Deck 5: E-Commerce Security and Payment Systems
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/86
Play
Full screen (f)
Deck 5: E-Commerce Security and Payment Systems
1
The Java Runtime Environment is a frequent target of exploit kits.
True
2
The overall rate of online credit card fraud is ________ % of all online card transactions.
A) less than 1
B) around 5
C) around 10
D) around 15
A) less than 1
B) around 5
C) around 10
D) around 15
A
3
CryptoLocker is an example of ransomware.
True
4
A worm needs to be activated by a user in order for it to replicate itself.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
5
Credit cards are the dominant form of online payment throughout the world.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
6
There is a finite number of Bitcoins that can be created.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
7
Smishing attacks exploit SMS messages.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
8
Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
9
Spoofing involves attempting to hide a True identity by using someone else's e-mail or IP address.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
10
All of the following experienced high-profile data breaches in 2013 except:
A) Evernote.
B) Home Depot.
C) Sony.
D) Adobe.
A) Evernote.
B) Home Depot.
C) Sony.
D) Adobe.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
11
Bitcoins are an example of:
A) digital cash.
B) virtual currency.
C) a stored value payment system.
D) an EBPP system.
A) digital cash.
B) virtual currency.
C) a stored value payment system.
D) an EBPP system.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
12
Phishing attacks rely on browser parasites.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
13
The Heartbleed bug is an example of a software vulnerability.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
14
A Trojan horse appears to be benign, but then does something other than expected.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
15
Privacy is sometimes confused with:
A) confidentiality.
B) authenticity.
C) integrity.
D) nonrepudiation.
A) confidentiality.
B) authenticity.
C) integrity.
D) nonrepudiation.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
16
The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
17
In the United States, the primary form of online payment is:
A) PayPal.
B) Bill Me Later.
C) Amazon Payment.
D) Google Wallet.
A) PayPal.
B) Bill Me Later.
C) Amazon Payment.
D) Google Wallet.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
18
SLS/TLS provides irrefutability.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
19
Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
20
Apple Pay uses near field communication (NFC) chips.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
21
Symmetric key cryptography is also known as:
A) public key cryptography.
B) secret key cryptography.
C) PGP.
D) PKI.
A) public key cryptography.
B) secret key cryptography.
C) PGP.
D) PKI.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
22
________ refers to the ability to ensure that e-commerce participants do not deny their online actions.
A) Nonrepudiation
B) Authenticity
C) Availability
D) Integrity
A) Nonrepudiation
B) Authenticity
C) Availability
D) Integrity
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
23
________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.
A) Nonrepudiation
B) Authenticity
C) Availability
D) Integrity
A) Nonrepudiation
B) Authenticity
C) Availability
D) Integrity
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
24
Which dimension(s) of security is spoofing a threat to?
A) integrity
B) availability
C) integrity and authenticity
D) availability and integrity
A) integrity
B) availability
C) integrity and authenticity
D) availability and integrity
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following is an example of an integrity violation of e-commerce security?
A) A Web site is not actually operated by the entity the customer believes it to be.
B) A merchant uses customer information in a manner not intended by the customer.
C) A customer denies that he or she is the person who placed the order.
D) An unauthorized person intercepts an online communication and changes its contents.
A) A Web site is not actually operated by the entity the customer believes it to be.
B) A merchant uses customer information in a manner not intended by the customer.
C) A customer denies that he or she is the person who placed the order.
D) An unauthorized person intercepts an online communication and changes its contents.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following is not a key point of vulnerability when dealing with e-commerce?
A) the client computer
B) the server
C) the communications pipeline
D) the credit card companies
A) the client computer
B) the server
C) the communications pipeline
D) the credit card companies
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
27
________ refers to the ability to ensure that messages and data are only available to those authorized to view them.
A) Confidentiality
B) Integrity
C) Privacy
D) Availability
A) Confidentiality
B) Integrity
C) Privacy
D) Availability
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
28
The Data Encryption Standard uses a(n) ________-bit key.
