Bus 210 - 01 Chapter 5
Firewall
A ___ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.
Subject's private key
A digital certificate contains all of the following EXCEPT the:
Sniffers
All of the following are examples of malicious code EXCEPT:
The Internet's similarity to telephone networks
All of the following are factors in contributing to the increase in cybercrime EXCEPT:
Cost to consumers
All of the following are limitations of the existing online credit card payment system EXCEPT:
Packet filters
All of the following are used for authentication EXCEPT:
Public key encryption ensures authentication of the sender
All of the following statements about public key encryption are true EXCEPT:
Spyware
Software that is used to obtain private user information such as a users keystrokes or copies of e-mail is referred to as:
Perform a risk assessment
What is the first step in developing an e-commerce security plan?
The hacking and looting of corporate servers storing credit card information
What is the most frequent cause of stolen credit cards and card information today?
Integrity and authenticity
Which dimension(s) of security is spoofing a threat to?
Availability
Which of the following dimensions of e-commerce security is NOT provided for by encryption?
The credit card companies
Which of the following is NOT a key point of vulnerability when dealing with e-commerce?
Availability
___ refers to the ability to ensure that an e-commerce site continues to function as intended.
Authenticity
___ refers to the ability to identify the person or entity with whom you are dealing on the Internet.
Nonrepudiation
____ refers to the ability to ensure that e-commerce participants do not deny their online actions.
credit cards
In the United States, the primary form of online payment is:
Drive-by download
Malware that comes with a downloaded file that a user requests is called a:
Botnets
Most of the world's spam is delivered via which of the following?
Confidentiality
The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and: