E-Commerce Chapter 5 Quiz

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

PayPal is an example of which of the following types of payment system?

  • digital checking system

  • digital credit card system

  • online stored value payment system

  • accumulating balance system

online stored value payment system

2
New cards

Accessing data without authorization on Dropbox is an example of a:

  • cloud security issue.

  • sniffing issue.

  • social network security issue.

  • mobile platform security issue.

cloud security issue.

3
New cards

Which dimensions of security is spoofing a threat to?

  • availability and authenticity

  • integrity and authenticity

  • availability and integrity

  • integrity and confidentiality

integrity and authenticity

4
New cards

All of the following are limitations of the existing online credit card payment system except:

  • cost to merchant.

  • social equity.

  • cost to consumers.

  • poor security.

cost to consumers.

5
New cards

Next generation firewalls provide all of the following except:

  • the ability to identify users regardless of the device or IP address.

  • the ability to automatically update applications on a client computer with security patches.

  • the ability to identify applications regardless of the port, protocol, or security evasion tools used.

  • an application-centric approach to firewall control.

the ability to automatically update applications on a client computer with security patches.

6
New cards

(T/F) A Trojan horse appears to be benign, but then does something other than expected.

True

7
New cards

The Data Encryption Standard uses a(n) ________-bit key.

  • 8

  • 56

  • 256

  • 512

56

8
New cards

Which of the following is an example of an integrity violation of e-commerce security?

  • A website is not actually operated by the entity the customer believes it to be.

  • A customer denies that he is the person who placed the order.

  • A merchant uses customer information in a manner not intended by the customer.

  • An unauthorized person intercepts an online communication and changes its contents.

An unauthorized person intercepts an online communication and changes its contents.

9
New cards

Which of the following was designed to cripple Iranian nuclear centrifuges?

  • Shamoon

  • Snake

  • Storm

  • Stuxnet

Stuxnet

10
New cards

Automatically redirecting a web link to a different address is an example of which of the following?

  • pharming

  • sniffing

  • DDoS attack

  • social engineering

pharming

11
New cards

What is the first step in developing an e-commerce security plan?

  • Perform a security audit.

  • Create a security organization.

  • Perform a risk assessment.

  • Develop a security policy.

Perform a risk assessment.

12
New cards

Which of the following dimensions of e-commerce security is not provided for by encryption?

  • confidentiality

  • message integrity

  • nonrepudiation

  • availability

availability

13
New cards

Asymmetric key cryptography is also known as:

  • PKI.

  • secret key cryptography.

  • public key cryptography.

  • PGP.

public key cryptography.

14
New cards

Which of the following statements about blockchain is not true?

  • A blockchain system is a transaction processing system.

  • A blockchain system is inherently centralized.

  • A blockchain system is composed of a distributed network of computers.

  • Cryptocurrencies are based on blockchain technology.

A blockchain system is inherently centralized.

15
New cards

________ is the ability to ensure that e-commerce participants do not deny their online actions.

  • Authenticity

  • Nonrepudiation

  • Availability

  • Integrity

Nonrepudiation

16
New cards

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

  • a backdoor.

  • spyware.

  • a browser parasite.

  • adware.

spyware

17
New cards

(T/F) The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.

True

18
New cards

A digital certificate contains all of the following except the:

  • subject's private key.

  • digital signature of the certification authority.

  • digital certificate serial number.

  • subject's public key.

subject's private key.

19
New cards

________ typically attack governments, organizations, and sometimes individuals for political purposes.

  • Tiger teams

  • Hacktivists

  • Crackers

  • Bounty hunters

Hacktivists

20
New cards

Which of the following is the leading cause of data breaches?

  • hackers

  • theft of a computer

  • DDoS attacks

  • accidental disclosures

Hackers