eCommerce Exam 1 Chapter 5 Pt.2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The Data Encryption Standard uses a(n) ________-bit key.

56

All of the following are methods of securing channels of communication except:All of the following are methods of securing channels of communication except:

FTP.

Which of the following is not a major trend in e-commerce payments in 2018-2019?

Mobile retail payment volume decreases.

Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?

NFC

All of the following statements about PKI are true except:

PKI guarantees that the verifying computer of the merchant is secure.

What is the first step in developing an e-commerce security plan?

Perform a risk assessment.

Which of the following is the most common protocol for securing a digital channel of communication?

SSL/TLS

Which of the following statements is not true? cybersecurity

The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates.

To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:

an authorization management system.

Which of the following dimensions of e-commerce security is not provided for by encryption?

availability

Face ID is an example of which of the following?

biometrics

An intrusion detection system can perform all of the following functions except:

blocking suspicious activity.

All of the following are limitations of the existing online credit card payment system except:

cost to consumers.

Which of the following is not an example of an access control?

digital signatures

Proxy servers are also known as:

dual home systems.

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

firewall

All of the following are features of WPA3 except:

it enables the creation of a VPN.it enables the creation of a VPN.

Today, online bill payment accounts for ________ of all bill payments, while paper checks account for ________.

more than 55%; less than 20%

) PayPal is an example of what type of payment system?

online stored value payment system

All of the following are used for authentication except:

packet filters.

All of the following statements about public key cryptography are true except:

public key cryptography ensures authentication of the sender.

Asymmetric key cryptography is also known as:

public key cryptography.

A digital certificate contains all of the following except the:

subject's private key.

All the following statements about symmetric key cryptography are true except:

symmetric key cryptography is computationally slower.

All of the following statements about Apple Pay are true except which of the following?All of the following statements about Apple Pay are true except which of the following?

Apple Pay is the most popular alternative payment method in the United States.

Which of the following statements is not true?

Apple's Touch ID stores a digital replica of a user's actual fingerprint in Apple's iCloud

Which of the following statements about Bitcoin is not true?

Bitcoins are completely secure.

Which of the following statements is not true? Vpn

A VPN uses a dedicated secure line.

Which of the following statements about blockchain is not true?

A blockchain system is inherently centralized.

Next generation firewalls provide all of the following except:

the ability to automatically update applications with security patches.

PCI-DSS is a standard established by which of the following?

the credit card industry


Ensembles d'études connexes

IVT, EVT, MVT, and Rolle's Theorem

View Set

Stress Management Chapter 2 Review

View Set