ITEC 442 Ch 5

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following did the Internet Advertising Bureau urge advertisers to abandon?

Adobe Flash

Which of the following is an example of an integrity violation of e-commerce security?

An unauthorized person intercepts an online communication and changes its contents.

All of the following statements about PKI are true except:

PKI guarantees that the verifying computer of the merchant is secure

Which of the following was designed to cripple Iranian nuclear centrifuges?

Stuxnet

Beebone is an example of which of the following?

botnet

Which of the following is not a key factor for establishing e-commerce security?

data integrity

Which of the following is not an example of a potentially unwanted program (PUP)?

drive-by download

Which of the following is the leading cause of data breaches?

hackers

Which dimension(s) of security is spoofing a threat to?

integrity and authenticity

All of the following are features of WPA3 except:

it enables the creation of a VPN

Automatically redirecting a web link to a different address is an example of which of the following?

pharming

All of the following statements about public key cryptography are true except:

public key cryptography ensures authentication of the sender

Which of the following is not an example of malicious code?

sniffer

All the following statements about symmetric key cryptography are true except:

symmetric key cryptography is computationally slower

Which of the following is an example of an online privacy violation?

your online purchasing history being sold to other merchants without your consent

The Data Encryption Standard uses a(n) ________-bit key.

56

Which of the following statements about data breaches in 2017 is not true?

According to the Identity Theft Resource Center, employee error was the leading cause of data breaches.

Why is it difficult to accurately estimate the actual amount of cybercrime?

Companies don't want to lose the trust of their customers. It also is difficult to quantify the actual amount of dollars lost due to a cybercrime.

The attack on Dyn Inc. in 2016 is an example of which of the following?

DDoS Attack

All of the following are examples of cryptocurrencies except:

Zelle


Ensembles d'études connexes

WRS Skills 13-17 Quizlet Live Game

View Set