E-Commerce Chapter 5

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The Data Encryption Standard uses a(n) ________-bit key. 8 56 256 512

56

Which of the following statements about blockchain is not true? A blockchain system is a transaction processing system. A blockchain system is inherently centralized. A blockchain system is composed of a distributed network of computers. Cryptocurrencies are based on blockchain technology.

A blockchain system is inherently centralized.

Which of the following is an example of an integrity violation of e-commerce security? A website is not actually operated by the entity the customer believes it to be. A customer denies that he is the person who placed the order. A merchant uses customer information in a manner not intended by the customer. An unauthorized person intercepts an online communication and changes its contents.

An unauthorized person intercepts an online communication and changes its contents.

Which of the following is the leading cause of data breaches? hackers theft of a computer DDoS attacks accidental disclosures

Hackers

________ typically attack governments, organizations, and sometimes individuals for political purposes. Tiger teams Hacktivists Crackers Bounty hunters

Hacktivists

(T/F) A Trojan horse appears to be benign, but then does something other than expected.

True

(T/F) The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.

True

Which of the following dimensions of e-commerce security is not provided for by encryption? confidentiality message integrity nonrepudiation availability

availability

Accessing data without authorization on Dropbox is an example of a: cloud security issue. sniffing issue. social network security issue. mobile platform security issue.

cloud security issue.

All of the following are limitations of the existing online credit card payment system except: cost to merchant. social equity. cost to consumers. poor security.

cost to consumers.

Which dimensions of security is spoofing a threat to? availability and authenticity integrity and authenticity availability and integrity integrity and confidentiality

integrity and authenticity

PayPal is an example of which of the following types of payment system? digital checking system digital credit card system online stored value payment system accumulating balance system

online stored value payment system

Automatically redirecting a web link to a different address is an example of which of the following? pharming sniffing DDoS attack social engineering

pharming

Asymmetric key cryptography is also known as: PKI. secret key cryptography. public key cryptography. PGP.

public key cryptography.

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as: a backdoor. spyware. a browser parasite. adware.

spyware

A digital certificate contains all of the following except the: subject's private key. digital signature of the certification authority. digital certificate serial number. subject's public key.

subject's private key.

Next generation firewalls provide all of the following except: the ability to identify users regardless of the device or IP address. the ability to automatically update applications on a client computer with security patches. the ability to identify applications regardless of the port, protocol, or security evasion tools used. an application-centric approach to firewall control.

the ability to automatically update applications on a client computer with security patches.

________ is the ability to ensure that e-commerce participants do not deny their online actions. Authenticity Nonrepudiation Availability Integrity

Nonrepudiation

What is the first step in developing an e-commerce security plan? Perform a security audit. Create a security organization. Perform a risk assessment. Develop a security policy.

Perform a risk assessment.

Which of the following was designed to cripple Iranian nuclear centrifuges? Shamoon Snake Storm Stuxnet

Stuxnet


Ensembles d'études connexes

BIO - Mindtap Ch 20, Chapter 18.1, Chapter 19, Chapter 16, Chapter 15, Chapter 14, Chapter 13, Chapter 12, Chapter 11, Chapter 10, Chapter 9, Chapter 8, Chapter 7, Chapter 5, Chapter 4, Chapter 3, Chapter 2, Chapter 1, Chapter 6

View Set

Exxm 2 Chapter 18 Fundamentals TxstBank

View Set

Alterations in Bowel Elimination

View Set

02.28.01 ( Relative Pronouns) Translate German to English

View Set

MKT 701 LSUS Exam 1 Practice Questions

View Set

Physics- Chapter 1-4 Math Questions

View Set