Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Electronic Commerce
Exam 9: E-Commerce Security and Fraud Protection
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 61
True/False
Biometric systems are authentication systems that identify a person by measurement of a biological characteristic,such as fingerprints,iris patterns,facial features,or voice.
Question 62
True/False
A cyberwarrior is a person who intentionally carries out crimes over the Internet.
Question 63
Multiple Choice
The large number of possible key values created by the algorithm to use when transforming the message best describes
Question 64
Multiple Choice
Each of the following is a characteristic of access control
except
Question 65
True/False
Exposure is the estimated cost,loss,or damage that can result if a threat exploits a vulnerability.
Question 66
Essay
Define biometric system.Identify four common biometrics.
Question 67
Multiple Choice
The estimated cost,loss,or damage that can result if a threat exploits a vulnerability best describes
Question 68
Multiple Choice
The assurance that an online customer or trading partner cannot falsely deny their purchase or transaction is referred to as
Question 69
Multiple Choice
The probability that a vulnerability will be known and used best describes
Question 70
True/False
A cyberwar occurs when computers are set up to attack other computers in the same or other organizations.
Question 71
Multiple Choice
Unintentional threats include each of the following
except
Question 72
Multiple Choice
________ systems are highly useful for both law enforcement and for law breaking,for example,by providing a means to obtain passwords or encryption keys and thus bypassing other security measures.
Question 73
Multiple Choice
The process of verifying the real identity of an individual,computer,computer program,or EC website best defines
Question 74
Multiple Choice
A plan that keeps the business running after a disaster occurs best defines
Question 75
Multiple Choice
An exercise that determines the impact of losing the support of an EC resource to an organization and establishes the escalation of that loss over time,identifies the minimum resources needed to recover,and prioritizes the recovery of processes and supporting systems best describes
Question 76
True/False
Fraud is aimed mostly against organizations.
Question 77
Multiple Choice
A software program that runs independently,consuming the resources of its host in order to maintain itself,that is capable of propagating a complete working version of itself onto another machine best describes