Exam 9: E-Commerce Security and Fraud Protection
Exam 1: Overview of Electronic Commerce85 Questions
Exam 2: E-Commerce: Mechanisms, Infrastructure, and Tools85 Questions
Exam 3: Retailing in Electronic Commerce: Products and Services85 Questions
Exam 4: B2B E-Commerce85 Questions
Exam 5: Innovative EC Systems: From E-Government to E-Learning, collaborative Commerce, and C2C Commerce85 Questions
Exam 6: Mobile Commerce and Ubiquitous Computing85 Questions
Exam 7: Social Commerce85 Questions
Exam 8: Marketing and Advertising in E-Commerce85 Questions
Exam 9: E-Commerce Security and Fraud Protection85 Questions
Exam 10: Electronic Commerce Payment Systems85 Questions
Exam 11: Order Fulfillment Along the Supply Chain and Other Ec Support Services85 Questions
Exam 12: EC Strategy, Globalization, and Smes85 Questions
Exam 13: Implementing EC Systems: From Justification to Successful Performance85 Questions
Exam 14: E-Commerce: Regulatory, Ethical, and Social Environments85 Questions
Exam 15: Launching a Successful Online Business and EC Projects85 Questions
Select questions type
Biometric systems are authentication systems that identify a person by measurement of a biological characteristic,such as fingerprints,iris patterns,facial features,or voice.
(True/False)
4.8/5
(39)
A cyberwarrior is a person who intentionally carries out crimes over the Internet.
(True/False)
4.7/5
(38)
The large number of possible key values created by the algorithm to use when transforming the message best describes
(Multiple Choice)
5.0/5
(33)
Each of the following is a characteristic of access control except
(Multiple Choice)
4.8/5
(43)
Exposure is the estimated cost,loss,or damage that can result if a threat exploits a vulnerability.
(True/False)
4.7/5
(37)
The estimated cost,loss,or damage that can result if a threat exploits a vulnerability best describes
(Multiple Choice)
4.8/5
(36)
The assurance that an online customer or trading partner cannot falsely deny their purchase or transaction is referred to as
(Multiple Choice)
4.8/5
(35)
The probability that a vulnerability will be known and used best describes
(Multiple Choice)
4.8/5
(29)
A cyberwar occurs when computers are set up to attack other computers in the same or other organizations.
(True/False)
4.8/5
(37)
________ systems are highly useful for both law enforcement and for law breaking,for example,by providing a means to obtain passwords or encryption keys and thus bypassing other security measures.
(Multiple Choice)
4.8/5
(35)
The process of verifying the real identity of an individual,computer,computer program,or EC website best defines
(Multiple Choice)
4.9/5
(48)
A plan that keeps the business running after a disaster occurs best defines
(Multiple Choice)
4.8/5
(45)
An exercise that determines the impact of losing the support of an EC resource to an organization and establishes the escalation of that loss over time,identifies the minimum resources needed to recover,and prioritizes the recovery of processes and supporting systems best describes
(Multiple Choice)
4.7/5
(42)
A software program that runs independently,consuming the resources of its host in order to maintain itself,that is capable of propagating a complete working version of itself onto another machine best describes
(Multiple Choice)
4.8/5
(32)
Key logs provide the means to reconstruct what specific actions have occurred and may help EC security investigators identify the person or program that performed unauthorized actions.
(True/False)
4.9/5
(38)
A method used to ensure confidentiality and integrity of data transmitted over the Internet by encrypting data packets,sending them in packets across the Internet,and decrypting them at the destination address best defines
(Multiple Choice)
4.8/5
(37)
Showing 61 - 80 of 85
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)