A) 8
B) 56
C) 256
D) 512
A) 8
B) 56
C) 256
D) 512
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
29
In 2013, the Target retail chain experienced which of the following?
A) a large-scale data breach
B) a DDoS attack that shut down its Web site
C) a hacktivist attack to protest its wage policies
D) a browser parasite
A) a large-scale data breach
B) a DDoS attack that shut down its Web site
C) a hacktivist attack to protest its wage policies
D) a browser parasite
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following is a prominent hacktivist group?
A) Anonymous
B) Anti-Phishing Working Group
C) IC3
D) Symantec
A) Anonymous
B) Anti-Phishing Working Group
C) IC3
D) Symantec
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
31
What is the most frequent cause of stolen credit cards and card information today?
A) lost cards
B) the hacking and looting of corporate servers storing credit card information
C) sniffing programs
D) phishing attacks
A) lost cards
B) the hacking and looting of corporate servers storing credit card information
C) sniffing programs
D) phishing attacks
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
32
Accessing data without authorization on Dropbox is an example of which of the following?
A) social network security issue
B) cloud security issue
C) mobile platform security issue
D) sniffing
A) social network security issue
B) cloud security issue
C) mobile platform security issue
D) sniffing
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following is the leading cause of data breaches?
A) theft of a computer
B) accidental disclosures
C) hackers
D) DDoS attacks
A) theft of a computer
B) accidental disclosures
C) hackers
D) DDoS attacks
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
34
________ refers to the ability to ensure that an e-commerce site continues to function as intended.
A) Nonrepudiation
B) Authenticity
C) Availability
D) Integrity
A) Nonrepudiation
B) Authenticity
C) Availability
D) Integrity
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
35
All the following statements about symmetric key cryptography are True except:
A) in symmetric key cryptography, both the sender and the receiver use the same key to encrypt and decrypt a message.
B) the Data Encryption Standard is a symmetric key encryption system.
C) symmetric key cryptography is computationally slower.
D) symmetric key cryptography is a key element in digital envelopes.
A) in symmetric key cryptography, both the sender and the receiver use the same key to encrypt and decrypt a message.
B) the Data Encryption Standard is a symmetric key encryption system.
C) symmetric key cryptography is computationally slower.
D) symmetric key cryptography is a key element in digital envelopes.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
36
Next generation firewalls provide all of the following except:
A) an application-centric approach to firewall control
B) the ability to identify applications regardless of the port, protocol, or security evasion tools used
C) the ability to automatically update applications with security patches
D) the ability to identify users regardless of the device or IP address
A) an application-centric approach to firewall control
B) the ability to identify applications regardless of the port, protocol, or security evasion tools used
C) the ability to automatically update applications with security patches
D) the ability to identify users regardless of the device or IP address
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
37
All of the following are examples of malicious code except:
A) viruses.
B) bots.
C) worms.
D) sniffers.
A) viruses.
B) bots.
C) worms.
D) sniffers.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
38
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:
A) spyware.
B) a backdoor.
C) pupware.
D) adware.
A) spyware.
B) a backdoor.
C) pupware.
D) adware.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
39
Most of the world's malware is delivered via which of the following?
A) viruses
B) worms
C) Trojan horses
D) botnets
A) viruses
B) worms
C) Trojan horses
D) botnets
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
40
An example of an online privacy violation is:
A) your e-mail being read by a hacker.
B) your online purchasing history being sold to other merchants without your consent.
C) your computer being used as part of a botnet.
D) your e-mail being altered by a hacker.
A) your e-mail being read by a hacker.
B) your online purchasing history being sold to other merchants without your consent.
C) your computer being used as part of a botnet.
D) your e-mail being altered by a hacker.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
41
What is the first step in developing an e-commerce security plan?
A) Create a security organization.
B) Develop a security policy.
C) Perform a risk assessment.
D) Perform a security audit.
A) Create a security organization.
B) Develop a security policy.
C) Perform a risk assessment.
D) Perform a security audit.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
42
To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:
A) access controls.
B) an authorization management system.
C) security tokens.
