Ecommerce Ch 5

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

________ is not an example of malicious code.

A sniffer

Bitcoins are an example of

digital cash

A ________ is a hardware or software component that acts as a filter to prevent unwanted packets from entering a network.

firewall

________ refers to the ability to ensure that messages and data are only available to those authorized to view them.

Confidentiality

________ is the current standard used to protect Wi-Fi networks.

WPA2

In 2016, Yahoo revealed that it had experienced which of the following?

a high-profile data breach

Angler is an example of:

an exploit kit.

According to Ponemon Institute's 2015 survey, which of the following was not among the causes of the costliest cybercrimes?

botnets

Accessing data without authorization on Dropbox is an example of which of the following?

cloud security issue

Malware that comes with a downloaded file requested by a user is called a:

drive-by download

Proxy servers are also known as:

dual home systems.

Which dimension(s) of security is spoofing a threat to?

integrity and authenticity

The overall rate of online credit card fraud is ________ of all online card transactions.

less than 1%

Symmetric key cryptography is also known as:

secret key cryptography.

Shellshock is an example of which of the following?

software vulnerability

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

spyware

Next generation firewalls provide all of the following except:

the ability to automatically update applications with security patches.

What is the most frequent cause of stolen credit cards and card information today?

the hacking and looting of corporate servers storing credit card information

Which of the following is an example of an online privacy violation?

your online purchasing history being sold to other merchants without your consent

The Data Encryption Standard uses a(n) ________-bit key.

56

Which of the following has the Internet Advertising Bureau urged advertisers to abandon?

Adobe Flash

All of the following experienced high-profile data breaches in 2015 except

Amazon

Which of the following was designed to cripple Iranian nuclear centrifuges?

Stuxnet

Which of the following dimensions of e-commerce security does not involve encryption?

availability

Which of the following is the leading cause of data breaches?

hackers

Automatically redirecting a web link to a different address is an example of:

pharming.

Confidentiality is sometimes confused with:

privacy

All of the following statements about public key cryptography are true except:

public key cryptography ensures authentication of the sender.

All the following statements about symmetric key cryptography are true except:

symmetric key cryptography is computationally slower.

Which of the following is not an example of a PUP?

drive-by download

Conficker is an example of a:

worm

Which of the following is an example of an integrity violation of e-commerce security?

An unauthorized person intercepts an online communication and changes its contents.

________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.

Authenticity

________ refers to the ability to ensure that an e-commerce site continues to function as intended.

Availability

All of the following are prominent hacktivist groups except:

Avid Life.

The attack on Dyn, Twitter, Amazon, and other major organizations in October 2016, is an example of which of the following?

DDoS attack

________ typically attack governments, organizations, and sometimes individuals for political purposes.

Hacktivists

________ refers to the ability to ensure that e-commerce participants do not deny their online actions.

Nonrepudiation


Kaugnay na mga set ng pag-aaral

Microcomputer Applications 1 Final

View Set

Ch 15 Assembly Language and Related Topics

View Set

Executive Branch Structure: President, cabinet, executive departments, the three agencies

View Set