Filters
Question type

Study Flashcards

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.

Correct Answer

verifed

verified

What is the first step in developing an e-commerce security plan?


A) Create a security organization.
B) Develop a security policy.
C) Perform a risk assessment.
D) Perform a security audit.

Correct Answer

verifed

verified

Discuss the security of communications channels. Include definitions and explanations for the terms Secure Sockets Layer/Transport Layer Security (SSL/TL S), secure negotiated session, session key, and VPN.

Correct Answer

verifed

verified

The Secure Sockets Layer of the Transmis...

View Answer

Which of the following is not a major trend in e-commerce payments in 2015-2016?


A) Mobile retail payment volume decreases.
B) PayPal remains the most popular alternative payment method.
C) Apple introduces Apple Pay.
D) Payment by credit and/or debit card remains the dominant form of online payment.

Correct Answer

verifed

verified

A digital certificate contains all of the following except the:


A) subject's private key.
B) subject's public key.
C) digital signature of the certification authority.
D) digital certificate serial number.

Correct Answer

verifed

verified

Accessing data without authorization on Dropbox is an example of which of the following?


A) social network security issue
B) cloud security issue
C) mobile platform security issue
D) sniffing

Correct Answer

verifed

verified

The Data Encryption Standard uses a(n) ________-bit key.


A) 8
B) 56
C) 256
D) 512

Correct Answer

verifed

verified

Which of the following is the leading cause of data breaches?


A) theft of a computer
B) accidental disclosures
C) hackers
D) DDoS attacks

Correct Answer

verifed

verified

Which of the following dimensions of e-commerce security is not provided for by encryption?


A) confidentiality
B) availability
C) message integrity
D) nonrepudiation

Correct Answer

verifed

verified

All of the following statements about public key cryptography are true except:


A) public key cryptography uses two mathematically related digital keys.
B) public key cryptography ensures authentication of the sender.
C) public key cryptography does not ensure message integrity.
D) public key cryptography is based on the idea of irreversible mathematical functions.

Correct Answer

verifed

verified

Symmetric key cryptography is also known as:


A) public key cryptography.
B) secret key cryptography.
C) PGP.
D) PKI.

Correct Answer

verifed

verified

Discuss and explain the various types of malicious code and how they work. Include the different types of viruses.

Correct Answer

verifed

verified

Malicious code includes a variety of thr...

View Answer

A worm does not need to be activated by a user in order for it to replicate itself.

Correct Answer

verifed

verified

Which of the following has the Internet Advertising Bureau urged advertisers to abandon?


A) HTML
B) HTML5
C) Adobe Flash
D) Adobe Acrobat

Correct Answer

verifed

verified

Automatically redirecting a Web link to a different address is an example of which of the following?


A) sniffing
B) social engineering
C) pharming
D) DDoS attack

Correct Answer

verifed

verified

Vishing attacks exploit SMS messages.

Correct Answer

verifed

verified

Which of the following statements is not true?


A) Apple's Touch ID stores a user's actual fingerprint.
B) Biometric devices reduce the opportunity for spoofing.
C) A retina scan is an example of a biometric device.
D) Biometric data stored on an iPhone is encrypted.

Correct Answer

verifed

verified

Bitcoins are an example of:


A) digital cash.
B) virtual currency.
C) a stored value payment system.
D) an EBPP system.

Correct Answer

verifed

verified

All of the following are limitations of the existing online credit card payment system except:


A) poor security.
B) cost to consumers.
C) cost to merchant.
D) social equity.

Correct Answer

verifed

verified

________ refers to the ability to ensure that an e-commerce site continues to function as intended.


A) Nonrepudiation
B) Authenticity
C) Availability
D) Integrity

Correct Answer

verifed

verified

Showing 41 - 60 of 85

Related Exams

Show Answer