ITEC 442 Ch 5
Which of the following did the Internet Advertising Bureau urge advertisers to abandon?
Adobe Flash
Which of the following is an example of an integrity violation of e-commerce security?
An unauthorized person intercepts an online communication and changes its contents.
All of the following statements about PKI are true except:
PKI guarantees that the verifying computer of the merchant is secure
Which of the following was designed to cripple Iranian nuclear centrifuges?
Stuxnet
Beebone is an example of which of the following?
botnet
Which of the following is not a key factor for establishing e-commerce security?
data integrity
Which of the following is not an example of a potentially unwanted program (PUP)?
drive-by download
Which of the following is the leading cause of data breaches?
hackers
Which dimension(s) of security is spoofing a threat to?
integrity and authenticity
All of the following are features of WPA3 except:
it enables the creation of a VPN
Automatically redirecting a web link to a different address is an example of which of the following?
pharming
All of the following statements about public key cryptography are true except:
public key cryptography ensures authentication of the sender
Which of the following is not an example of malicious code?
sniffer
All the following statements about symmetric key cryptography are true except:
symmetric key cryptography is computationally slower
Which of the following is an example of an online privacy violation?
your online purchasing history being sold to other merchants without your consent
The Data Encryption Standard uses a(n) ________-bit key.
56
Which of the following statements about data breaches in 2017 is not true?
According to the Identity Theft Resource Center, employee error was the leading cause of data breaches.
Why is it difficult to accurately estimate the actual amount of cybercrime?
Companies don't want to lose the trust of their customers. It also is difficult to quantify the actual amount of dollars lost due to a cybercrime.
The attack on Dyn Inc. in 2016 is an example of which of the following?
DDoS Attack
All of the following are examples of cryptocurrencies except:
Zelle