Bus 210 - 01 Chapter 5
Firewall
A ___ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.
Subject's private key
A digital certificate contains all of the following EXCEPT the:
Packet filters
All of the following are used for authentication EXCEPT:
Public key encryption ensures authentication of the sender
All of the following statements about public key encryption are true EXCEPT:
Spyware
Software that is used to obtain private user information such as a users keystrokes or copies of e-mail is referred to as:
Integrity and authenticity
Which dimension(s) of security is spoofing a threat to?
Availability
Which of the following dimensions of e-commerce security is NOT provided for by encryption?
The credit card companies
Which of the following is NOT a key point of vulnerability when dealing with e-commerce?
Availability
___ refers to the ability to ensure that an e-commerce site continues to function as intended.
Authenticity
___ refers to the ability to identify the person or entity with whom you are dealing on the Internet.
Nonrepudiation
____ refers to the ability to ensure that e-commerce participants do not deny their online actions.
credit cards
In the United States, the primary form of online payment is:
Drive-by download
Malware that comes with a downloaded file that a user requests is called a:
Botnets
Most of the world's spam is delivered via which of the following?
Confidentiality
The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and:
Sniffers
All of the following are examples of malicious code EXCEPT:
The Internet's similarity to telephone networks
All of the following are factors in contributing to the increase in cybercrime EXCEPT:
Cost to consumers
All of the following are limitations of the existing online credit card payment system EXCEPT:
Perform a risk assessment
What is the first step in developing an e-commerce security plan?
The hacking and looting of corporate servers storing credit card information
What is the most frequent cause of stolen credit cards and card information today?