Exam 5: E-Commerce Security and Payment Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The Data Encryption Standard uses a(n)________-bit key.

(Multiple Choice)
4.9/5
(39)

Explain how an online credit card transaction works,identifying the parties involved and describing how SSL/TLS is involved.What are the limitations of online credit card payment systems?

(Essay)
4.8/5
(45)

Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?

(Multiple Choice)
4.9/5
(37)

Which of the following is the most common protocol for securing a digital channel of communication?

(Multiple Choice)
4.8/5
(31)

All of the following statements about PKI are true except:

(Multiple Choice)
4.8/5
(38)

Automatically redirecting a web link to a different address is an example of which of the following?

(Multiple Choice)
4.7/5
(36)

Discuss and explain the various types of malicious code and how they work.Include the different types of viruses.

(Essay)
4.9/5
(27)

Why is it difficult to accurately estimate the actual amount of cybercrime?

(Essay)
4.9/5
(42)

What is the most frequent cause of stolen credit cards and card information today?

(Multiple Choice)
4.9/5
(39)

Which of the following dimensions of e-commerce security is not provided for by encryption?

(Multiple Choice)
4.7/5
(38)

The creation of Bitcoins consumes a significant amount of energy.

(True/False)
4.8/5
(37)

Which of the following is not an example of an access control?

(Multiple Choice)
4.8/5
(36)

What is the first step in developing an e-commerce security plan?

(Multiple Choice)
4.8/5
(47)

All of the following are examples of cryptocurrencies except:

(Multiple Choice)
4.8/5
(40)

Which of the following did the Internet Advertising Bureau urge advertisers to abandon?

(Multiple Choice)
5.0/5
(33)

All of the following are methods of securing channels of communication except:

(Multiple Choice)
4.7/5
(33)

The attack on Dyn Inc.in 2016 is an example of which of the following?

(Multiple Choice)
4.9/5
(42)

All of the following statements about public key cryptography are true except:

(Multiple Choice)
4.9/5
(39)

Spoofing is the attempt to hide a hacker's true identity by using someone else's e-mail or IP address.

(True/False)
4.8/5
(41)

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

(Multiple Choice)
4.8/5
(33)
Showing 21 - 40 of 85
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)