Exam 5: E-Commerce Security and Payment Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

________ is the ability to ensure that messages and data are only available to those authorized to view them.

Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
Verified

A

________ is the ability to ensure that e-commerce participants do not deny their online actions.

Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
Verified

A

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.

Free
(True/False)
4.7/5
(29)
Correct Answer:
Verified

True

IoT botnets became the preferred platform for launching DDoS attacks in 2017.

(True/False)
4.9/5
(34)

Next generation firewalls provide all of the following except:

(Multiple Choice)
4.8/5
(35)

Zelle is an example of a P2P mobile payment app.

(True/False)
4.7/5
(35)

Which of the following statements is not true?

(Multiple Choice)
4.9/5
(39)

According to the Identity Theft Resource Center,the number of data breaches in 2017 increased by ________ compared to 2016.

(Multiple Choice)
4.9/5
(34)

What dimensions do digital signatures and hash digests add to public key cryptography and how do they work?

(Essay)
4.8/5
(35)

A Trojan horse appears to be benign,but then does something other than expected.

(True/False)
4.9/5
(37)

Which of the following is an example of an online privacy violation?

(Multiple Choice)
4.8/5
(28)

Asymmetric key cryptography is also known as:

(Multiple Choice)
4.8/5
(33)

The overall rate of online credit card fraud is ________ of all online card transactions.

(Multiple Choice)
4.7/5
(33)

PayPal is an example of what type of payment system?

(Multiple Choice)
4.8/5
(36)

FREAK is an example of a software vulnerability.

(True/False)
4.8/5
(36)

According to Symantec,almost half of the e-mail addresses involved in business e-mail compromise (BEC)phishing that it analyzed had an IP address originating in:

(Multiple Choice)
4.9/5
(39)

________ typically attack governments,organizations,and sometimes individuals for political purposes.

(Multiple Choice)
4.9/5
(29)

Phishing attacks rely on browser parasites.

(True/False)
4.9/5
(35)

According to Ponemon Institute's 2017 survey,which of the following was not among the causes of the most costly cybercrimes?

(Multiple Choice)
4.9/5
(23)

Conficker is an example of a:

(Multiple Choice)
4.9/5
(38)
Showing 1 - 20 of 85
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)