E-Commerce Chapter 5 T/F
1) Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.
TRUE
10) The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.
TRUE
11) The U.S. federal government has historically not been in favor of the development and export of strong encryption systems.
TRUE
13) In order to accept payments by credit card, online merchants typically must have a merchant account established with a bank or financial institution.
TRUE
15) PayPal requires the recipient of a payment to have a PayPal account to receive funds.
TRUE
2) A worm does not need to be activated by a user in order for it to replicate itself.
TRUE
3) A Trojan horse appears to be benign, but then does something other than expected.
TRUE
5) Insiders present a greater security threat to e-commerce sites than outsiders.
TRUE
7) Drive-by downloads are now the most common method of infecting computers.
TRUE
8) Smishing attacks exploit SMS messages.
TRUE
12) Credit cards are the dominant form of online payment throughout the world.
FALSE
14) Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties.
FALSE
4) Phishing attacks rely on browser parasites.
FALSE
9) TLS does not guarantee server-side authentication.
FALSE
6) Spoofing involves attempting to hide a true identity by using someone else's e-mail or IP address.
True