MIS 305 quiz 5
Conficker is an example of a:
worm
Which of the following is an example of an online privacy violation?
your online purchasing history being sold to other merchants without your consent
All of the following are examples of cryptocurrencies except:
Zelle
Which of the following did the Internet Advertising Bureau urge advertisers to abandon?
adobe flash
To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:
an authorization management system.
Which of the following dimensions of e-commerce security is not provided for by encryption?
availability
An intrusion detection system can perform all of the following functions except:
blocking suspicious activity.
According to Ponemon Institute's 2017 survey, which of the following was not among the causes of the most costly cybercrimes?
botnets
Accessing data without authorization on Dropbox is an example of a:
cloud security issue.
Which of the following is not an example of a potentially unwanted program (PUP)?
drive-by download
Proxy servers are also known as:
dual home systems
All of the following are features of WPA3 except:
it enables the creation of a VPN.
PayPal is an example of what type of payment system?
online stored value payment system
Automatically redirecting a web link to a different address is an example of which of the following?
pharming
Confidentiality is sometimes confused with:
privacy
Which of the following is not an example of malicious code?
sniffer
Which of the following statements about Bitcoin is not true?
Bitcoins are completely secure.
All the following statements about symmetric key cryptography are true except:
symmetric key cryptography is computationally slower.
Next generation firewalls provide all of the following except:
the ability to automatically update applications with security patches.
The attack on Dyn Inc. in 2016 is an example of which of the following?
DDoS attack
All of the following are methods of securing channels of communication except:
FTP
Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?
NFC
________ is the ability to ensure that e-commerce participants do not deny their online actions.
Nonrepudiation
All of the following statements about PKI are true except:
PKI guarantees that the verifying computer of the merchant is secure.
What is the first step in developing an e-commerce security plan?
Perform a risk assessment.
FREAK is an example of a software vulnerability.
true
IoT botnets became the preferred platform for launching DDoS attacks in 2017.
true
There is a finite number of Bitcoins that can be created.
true
Which of the following was designed to cripple Iranian nuclear centrifuges?
Stuxnet
The Data Encryption Standard uses a(n) ________-bit key.
56
Which of the following statements about data breaches in 2017 is not true?
According to the Identity Theft Resource Center, employee error was the leading cause of data breaches.
All of the following statements about Apple Pay are true except which of the following?
Apple Pay is the most popular alternative payment method in the United States.
________ is the ability to ensure that messages and data are only available to those authorized to view them.
Confidentiality
Which of the following is not a major trend in e-commerce payments in 2018-2019?
Mobile retail payment volume decreases.
Which of the following statements is not true?
The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates.
________ is the ability to ensure that an e-commerce site continues to function as intended.
availability
Face ID is an example of which of the following?
biometrics
Which of the following is not a key factor for establishing e-commerce security?
data integrity
Asymmetric key cryptography is also known as:
public key cryptography.
A Trojan horse appears to be benign, but then does something other than expected.
true
A drive-by download is malware that comes with a downloaded file that a user intentionally or unintentionally requests.
true
Spoofing is the attempt to hide a hacker's true identity by using someone else's e-mail or IP address.
true
The creation of Bitcoins consumes a significant amount of energy.
true
The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.
true
What is the most frequent cause of stolen credit cards and card information today?
the hacking and looting of corporate servers storing credit card information
According to the Identity Theft Resource Center, the number of data breaches in 2017 increased by ________ compared to 2016.
55%
Which of the following statements is not true?
A VPN uses a dedicated secure line.
Which of the following statements is not true?
Apple's Touch ID stores a digital replica of a user's actual fingerprint in Apple's iCloud.
________ is the ability to identify the person or entity with whom you are dealing on the Internet.
Authenticity
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:
spyware
A digital certificate contains all of the following except the:
subject's private key.
Which of the following statements about blockchain is not true?
A blockchain system is inherently centralized.
According to Symantec, almost half of the e-mail addresses involved in business e-mail compromise (BEC) phishing that it analyzed had an IP address originating in:
Nigeria
Beebone is an example of which of the following?
botnet
Which of the following is not an example of an access control?
digital signatures
Malware that comes with a downloaded file that a user requests is called a:
drive-by download.
Bluetooth is the primary enabling technology for mobile wallets.
false
Exploit kits can be purchased by users to protect their computers from malware.
false
Phishing attacks rely on browser parasites.
false
A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.
firewall
Which dimension(s) of security is spoofing a threat to?
integrity and authenticity
The overall rate of online credit card fraud is ________ of all online card transactions.
less than 1%
Today, online bill payment accounts for ________ of all bill payments, while paper checks account for ________.
more than 55%; less than 20%
All of the following are used for authentication except:
packet filters.
All of the following statements about public key cryptography are true except:
public key cryptography ensures authentication of the sender.
PCI-DSS is a standard established by which of the following?
the credit card industry
SSL/TLS cannot provide irrefutability.
true
Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.
true
WannaCry is an example of ransomware.
true
Zelle is an example of a P2P mobile payment app.
true