itm 4278 ch 5

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The Data Encryption Standard uses a(n) ________-bit key.

56

All of the following statements about Apple Pay are true except which of the following?

Apple Pay is available for both iPhone 5s and iPhone 6s.

Smishing attacks exploit SMS messages.

True

Spoofing involves attempting to hide a true identity by using someone else's e-mail or IP address.

True

Which of the following dimensions of e-commerce security is not provided for by encryption?

availability

An intrusion detection system can perform all of the following functions except:

blocking suspicious activity.

All of the following are limitations of the existing online credit card payment system except:

cost to consumers.

Which of the following is not an example of an access control?

digital signatures

Which of the following is not an example of a PUP?

drive-by download

Which dimension(s) of security is spoofing a threat to?

integrity and authenticity

The overall rate of online credit card fraud is ________ % of all online card transactions.

less than 1

Online bill payment now accounts for ________ of all bill payments, while paper checks account for ________.

more than 50%, less than 25%

All of the following are used for authentication except:

packet filters.

All of the following statements about public key cryptography are true except:

public key cryptography ensures authentication of the sender.

A digital certificate contains all of the following except the:

subject's private key.

All the following statements about symmetric key cryptography are true except:

symmetric key cryptography is computationally slower.

Next generation firewalls provide all of the following except:

the ability to automatically update applications with security patches

To allow employees to connect securely over the Internet to their corporate network, you would use a(n) ________.

virtual private network

________ text is text that has been encrypted and thus cannot be read by anyone other than the sender and the receiver.

Cipher

________ refers to the ability to ensure that messages and data are only available to those authorized to view them.

Confidentiality

Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties.

False

SLS/TLS provides irrefutability.

False

Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other?

NFC

All of the following statements about PKI are true except:

PKI guarantees that the verifying computer of the merchant is secure.

Most of the world's malware is delivered via which of the following?

Trojan horses


Ensembles d'études connexes

Dividing & Multiplying Whole Numbers and Decimals

View Set

Achieve Assignment Measures of Dispersion

View Set

RN Passpoint- Practice Questions

View Set

open source software development methods

View Set

Anatomy & Physiology II, Ch 23 Digestion

View Set

Chapter11: Communicating in groups and teams

View Set