Chapter 5 Quiz 1 Econ 139A
16) Conficker is an example of a:
B) worm.
69) To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:
B) an authorization management system.
24) Angler is an example of:
B) an exploit kit.
52) Which of the following dimensions of e-commerce security does not involve encryption?
B) availability
29) Shellshock is an example of which of the following?
B) software vulnerability
74) PCI-DSS is a standard established by which of the following?
B) the credit card industry
20) What is the most frequent cause of stolen credit cards and card information today?
B) the hacking and looting of corporate servers storing credit card information
77) Linden Dollars, created for use in Second Life, are an example of:
B) virtual currency.
6) Which of the following is an example of an online privacy violation?
B) your online purchasing history being sold to other merchants without your consent
22) ________ is not an example of malicious code.
D) A sniffer
4) Which of the following is an example of an integrity violation of e-commerce security?
D) An unauthorized person intercepts an online communication and changes its contents.
15) All of the following are prominent hacktivist groups except:
D) Avid Life.
31) ________ typically attack governments, organizations, and sometimes individuals for political purposes.
D) Hacktivists
57) An intrusion detection system can perform all of the following functions except:
D) blocking suspicious activity.
72) All of the following statements about Apple Pay are true except which of the following?
A) Apple Pay is subject to recent regulations issued by the Bureau of Consumer Financial Protection applicable to GPR transactions.
54) A ________ is a hardware or software component that acts as a filter to prevent unwanted packets from entering a network.
A) firewall
73) PayPal is an example of a(n):
A) online stored value payment system.
1) Confidentiality is sometimes confused with:
A) privacy.
18) Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:]
A) spyware.
51) A digital certificate contains all of the following except the:
A) subject's private key.
3) ________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.
B) Authenticity
71) All of the following are examples of social/mobile peer-to-peer payment systems except:
B) Bill Me Later.
14) Accessing data without authorization on Dropbox is an example of which of the following?
B) cloud security issue
76) All of the following are limitations of the existing online credit card payment system except:
B) cost to consumers.
48) All of the following statements about public key cryptography are true except:
B) public key cryptography ensures authentication of the sender.
13) Which of the following has the Internet Advertising Bureau urged advertisers to abandon?
C) Adobe Flash
10) All of the following experienced high-profile data breaches in 2015 except:
C) Amazon.
5) ________ refers to the ability to ensure that an e-commerce site continues to function as intended.
C) Availability
60) Which of the following statements is not true?
A) Apple's Touch ID stores a user's actual fingerprint.
7) ________ refers to the ability to ensure that messages and data are only available to those authorized to view them.
A) Confidentiality
75) Which of the following is not a major trend in e-commerce payments in 2016-2017?
A) Mobile retail payment volume decreases.
2) ________ refers to the ability to ensure that e-commerce participants do not deny their online actions.
A) Nonrepudiation
27) Which of the following was designed to cripple Iranian nuclear centrifuges?
A) Stuxnet
19) In 2016, Yahoo revealed that it had experienced which of the following?
A) a high-profile data breach
61) A fingerprint scan is an example of which of the following?
A) biometrics
11) Bitcoins are an example of:
A) digital cash.
23) The attack on Dyn, Twitter, Amazon, and other major organizations in October 2016, is an example of which of the following?
C) DDoS attack
68) What is the first step in developing an e-commerce security plan?
C) Perform a risk assessment.
70) Which of the following statements is not true?
C) The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates.
58) Which of the following is not an example of an access control?
C) digital signatures
30) According to Ponemon Institute's 2015 survey, which of the following was not among the causes of the costliest cybercrimes?
D) botnets
56) All of the following are used for authentication except:
D) packet filters.
26) Which of the following is not an example of a PUP?
C) drive-by download
25) Malware that comes with a downloaded file requested by a user is called a:
C) drive-by download.
55) Proxy servers are also known as:
C) dual home systems.
17) Which of the following is the leading cause of data breaches?
C) hackers
21) Which dimension(s) of security is spoofing a threat to?
C) integrity and authenticity
28) Automatically redirecting a web link to a different address is an example of:
C) pharming.
44) Next generation firewalls provide all of the following except:
C) the ability to automatically update applications with security patches.