D) an authorization policy.
A) access controls.
B) an authorization management system.
C) security tokens.
D) an authorization policy.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
43
In May 2014, the U.S. Department of Justice indicted five army members from which of the following countries for conducting industrial espionage against U.S. Steel and Westinghouse?
A) Russia
B) China
C) Iran
D) Iraq
A) Russia
B) China
C) Iran
D) Iraq
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
44
A digital certificate contains all of the following except the:
A) subject's private key.
B) subject's public key.
C) digital signature of the certification authority.
D) digital certificate serial number.
A) subject's private key.
B) subject's public key.
C) digital signature of the certification authority.
D) digital certificate serial number.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
45
All of the following statements about public key cryptography are True except:
A) public key cryptography uses two mathematically related digital keys.
B) public key cryptography ensures authentication of the sender.
C) public key cryptography does not ensure message integrity.
D) public key cryptography is based on the idea of irreversible mathematical functions.
A) public key cryptography uses two mathematically related digital keys.
B) public key cryptography ensures authentication of the sender.
C) public key cryptography does not ensure message integrity.
D) public key cryptography is based on the idea of irreversible mathematical functions.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
46
All of the following statements about Apple Pay are True except which of the following?
A) Apple Pay is available for both iPhone 5s and iPhone 6s.
B) Apple Pay is based on Touch ID biometric fingerprint scanning.
C) Apple Pay can be used for mobile payments at the point of sale at a physical store.
D) Apple Pay relies on the consumer having a credit card on file with Apple's iTunes.
A) Apple Pay is available for both iPhone 5s and iPhone 6s.
B) Apple Pay is based on Touch ID biometric fingerprint scanning.
C) Apple Pay can be used for mobile payments at the point of sale at a physical store.
D) Apple Pay relies on the consumer having a credit card on file with Apple's iTunes.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
47
Which of the following is the current standard used to protect Wi-Fi networks?
A) WEP
B) TLS
C) WPA2
D) WPA3
A) WEP
B) TLS
C) WPA2
D) WPA3
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
48
All of the following are methods of securing channels of communication except:
A) SSL/TLS.
B) certificates.
C) VPN.
D) FTP.
A) SSL/TLS.
B) certificates.
C) VPN.
D) FTP.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
49
Online bill payment now accounts for ________ of all bill payments, while paper checks account for ________.
A) less than 10%, less than 25%
B) about 25%, about 10%
C) more than 50%, less than 25%
D) 100%, 0%
A) less than 10%, less than 25%
B) about 25%, about 10%
C) more than 50%, less than 25%
D) 100%, 0%
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
50
Zeus is an example of which of the following?
A) SQL injection attack
B) browser parasite
C) DDoS attack
D) Trojan horse
A) SQL injection attack
B) browser parasite
C) DDoS attack
D) Trojan horse
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
51
Rustock is an example of which of the following?
A) worm
B) botnet
C) phishing
D) hacktivism
A) worm
B) botnet
C) phishing
D) hacktivism
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
52
Proxy servers are also known as:
A) firewalls.
B) application gateways.
C) dual home systems.
D) packet filters.
A) firewalls.
B) application gateways.
C) dual home systems.
D) packet filters.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
53
A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.
A) firewall
B) virtual private network
C) proxy server
D) PPTP
A) firewall
B) virtual private network
C) proxy server
D) PPTP
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
54
All of the following are used for authentication except:
A) digital signatures.
B) certificates of authority.
C) biometric devices.
D) packet filters.
A) digital signatures.
B) certificates of authority.
C) biometric devices.
D) packet filters.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
55
Which of the following is not a major trend in e-commerce payments in 2014-2015?
A) Mobile retail payment volume decreases.
B) PayPal remains the most popular alternative payment method.
C) Apple introduces Apple Pay.
D) Payment by credit and/or debit card remains the dominant form of online payment.
A) Mobile retail payment volume decreases.
B) PayPal remains the most popular alternative payment method.
C) Apple introduces Apple Pay.
