Quiz 4 econ 139a

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Spear phishing is

A more sophisticated version of phishing using a level of personal details.

Which of the following is an example of an integrity violation of e-commerce security?

An unauthorized person intercepts an online communication and changes its contents

________ typically attack governments, corporations, and sometimes specific high profile individuals for political purposes.

Hacktivists

According to Symantec, almost half of the e-mail addresses involved in business e-mail compromise (BEC) phishing that it analyzed had an IP address originating in:

Nigeria

________ is the ability to identify the person or entity with whom you are dealing on the Internet.

authenticity

Which of the following dimensions of E-Commerce security is NOT delivered via encryption?

availability

Accessing data without authorization on Dropbox is an example of a:

cloud security issue

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a corporate network.

firewall

The overall rate of online credit card fraud is ________ of all online card transactions.

less than 1%

________ is the ability to ensure that e-commerce participants do not deny their online actions.

nonrepudiation

Asymmetric key cryptography is also known as:

public key cryptography

Which of the following is NOT one of the core values Jeff Bezos spoke about in his interview?

punctuality

In terms of E-Commerce security, what is meant by the acronym SSL?

secure socket layer

Which of the following is NOT an example of malicious code?

sniffer

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

spyware

What is the most frequent cause of stolen credit cards and card information today?

the hacking and looting of corporate servers storing credit card information

TRUE or FALSE. The United States, being the home of Silicon Valley, leads the world in the consumer adoption of mobile payment technologies

FALSE

The three key points of security vulnerability in E-Commerce as outlined in our textbook and in lectures are:

Client; Server; Communications Pipeline

A DDoS is an acronym for what kind of cyber attack:

Distributed Denial of Service Attack

Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.

TRUE


Ensembles d'études connexes

AP US History Chapters 12, 13, and 14

View Set

Math Concept and Vocabulary Check

View Set

LUOA Survey of the Bible: Module 4: Major Prophets & the Intertestamental Period

View Set

欢乐伙伴 5B 第12课(听写)

View Set