Exam 5: E-Commerce Security and Payment Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Exploit kits can be purchased by users to protect their computers from malware.

(True/False)
4.8/5
(38)

Explain the difference between symmetric key cryptography and public key cryptography.Which dimensions of e-commerce security does encryption address?

(Essay)
4.7/5
(41)

All of the following are limitations of the existing online credit card payment system except:

(Multiple Choice)
4.8/5
(30)

Beebone is an example of which of the following?

(Multiple Choice)
4.8/5
(31)

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

(Multiple Choice)
4.8/5
(30)

Discuss the security of communications channels.Include definitions and explanations for the terms Secure Sockets Layer/Transport Layer Security (SSL/TLS),secure negotiated session,session key,and VPN.

(Essay)
4.7/5
(38)

Today,online bill payment accounts for ________ of all bill payments,while paper checks account for ________.

(Multiple Choice)
4.9/5
(41)

________ is the ability to ensure that an e-commerce site continues to function as intended.

(Multiple Choice)
4.7/5
(44)

Define and explain how electronic billing presentment and payment systems (EBPP)systems work.Describe each of the main EBPP business models.

(Essay)
4.9/5
(43)

Which of the following is not an example of a potentially unwanted program (PUP)?

(Multiple Choice)
4.7/5
(33)

All the following statements about symmetric key cryptography are true except:

(Multiple Choice)
4.9/5
(41)

WannaCry is an example of ransomware.

(True/False)
4.8/5
(37)

PCI-DSS is a standard established by which of the following?

(Multiple Choice)
4.8/5
(37)

There is a finite number of Bitcoins that can be created.

(True/False)
4.8/5
(35)

Which of the following was designed to cripple Iranian nuclear centrifuges?

(Multiple Choice)
4.7/5
(31)

Bluetooth is the primary enabling technology for mobile wallets.

(True/False)
4.9/5
(32)

Which of the following statements about data breaches in 2017 is not true?

(Multiple Choice)
4.9/5
(39)

What is the Internet of Things (IoT)and what security issues and challenges does it raise?

(Essay)
4.7/5
(35)

Define the terms tiger team,white hat,black hat,and grey hat and discuss the difference between them.

(Essay)
4.9/5
(38)

Which of the following statements is not true?

(Multiple Choice)
4.8/5
(44)
Showing 41 - 60 of 85
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)