D) Payment by credit and/or debit card remains the dominant form of online payment.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
56
An intrusion detection system can perform all of the following functions except:
A) examining network traffic.
B) setting off an alarm when suspicious activity is detected.
C) checking network traffic to see if it matches certain patterns or preconfigured rules.
D) blocking suspicious activity.
A) examining network traffic.
B) setting off an alarm when suspicious activity is detected.
C) checking network traffic to see if it matches certain patterns or preconfigured rules.
D) blocking suspicious activity.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
57
Which of the following is not an example of an access control?
A) firewalls
B) proxy servers
C) digital signatures
D) login passwords
A) firewalls
B) proxy servers
C) digital signatures
D) login passwords
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
58
Which of the following dimensions of e-commerce security is not provided for by encryption?
A) confidentiality
B) availability
C) message integrity
D) nonrepudiation
A) confidentiality
B) availability
C) message integrity
D) nonrepudiation
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
59
All of the following statements about PKI are True except:
A) The term PKI refers to the certification authorities and digital certificate procedures that are accepted by all parties.
B) PKI is not effective against insiders who have a legitimate access to corporate systems including customer information.
C) PKI guarantees that the verifying computer of the merchant is secure.
D) The acronym PKI stands for public key infrastructure.
A) The term PKI refers to the certification authorities and digital certificate procedures that are accepted by all parties.
B) PKI is not effective against insiders who have a legitimate access to corporate systems including customer information.
C) PKI guarantees that the verifying computer of the merchant is secure.
D) The acronym PKI stands for public key infrastructure.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
60
PayPal is an example of what type of payment system?
A) online stored value payment system
B) digital checking system
C) accumulating balance system
D) digital credit card system
A) online stored value payment system
B) digital checking system
C) accumulating balance system
D) digital credit card system
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
61
________ enables the online delivery and payment of monthly bills.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
62
Malware that comes with a downloaded file that a user requests is called a:
A) Trojan horse.
B) backdoor.
C) drive-by download.
D) PUP.
A) Trojan horse.
B) backdoor.
C) drive-by download.
D) PUP.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
63
________ was designed to cripple Iranian nuclear centrifuges.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
64
The most common form of securing a digital channel of communication is ________.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
65
All of the following are limitations of the existing online credit card payment system except:
A) poor security.
B) cost to consumers.
C) cost to merchant.
D) social equity.
A) poor security.
B) cost to consumers.
C) cost to merchant.
D) social equity.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
66
Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other?
A) DES
B) NFC
C) IM
D) text messaging
A) DES
B) NFC
C) IM
D) text messaging
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
67
Linden Dollars, created for use in Second Life, are an example of:
A) digital cash.
B) virtual currency.
C) EBPP.
D) peer-to-peer payment systems.
A) digital cash.
B) virtual currency.
C) EBPP.
D) peer-to-peer payment systems.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
68
________ text is text that has been encrypted and thus cannot be read by anyone other than the sender and the receiver.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
69
A fingerprint or retina (eye) scan is an example of ________.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
70
To internal computers, a proxy server is known as the ________.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
71
________ typically attack governments, organizations, and sometimes individuals for political purposes.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
72
Using a technique referred to as ________, mobile application developers use their private key to encrypt a digital signature.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
73
Malicious code is sometimes also referred to as ________.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
74
________ relies on human curiosity, greed, and gullibility to trick people into taking action that will result in the downloading of malware.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
75
A(n) ________ helps organizations locate and fix security flaws.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
76
A(n) ________ vulnerability involves a vulnerability unknown to security experts that is actively exploited before there is a patch available.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
77
Automatically redirecting a Web link to a different address is called ________.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
78
To allow employees to connect securely over the Internet to their corporate network, you would use a(n) ________.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
79
Which of the following is not an example of a PUP?
A) adware
B) browser parasite
C) drive-by download
D) spyware
A) adware
B) browser parasite
C) drive-by download
D) spyware
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
80
A(n) ________ is a feature of viruses, worms, and Trojans that allows an attacker to remotely access a compromised computer.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck