Deck 10: Electronic Commerce Security

Full screen (f)
exit full mode
Question
Java is a programming language used widely in Web pages to provide active content.
Use Space or
up arrow
down arrow
to flip the card.
Question
When Java applets are run within the constraints of the sandbox, they have full access to the client computer.
Question
The element of necessity in computer security refers to preventing data delays or denials (removal).
Question
Any message traveling on the Internet is subject to secrecy, integrity, and necessity threats.
Question
A digital certificate for software can attest to the quality of the software.
Question
Threats that are deemed low risk and unlikely to occur can be ignored when the cost to protect against the threat exceeds the value of the protected asset.
Question
When a Windows-based Web browser downloads a Web page containing an embedded ActiveX control, the control is executed on the client computer.
Question
Digital certificates never expire.
Question
Worms can spread quickly through the Internet.
Question
Absolute security is relatively easy to achieve.
Question
JavaScript can be used to record the URLs of Web pages a user visits.
Question
Developers use active content because it extends the functionality of HTML and moves some data processing chores from the busy server machine to the user's client computer.
Question
One significant threat to electronic commerce is theft of sensitive or personal information.
Question
Active content is launched in a Web browser automatically when that browser loads a Web page containing active content.
Question
Secrecy protection is a legal matter.
Question
Java applets operating in a sandbox can perform file input, output, or delete operations.
Question
Message packets on the Internet travel a planned path from a source node to a destination node.
Question
The most complete way for Web site visitors to protect themselves from revealing private information or being tracked by cookies is to disable cookies entirely.
Question
The best-known active content forms are crackers and ActiveScript.
Question
JavaScript programs, like Java applets, operate under the restrictions of the Java sandbox security model.
Question
____ refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data source.

A)Necessity
B)Secrecy
C)Integrity
D)Encryption
Question
The shorter the session key, the more resistant the encryption is to attack.
Question
Java is a programming language developed by ____.

A)Microsoft
B)IBM
C)Oracle
D)Sun Microsystems
Question
The purpose of a(n)____ is to provide a way for a third-party Web site to place cookies from that third-party site on a visitor's computer.

A)ACL
B)digital ID
C)Web bug
D)gateway server
Question
Any act or object that poses a danger to computer assets is known as a ____.

A)problem
B)concern
C)threat
D)risk
Question
ActiveX controls run only on computers with ____ operating systems.

A)Windows
B)Linux
C)UNIX
D)Mac
Question
A Web browser that has entered into an SSL session indicates that it is in an encrypted session.
Question
____ refers to preventing data delays or denials.

A)Integrity
B)Secrecy
C)Necessity
D)Readiness
Question
The protection of assets using nonphysical means is called ____ security.

A)virtual
B)logical
C)computer
D)nonphysical
Question
A(n)____ is an object that contains programs and properties that Web designers place on Web pages to perform particular tasks.

A)objective
B)Java++
C)ActiveX control
D)plug-in
Question
E-mail secrecy issues address whether company supervisors should be permitted to read employees' messages randomly.
Question
A(n)____ is a small application program.

A)applet
B)buffer
C)runner
D)procedure
Question
A(n)____ is a person or device that is able to listen in on and copy Internet transmissions.

A)eavesdropper
B)surveillor
C)dropper
D)listener
Question
____ refers to preventing unauthorized data modification.

A)Integrity
B)Secrecy
C)Necessity
D)Completeness
Question
A computer that has experienced a necessity threat slows processing to an intolerably slow speed.
Question
Originally, the term ____ was used to describe a dedicated programmer who enjoyed writing complex code that tested the limits of technology.

A)eavesdropper
B)hacker
C)cracker
D)wardriver
Question
A(n)____ is a program hidden inside another program or Web page that masks its true purpose.

A)mask program
B)Trojan horse
C)hidden route
D)insider program
Question
____ is the protection of computer assets from unauthorized access, use, alteration, or destruction.

A)Computer security
B)Computer risk
C)Access security
D)Logical security
Question
One disadvantage of private-key systems is that encryption and decryption are significantly slower than public-key systems.
Question
____ refers to programs that are embedded transparently in Web pages and that cause action to occur.

A)Action page
B)Active content
C)Dynamic content
D)Activity control
Question
____ is an area of memory set aside to hold data read from a file or database.

A)RAM
B)A cookie
C)A buffer
D)Main memory
Question
A(n)____________________ cookie originates from a Web site other than the site being visited.
Question
____________________ cookies exists until the Web client ends the connection.
Question
A Web ____________________ is a tiny graphic that a third-party Web site places on another site's Web page.
Question
A Web server can compromise ____ if it allows automatic directory listings.

A)necessity
B)integrity
C)secrecy
D)authenticity
Question
____ is the protection of individual rights to nondisclosure.

A)Secrecy
B)Privacy
C)Necessity
D)Sensitivity
Question
Software applications called ____ provide the means to record information that passes through a computer or router that is handling Internet traffic.

A)intruder programs
B)copier programs
C)sniffer programs
D)backdoor programs
Question
Any organization concerned about protecting its electronic commerce assets should have a(n)____________________ in place.
Question
A(n)____ allows anyone with knowledge of its existence to cause damage by observing transactions, deleting data, or stealing data.

A)sniffer
B)backdoor
C)tunnel
D)opener
Question
____________________ cookies remain on the client machine indefinitely.
Question
____________________ is used in electronic commerce to place items into a shopping cart and compute a total invoice amount, including sales tax, handling, and shipping costs.
Question
____ is the electronic defacing of an existing Web site's page.

A)Masquerading
B)Steganography
C)Cybersquatting
D)Cybervandalism
Question
A(n)____ is software that attaches itself to another program and can cause damage when the host program is activated.

A)applet
B)cookie
C)virus
D)message digest
Question
Cookies can be placed on the client computer by the Web server site, in which case they are called ____________________ cookies.
Question
____ is pretending to be someone you are not or representing a Web site as an original when it is really a fake.

A)Hash coding
B)Spoofing
C)Cybersquatting
D)Warchalking
Question
The term ____ describes the process of hiding information within another piece of information.

A)ACL
B)steganography
C)firewall
D)decryption
Question
____________________ is the general name for a procedure, either physical or logical, that recognizes, reduces, or eliminates a threat.
Question
A(n)____________________ occurs when an Internet e-mail message is intercepted and its contents are changed before it is forwarded to its original destination.
Question
____________________ security means having all security measures working together to prevent unauthorized disclosure, destruction, or modification of assets.
Question
____ encryption encodes a message with an algorithm that uses a single numeric key, such as 456839420783, to encode and decode data.

A)Hash coding
B)Symmetric
C)Asymmetric
D)Transformative
Question
A(n)____________________ is simply a number that is used with the encryption algorithm to "lock" the characters of the message being protected so that they are undecipherable without the key.
Question
The process of proposing and accepting (or rejecting)various transmission conditions is called session ____________________.
Question
A(n)____________________ security device is one that uses an element of a person's biological makeup to perform the identification.
Question
What are the six main elements included on a digital certificate?
Question
The program that transforms normal text into cipher text is called a(n)____________________ program.
Question
A(n)____________________ is an attachment to an e-mail message or program embedded in a Web page that verifies that the sender or Web site is who it claims to be.
Question
What is the difference between a virus and a worm?
Question
Asymmetric encryption is also known as ____________________ encryption.
Question
____________________ Java applets are those that have not been established as secure.
Question
____________________ exists when an unauthorized party can alter a message stream of information.
Question
____________________ is the coding of information by using a mathematically based program and a secret key to produce a string of characters that is unintelligible.
Question
In some cities that have large concentrations of wireless networks, attackers, called ____________________, drive around in cars using their wireless-equipped laptop computers to search for accessible networks.
Question
______________________________ are the computers on the Internet that maintain directories that link domain names to IP addresses.
Question
Briefly describe the requirements for secure electronic commerce.
Question
Apps that contain malware or that collect information from the mobile device and forward it to perpetrators are called a(n)____________________ app.
Question
A(n)____________________ is a Trojan horse that secretly takes over another computer for the purpose of launching attacks on other computers.
Question
The science that studies encryption is called ____________________.
Question
____________________ are programs that enhance the capabilities of browsers.
Question
Describe the security dangers inherent in ActiveX controls.
Question
How might a buffer in a Web server cause security threats?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/80
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Electronic Commerce Security
1
Java is a programming language used widely in Web pages to provide active content.
True
2
When Java applets are run within the constraints of the sandbox, they have full access to the client computer.
False
3
The element of necessity in computer security refers to preventing data delays or denials (removal).
True
4
Any message traveling on the Internet is subject to secrecy, integrity, and necessity threats.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
5
A digital certificate for software can attest to the quality of the software.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
6
Threats that are deemed low risk and unlikely to occur can be ignored when the cost to protect against the threat exceeds the value of the protected asset.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
7
When a Windows-based Web browser downloads a Web page containing an embedded ActiveX control, the control is executed on the client computer.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
8
Digital certificates never expire.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
9
Worms can spread quickly through the Internet.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
10
Absolute security is relatively easy to achieve.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
11
JavaScript can be used to record the URLs of Web pages a user visits.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
12
Developers use active content because it extends the functionality of HTML and moves some data processing chores from the busy server machine to the user's client computer.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
13
One significant threat to electronic commerce is theft of sensitive or personal information.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
14
Active content is launched in a Web browser automatically when that browser loads a Web page containing active content.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
15
Secrecy protection is a legal matter.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
16
Java applets operating in a sandbox can perform file input, output, or delete operations.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
17
Message packets on the Internet travel a planned path from a source node to a destination node.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
18
The most complete way for Web site visitors to protect themselves from revealing private information or being tracked by cookies is to disable cookies entirely.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
19
The best-known active content forms are crackers and ActiveScript.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
20
JavaScript programs, like Java applets, operate under the restrictions of the Java sandbox security model.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
21
____ refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data source.

