Filters
Question type

Study Flashcards

The overall rate of online credit card fraud is ________ % of all online card transactions.


A) less than 1
B) around 1
C) around 5
D) around 10

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Insiders present a greater security threat to e-commerce sites than outsiders.

A) True
B) False

Correct Answer

verifed

verified

None of the following payment systems offers immediate monetary value except:


A) personal checks.
B) credit cards.
C) stored value/debit card.
D) accumulating balance.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

All of the following are methods of securing channels of communication except:


A) SSL/TLS.
B) certificates.
C) VPN.
D) FTP.

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

Credit cards are the dominant form of online payment throughout the world.

A) True
B) False

Correct Answer

verifed

verified

Phishing attacks rely on browser parasites.

A) True
B) False

Correct Answer

verifed

verified

Which of the following did Dropbox implement after a series of security snafus in 2011 and 2012?


A) anti-virus software
B) two-factor authentication
C) SSL/TLS
D) firewall

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

All of the following are examples of malicious code except:


A) viruses.
B) bots.
C) worms.
D) sniffers.

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Explain how an online credit card transaction works, identifying the parties involved and describing how SSL/TLS is involved.What are the limitations of online credit card payment systems?

Correct Answer

verifed

verified

The five parties involved in a credit ca...

View Answer

All of the following are limitations of the existing online credit card payment system except:


A) poor security.
B) cost to consumers.
C) cost to merchant.
D) social equity.

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

What dimensions do digital signatures and hash digests add to public key encryption and how do they work?

Correct Answer

verifed

verified

Digital signatures and hash digests can ...

View Answer

Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other?


A) DES
B) NFC
C) IM
D) text messaging

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.

A) True
B) False

Correct Answer

verifed

verified

Reventon is an example of:


A) a macro virus.
B) ransomware.
C) a backdoor.
D) a bot program.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties.

A) True
B) False

Correct Answer

verifed

verified

Drive-by downloads are now the most common method of infecting computers.

A) True
B) False

Correct Answer

verifed

verified

What is the most frequent cause of stolen credit cards and card information today?


A) lost cards
B) the hacking and looting of corporate servers storing credit card information
C) sniffing programs
D) phishing attacks

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

The ________ worm was designed to disarm computers that control the centrifuges in Iran's uranium enrichment process.

Correct Answer

verifed

verified

Spoofing involves attempting to hide a true identity by using someone else's e-mail or IP address.

A) True
B) False

Correct Answer

verifed

verified

The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and:


A) confidentiality.
B) usability.
C) functionality.
D) viability.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Showing 41 - 60 of 86

Related Exams

Show Answer