1/19
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
PayPal is an example of which of the following types of payment system?
digital checking system
digital credit card system
online stored value payment system
accumulating balance system
online stored value payment system
Accessing data without authorization on Dropbox is an example of a:
cloud security issue.
sniffing issue.
social network security issue.
mobile platform security issue.
cloud security issue.
Which dimensions of security is spoofing a threat to?
availability and authenticity
integrity and authenticity
availability and integrity
integrity and confidentiality
integrity and authenticity
All of the following are limitations of the existing online credit card payment system except:
cost to merchant.
social equity.
cost to consumers.
poor security.
cost to consumers.
Next generation firewalls provide all of the following except:
the ability to identify users regardless of the device or IP address.
the ability to automatically update applications on a client computer with security patches.
the ability to identify applications regardless of the port, protocol, or security evasion tools used.
an application-centric approach to firewall control.
the ability to automatically update applications on a client computer with security patches.
(T/F) A Trojan horse appears to be benign, but then does something other than expected.
True
The Data Encryption Standard uses a(n) ________-bit key.
8
56
256
512
56
Which of the following is an example of an integrity violation of e-commerce security?
A website is not actually operated by the entity the customer believes it to be.
A customer denies that he is the person who placed the order.
A merchant uses customer information in a manner not intended by the customer.
An unauthorized person intercepts an online communication and changes its contents.
An unauthorized person intercepts an online communication and changes its contents.
Which of the following was designed to cripple Iranian nuclear centrifuges?
Shamoon
Snake
Storm
Stuxnet
Stuxnet
Automatically redirecting a web link to a different address is an example of which of the following?
pharming
sniffing
DDoS attack
social engineering
pharming
What is the first step in developing an e-commerce security plan?
Perform a security audit.
Create a security organization.
Perform a risk assessment.
Develop a security policy.
Perform a risk assessment.
Which of the following dimensions of e-commerce security is not provided for by encryption?
confidentiality
message integrity
nonrepudiation
availability
availability
Asymmetric key cryptography is also known as:
PKI.
secret key cryptography.
public key cryptography.
PGP.
public key cryptography.
Which of the following statements about blockchain is not true?
A blockchain system is a transaction processing system.
A blockchain system is inherently centralized.
A blockchain system is composed of a distributed network of computers.
Cryptocurrencies are based on blockchain technology.
A blockchain system is inherently centralized.
________ is the ability to ensure that e-commerce participants do not deny their online actions.
Authenticity
Nonrepudiation
Availability
Integrity
Nonrepudiation
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:
a backdoor.
spyware.
a browser parasite.
adware.
spyware
(T/F) The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.
True
A digital certificate contains all of the following except the:
subject's private key.
digital signature of the certification authority.
digital certificate serial number.
subject's public key.
subject's private key.
________ typically attack governments, organizations, and sometimes individuals for political purposes.
Tiger teams
Hacktivists
Crackers
Bounty hunters
Hacktivists
Which of the following is the leading cause of data breaches?
hackers
theft of a computer
DDoS attacks
accidental disclosures
Hackers