Deck 10: Electronic Commerce Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/84
Play
Full screen (f)
Deck 10: Electronic Commerce Security
1
Java applets operating in a sandbox can perform file input, output, or delete operations.
False
2
Active content elements are programs that run on the server.
False
3
Active content can be delivered as an e-mail attachment.
True
4
Threats that are unlikely to occur can be ignored when the cost to protect against the threat exceeds the value of the protected asset.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
5
In the context of encryption, shorter keys usually provide significantly better protection than longer keys.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
6
One significant threat to electronic commerce is theft of sensitive or personal information.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
7
In the context of the elements of computer security, necessity refers to preventing data delays or denials.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
8
The most complete way for Web site visitors to protect themselves from revealing private information or being tracked by cookies is to disable cookies entirely.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
9
Applets typically run within the Web browser and are most often written in the Java programming language.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
10
People who write programs or manipulate technologies to obtain unauthorized access to computers and networks are called crackers.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
11
Persistent cookies refer to the category of cookies which exist until the Web client ends the connection.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
12
Worms can spread quickly through the Internet.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
13
Signed code or messages serve the same function as a photo on a driver's license or passport.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
14
A digital certificate contains a means to send an encrypted message to the entity that sent the original Web page or e-mail message.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
15
Active content is launched in a Web browser automatically prior to the browser loading the Web page containing active content.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
16
Active content can pose a threat to the security of client devices.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
17
The path taken by a message packet from a source node to a destination node can be controlled by Internet users.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
18
A Trojan horse erasing or altering information in a client computer is said to be a secrecy violation.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
19
Any message traveling on the Internet is subject to secrecy, integrity, and necessity threats.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
20
Message packets on the Internet travel a planned path from a source node to a destination node.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
21
A(n) _____ is a small application program that typically runs within a Web browser.
A) applet
B) buffer
C) white hat hacker
D) black hat hacker
A) applet
B) buffer
C) white hat hacker
D) black hat hacker
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
22
In the context of computer security, the protection of assets using nonphysical means is called _____.
A) eavesdropping
B) logical security
C) tangible security
D) phishing
A) eavesdropping
B) logical security
C) tangible security
D) phishing
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
23
ActiveX controls run only on computers with _____ operating systems.
A) Windows
B) Linux
C) UNIX
D) Mac
A) Windows
B) Linux
C) UNIX
D) Mac
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
24
_____ refers to preventing unauthorized data modification.
A) Integrity
B) Secrecy
C) Necessity
D) Completeness
A) Integrity
B) Secrecy
C) Necessity
D) Completeness
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
25
In the context of categorizing cookies in terms of their time duration, _____ are cookies which exist until the Web client ends the connection.
A) first-party cookies
B) persistent cookies
C) third-party cookies
D) session cookies
A) first-party cookies
B) persistent cookies
C) third-party cookies
D) session cookies
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
26
Networks outside a firewall are referred to as trusted networks.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
27
A _____ is a written statement describing which assets to protect and why they are being protected, who is responsible for that protection, and which behaviors are acceptable and which are not.
A) plain text
B) cypher text
C) security policy
D) digital signature
A) plain text
B) cypher text
C) security policy
D) digital signature
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
28
_____ is the protection of computer assets from unauthorized access, use, alteration, or destruction.
A) Computer security
B) Computer risk
C) Spamming
D) Phishing
A) Computer security
B) Computer risk
C) Spamming
D) Phishing
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
29
The Computer Emergency Response Team (CERT) is the most prominent organization that promotes computer security.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
30
A passphrase is a sequence of words of text that is easy to remember, but not complex enough to serve as a good password.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
31
A(n) _____ is a person or device that is able to listen in on and copy Internet transmissions.
A) eavesdropper
B) white hat hacker
C) black hat hacker
D) cracker
A) eavesdropper
B) white hat hacker
C) black hat hacker
D) cracker
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
32
_____ refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data source.
A) Necessity
B) Secrecy
C) Integrity
D) Encryption
A) Necessity
B) Secrecy
C) Integrity
D) Encryption
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
33
The purpose of a _____ is to provide a way for a third-party Web site to place cookies from that third-party site on a visitor's computer.
A) personal firewall
B) digital certificate
C) Web bug
D) gateway server
A) personal firewall
B) digital certificate
C) Web bug
D) gateway server
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
34
Any act or object that poses a danger to computer assets is known as a _____.
A) countermeasure
B) bug
C) threat
D) code
A) countermeasure
B) bug
C) threat
D) code
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
35
Backdoor is a program that protects information from unauthorized access.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
36
JavaScript and VBScript are _____, which provide commands that are executed on the client.
A) plug-ins
B) scripting languages
C) Web bugs
D) session cookies
A) plug-ins
B) scripting languages
C) Web bugs
D) session cookies
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
37
A _____ is a program hidden inside another program or Web page that masks its true purpose.
A) remote wipe
B) Trojan horse
C) digital certificate
D) wardriver
A) remote wipe
B) Trojan horse
C) digital certificate
D) wardriver
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
38
One disadvantage of private-key systems is that encryption and decryption are significantly slower than public-key systems.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
39
A(n) _____ is an object that contains programs and properties that Web designers place on Web pages to perform particular tasks.
A) persistent cookie
B) dead link
C) ActiveX control
D) session cookie
A) persistent cookie
B) dead link
C) ActiveX control
D) session cookie
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
40
A Web browser that has entered into a Secure Socket Layer session indicates that it is in an encrypted session.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
41
Software applications called _____ provide the means to record information that passes through a computer or router that is handling Internet traffic.
A) remote wipes
B) digital certificates
C) sniffer programs
D) plug-ins
A) remote wipes
B) digital certificates
C) sniffer programs
D) plug-ins
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
42
_____ is the electronic defacing of an existing Web site's page.
A) Spamming
B) Masquerading
C) Phishing
D) Cybervandalism
A) Spamming
B) Masquerading
C) Phishing
D) Cybervandalism
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
43
A(n) _____ cookie originates from a Web site other than the site being visited.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
44
A(n) _____ occurs when an Internet e-mail message is intercepted and its contents are changed before it is forwarded to its original destination.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
45
In the context of elements of a security policy, _____ refers to the secure identification of clients and servers with digital signatures and certificates.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
46
A ___________ encapsulates and encrypts the message which provides secrecy, integrity and client/sever authentication.
A) digital signature
B) secure envelope
C) private key
D) cipher text
A) digital signature
B) secure envelope
C) private key
D) cipher text
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
47
_____ encodes a message with an algorithm that uses a single numeric key to encode and decode data.
A) Hash coding
B) Symmetric encryption
C) Public-key encryption
D) Decrypting
A) Hash coding
B) Symmetric encryption
C) Public-key encryption
D) Decrypting
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
48
_____ is pretending to be someone you are not or representing a Web site as an original when it is really a fake.
A) Hash coding
B) Spoofing
C) Warchalking
D) Cybervandalism
A) Hash coding
B) Spoofing
C) Warchalking
D) Cybervandalism
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
49
Firewalls that filter traffic based on the application requested are.
A) packet filter firewalls
B) proxi seerver firewall
C) gateway servers
D) intrusion detection systems
A) packet filter firewalls
B) proxi seerver firewall
C) gateway servers
D) intrusion detection systems
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
50
A _____ is an area of memory set aside to hold data read from a file or database.
A) firewall
B) cookie
C) buffer
D) worm
A) firewall
B) cookie
C) buffer
D) worm
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
51
_____ are computer sleuths who are hired to probe PCs and locate information that can be used in legal proceedings.
A) Wardrivers
B) Computer forensics experts
C) Crackers
D) Hackers
A) Wardrivers
B) Computer forensics experts
C) Crackers
D) Hackers
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
52
The term _____ describes the process of hiding information within another piece of information.
A) wiretapping
B) steganography
C) authentication
D) decryption
A) wiretapping
B) steganography
C) authentication
D) decryption
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
53
Cookies are categorized as session or persistent based on _____.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
54
A(n) _____ is a software that attaches itself to another program and can cause damage when the host program is activated.
A) applet
B) browser plug-in
C) virus
D) message digest
A) applet
B) browser plug-in
C) virus
D) message digest
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
55
A _____ is a number that summarizes an encrypted information.
A) digital certificate
B) hash function
C) message digest
D) hash algorithm
A) digital certificate
B) hash function
C) message digest
D) hash algorithm
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
56
A(n) _____ is a procedure that recognizes, reduces, or eliminates a threat.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
57
First-party cookies and third-party cookies represent classification of cookies by their _____.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
58
_____ is the protection of individual rights to nondisclosure.
A) Secrecy
B) Privacy
C) Necessity
D) Sensitivity
A) Secrecy
B) Privacy
C) Necessity
D) Sensitivity
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
59
Cookies placed on a client computer by a Web server site are called _____.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
60
A _____ is an element of a program that allows users to run the program without going through the normal authentication procedure for access to the program.
A) rogue app
B) backdoor
C) worm
D) remote wipe
A) rogue app
B) backdoor
C) worm
D) remote wipe
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
61
Briefly describe the requirements for secure electronic commerce.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
62
When a Trojan horse has taken over a large number of computers, the person who planted the virus can take control of all the computers and form a(n) _____.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
63
The process of proposing and accepting various transmission conditions is called _____.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
64
A(n) _____ is a Trojan horse that secretly takes over another computer for the purpose of launching attacks on other computers.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
65
The program that transforms normal text into cipher text is called a(n) _____.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
66
_____ is the coding of information by using a mathematically based program and a secret key to produce a string of characters that is unintelligible.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
67
_____ encryption encodes messages by using two mathematically related numeric keys.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
68
Most browsers allow users to limit the actions taken by Java applets and scripting languages by running them in a(n) _____, which is a functional subset of the full browser.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
69
A(n) _____ is usually a long binary number that is used with the encryption algorithm to "lock" the characters of the message being protected so that they are undecipherable without the number.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
70
In some cities that have large concentrations of wireless networks, attackers, called _____, drive around in cars using their wireless-equipped laptop computers to search for accessible networks.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
71
A(n) _____ is a type of virus that replicates itself on the computers that it infects.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
72
A(n) _____ is an attachment to an e-mail message or program embedded in a Web page that verifies that the sender or Web site is who it claims to be.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
73
Browser _____ are programs that enhance the capabilities of browsers, handle Web content that a browser cannot handle.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
74
The purpose of a(n) _____ is to disrupt normal computer processing, or deny processing entirely.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
75
A(n) _____ security device is one that uses an element of a person's biological makeup to perform identification.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
76
An integrity threat, also known as _____, exists when an unauthorized party can alter a message stream of information.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
77
The science that studies encryption is called _____.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
78
Apps that contain malware or that collect information from a mobile device and forward it to perpetrators are called _____.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
79
_____ are the computers on the Internet that maintain directories that link domain names to IP addresses.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck
80
A ___________ virus can enter a computer system in several different ways.
Unlock Deck
Unlock for access to all 84 flashcards in this deck.
Unlock Deck
k this deck