A)Necessity
B)Secrecy
C)Integrity
D)Encryption
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
22
The shorter the session key, the more resistant the encryption is to attack.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
23
Java is a programming language developed by ____.

A)Microsoft
B)IBM
C)Oracle
D)Sun Microsystems
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
24
The purpose of a(n)____ is to provide a way for a third-party Web site to place cookies from that third-party site on a visitor's computer.

A)ACL
B)digital ID
C)Web bug
D)gateway server
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
25
Any act or object that poses a danger to computer assets is known as a ____.

A)problem
B)concern
C)threat
D)risk
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
26
ActiveX controls run only on computers with ____ operating systems.

A)Windows
B)Linux
C)UNIX
D)Mac
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
27
A Web browser that has entered into an SSL session indicates that it is in an encrypted session.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
28
____ refers to preventing data delays or denials.

A)Integrity
B)Secrecy
C)Necessity
D)Readiness
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
29
The protection of assets using nonphysical means is called ____ security.

A)virtual
B)logical
C)computer
D)nonphysical
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
30
A(n)____ is an object that contains programs and properties that Web designers place on Web pages to perform particular tasks.

A)objective
B)Java++
C)ActiveX control
D)plug-in
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
31
E-mail secrecy issues address whether company supervisors should be permitted to read employees' messages randomly.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
32
A(n)____ is a small application program.

A)applet
B)buffer
C)runner
D)procedure
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
33
A(n)____ is a person or device that is able to listen in on and copy Internet transmissions.

A)eavesdropper
B)surveillor
C)dropper
D)listener
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
34
____ refers to preventing unauthorized data modification.

A)Integrity
B)Secrecy
C)Necessity
D)Completeness
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
35
A computer that has experienced a necessity threat slows processing to an intolerably slow speed.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
36
Originally, the term ____ was used to describe a dedicated programmer who enjoyed writing complex code that tested the limits of technology.

A)eavesdropper
B)hacker
C)cracker
D)wardriver
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
37
A(n)____ is a program hidden inside another program or Web page that masks its true purpose.

A)mask program
B)Trojan horse
C)hidden route
D)insider program
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
38
____ is the protection of computer assets from unauthorized access, use, alteration, or destruction.

A)Computer security
B)Computer risk
C)Access security
D)Logical security
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
39
One disadvantage of private-key systems is that encryption and decryption are significantly slower than public-key systems.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
40
____ refers to programs that are embedded transparently in Web pages and that cause action to occur.

A)Action page
B)Active content
C)Dynamic content
D)Activity control
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
41
____ is an area of memory set aside to hold data read from a file or database.

