BCIS 4720 Chapter 5 Quiz

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following did the Internet Advertising Bureau urge advertisers to abandon?

Adobe Flash

Which of the following is an example of an integrity violation of e-commerce security?

An unauthorized person intercepts an online communication and changes its contents.

________ is the ability to identify the person or entity with whom you are dealing on the Internet.

Authenticity

________ is the ability to ensure that an e-commerce site continues to function as intended.

Availability

The attack against Dyn servers is an example of a(n):

DDoS attack

Which of the following technologies is aimed at reducing e-mail address spoofing and phishing?

DMARC

Exploit kits can be purchased by users to protect their computers from malware.

False

Phishing attacks rely on browser parasites.

False

Which of the following is the leading cause of data breaches?

hackers

Which dimensions of security is spoofing a threat to?

integrity and authenticity

Automatically redirecting a web link to a different address is an example of which of the following?

pharming

Confidentiality is sometimes confused with:

privacy

Which of the following is not an example of malicious code?

sniffer

Which of the following types of attacks enabled hackers to take control of the Twitter accounts of dozens of America's most prominent political, entertainment and technology leaders?

social engineering

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

spyware

What is the most frequent cause of stolen credit cards and card information today?

the hacking and looting of corporate servers storing credit card information

Conficker is an example of a:

worm

Which of the following is an example of an online privacy violation?

your online purchasing history being sold to other merchants without your consent

A Trojan horse appears to be benign, but then does something other than expected.

True

A drive-by download is malware that comes with a downloaded file that a user intentionally or unintentionally requests.

True

FREAK is an example of a software vulnerability.

True

Spoofing is the attempt to hide a hacker's true identity by using someone else's e-mail or IP address.

True

Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.

True

WannaCry is an example of ransomware.

True

Beebone is an example of which of the following?

botnet

According to Ponemon Institute's 2019 survey, which of the following was not among the causes of the costliest cybercrimes?

botnets

Accessing data without authorization on Dropbox is an example of a:

cloud security issue

Which of the following is a brute force attack which hackers launch via botnets and automated tools using known user name and password combinations?

credential stuffing

Which of the following is not a key factor for establishing e-commerce security?

data integrity

Malware that comes with a downloaded file requested by a user is called a:

drive-by download

Which of the following is not an example of a potentially unwanted program (PUP)?

drive-by download

________ typically attack governments, organizations, and sometimes individuals for political purposes.

Hacktivists

________ is the ability to ensure that e-commerce participants do not deny their online actions.

Nonrepudiation

Which of the following was designed to cripple Iranian nuclear centrifuges?

Stuxnet


Ensembles d'études connexes

Image Production - Automatic exposure control

View Set

Lab 2-1: Understand Common Ports and Protocols

View Set

English 12B Unit 3: Goodbye to Romance (The Enlightenment/Neoclassic, 1660-1798, & Romantic Period, 1798-1837)

View Set

Midterm 1 Review - Michael Seeligson

View Set

Module 7 - Business Information Systems

View Set

Building Construction: Chapter 3 & 4

View Set