BCIS 4720 Chapter 5 Quiz
Which of the following did the Internet Advertising Bureau urge advertisers to abandon?
Adobe Flash
Which of the following is an example of an integrity violation of e-commerce security?
An unauthorized person intercepts an online communication and changes its contents.
________ is the ability to identify the person or entity with whom you are dealing on the Internet.
Authenticity
________ is the ability to ensure that an e-commerce site continues to function as intended.
Availability
The attack against Dyn servers is an example of a(n):
DDoS attack
Which of the following technologies is aimed at reducing e-mail address spoofing and phishing?
DMARC
Exploit kits can be purchased by users to protect their computers from malware.
False
Phishing attacks rely on browser parasites.
False
Which of the following is the leading cause of data breaches?
hackers
Which dimensions of security is spoofing a threat to?
integrity and authenticity
Automatically redirecting a web link to a different address is an example of which of the following?
pharming
Confidentiality is sometimes confused with:
privacy
Which of the following is not an example of malicious code?
sniffer
Which of the following types of attacks enabled hackers to take control of the Twitter accounts of dozens of America's most prominent political, entertainment and technology leaders?
social engineering
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:
spyware
What is the most frequent cause of stolen credit cards and card information today?
the hacking and looting of corporate servers storing credit card information
Conficker is an example of a:
worm
Which of the following is an example of an online privacy violation?
your online purchasing history being sold to other merchants without your consent
A Trojan horse appears to be benign, but then does something other than expected.
True
A drive-by download is malware that comes with a downloaded file that a user intentionally or unintentionally requests.
True
FREAK is an example of a software vulnerability.
True
Spoofing is the attempt to hide a hacker's true identity by using someone else's e-mail or IP address.
True
Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.
True
WannaCry is an example of ransomware.
True
Beebone is an example of which of the following?
botnet
According to Ponemon Institute's 2019 survey, which of the following was not among the causes of the costliest cybercrimes?
botnets
Accessing data without authorization on Dropbox is an example of a:
cloud security issue
Which of the following is a brute force attack which hackers launch via botnets and automated tools using known user name and password combinations?
credential stuffing
Which of the following is not a key factor for establishing e-commerce security?
data integrity
Malware that comes with a downloaded file requested by a user is called a:
drive-by download
Which of the following is not an example of a potentially unwanted program (PUP)?
drive-by download
________ typically attack governments, organizations, and sometimes individuals for political purposes.
Hacktivists
________ is the ability to ensure that e-commerce participants do not deny their online actions.
Nonrepudiation
Which of the following was designed to cripple Iranian nuclear centrifuges?
Stuxnet