A)RAM
B)A cookie
C)A buffer
D)Main memory
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
42
A(n)____________________ cookie originates from a Web site other than the site being visited.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
43
____________________ cookies exists until the Web client ends the connection.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
44
A Web ____________________ is a tiny graphic that a third-party Web site places on another site's Web page.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
45
A Web server can compromise ____ if it allows automatic directory listings.

A)necessity
B)integrity
C)secrecy
D)authenticity
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
46
____ is the protection of individual rights to nondisclosure.

A)Secrecy
B)Privacy
C)Necessity
D)Sensitivity
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
47
Software applications called ____ provide the means to record information that passes through a computer or router that is handling Internet traffic.

A)intruder programs
B)copier programs
C)sniffer programs
D)backdoor programs
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
48
Any organization concerned about protecting its electronic commerce assets should have a(n)____________________ in place.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
49
A(n)____ allows anyone with knowledge of its existence to cause damage by observing transactions, deleting data, or stealing data.

A)sniffer
B)backdoor
C)tunnel
D)opener
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
50
____________________ cookies remain on the client machine indefinitely.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
51
____________________ is used in electronic commerce to place items into a shopping cart and compute a total invoice amount, including sales tax, handling, and shipping costs.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
52
____ is the electronic defacing of an existing Web site's page.

A)Masquerading
B)Steganography
C)Cybersquatting
D)Cybervandalism
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
53
A(n)____ is software that attaches itself to another program and can cause damage when the host program is activated.

A)applet
B)cookie
C)virus
D)message digest
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
54
Cookies can be placed on the client computer by the Web server site, in which case they are called ____________________ cookies.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
55
____ is pretending to be someone you are not or representing a Web site as an original when it is really a fake.

A)Hash coding
B)Spoofing
C)Cybersquatting
D)Warchalking
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
56
The term ____ describes the process of hiding information within another piece of information.

A)ACL
B)steganography
C)firewall
D)decryption
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
57
____________________ is the general name for a procedure, either physical or logical, that recognizes, reduces, or eliminates a threat.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
58
A(n)____________________ occurs when an Internet e-mail message is intercepted and its contents are changed before it is forwarded to its original destination.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
59
____________________ security means having all security measures working together to prevent unauthorized disclosure, destruction, or modification of assets.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
60
____ encryption encodes a message with an algorithm that uses a single numeric key, such as 456839420783, to encode and decode data.

A)Hash coding
B)Symmetric
C)Asymmetric
D)Transformative
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
61
A(n)____________________ is simply a number that is used with the encryption algorithm to "lock" the characters of the message being protected so that they are undecipherable without the key.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
62
The process of proposing and accepting (or rejecting)various transmission conditions is called session ____________________.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
63
A(n)____________________ security device is one that uses an element of a person's biological makeup to perform the identification.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
64
What are the six main elements included on a digital certificate?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
65
The program that transforms normal text into cipher text is called a(n)____________________ program.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
66
A(n)____________________ is an attachment to an e-mail message or program embedded in a Web page that verifies that the sender or Web site is who it claims to be.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
67
What is the difference between a virus and a worm?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
68
Asymmetric encryption is also known as ____________________ encryption.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
69
____________________ Java applets are those that have not been established as secure.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
70
____________________ exists when an unauthorized party can alter a message stream of information.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
71
____________________ is the coding of information by using a mathematically based program and a secret key to produce a string of characters that is unintelligible.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
72
In some cities that have large concentrations of wireless networks, attackers, called ____________________, drive around in cars using their wireless-equipped laptop computers to search for accessible networks.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
73
______________________________ are the computers on the Internet that maintain directories that link domain names to IP addresses.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
74
Briefly describe the requirements for secure electronic commerce.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
75
Apps that contain malware or that collect information from the mobile device and forward it to perpetrators are called a(n)____________________ app.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
76
A(n)____________________ is a Trojan horse that secretly takes over another computer for the purpose of launching attacks on other computers.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
77
The science that studies encryption is called ____________________.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
78
____________________ are programs that enhance the capabilities of browsers.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
79
Describe the security dangers inherent in ActiveX controls.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
80
How might a buffer in a Web server cause security threats?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 80 flashcards in this deck.