eCommerce Exam 1 Chapter 5 Pt. 3 T/F
Bluetooth is the primary enabling technology for mobile wallets.
FALSE
Phishing attacks rely on browser parasites.
FALSE
A Trojan horse appears to be benign, but then does something other than expected.
TRUE
A drive-by download is malware that comes with a downloaded file that a user intentionally or unintentionally requests.
TRUE
FREAK is an example of a software vulnerability.
TRUE
SSL/TLS cannot provide irrefutability.
TRUE
Spoofing is the attempt to hide a hacker's true identity by using someone else's e-mail or IP address.
TRUE
The creation of Bitcoins consumes a significant amount of energy.
TRUE
The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.
TRUE
There is a finite number of Bitcoins that can be created.
TRUE
WannaCry is an example of ransomware.
TRUE
Zelle is an example of a P2P mobile payment app.
TRUE