Choice)
4.8/5
(29)

A cyberwar occurs when computers are set up to attack other computers in the same or other organizations.

(True/False)
4.8/5
(37)

Unintentional threats include each of the following except

(Multiple Choice)
4.8/5
(33)

________ systems are highly useful for both law enforcement and for law breaking,for example,by providing a means to obtain passwords or encryption keys and thus bypassing other security measures.

(Multiple Choice)
4.8/5
(35)

The process of verifying the real identity of an individual,computer,computer program,or EC website best defines

(Multiple Choice)
4.9/5
(48)

A plan that keeps the business running after a disaster occurs best defines

(Multiple Choice)
4.8/5
(45)

An exercise that determines the impact of losing the support of an EC resource to an organization and establishes the escalation of that loss over time,identifies the minimum resources needed to recover,and prioritizes the recovery of processes and supporting systems best describes

(Multiple Choice)
4.7/5
(42)

Fraud is aimed mostly against organizations.

(True/False)
4.8/5
(37)

A software program that runs independently,consuming the resources of its host in order to maintain itself,that is capable of propagating a complete working version of itself onto another machine best describes

(Multiple Choice)
4.8/5
(32)

Key logs provide the means to reconstruct what specific actions have occurred and may help EC security investigators identify the person or program that performed unauthorized actions.

(True/False)
4.9/5
(38)

A method used to ensure confidentiality and integrity of data transmitted over the Internet by encrypting data packets,sending them in packets across the Internet,and decrypting them at the destination address best defines

(Multiple Choice)
4.8/5
(37)

General controls are intended to protect specific applications.

(True/False)
4.8/5
(35)
Showing 61 - 80 of 85
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)