Ch. 5 - Security and Payment Systems (E-Commerce)

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

6) Which of the following is an example of an integrity violation of e-commerce security?

An unauthorized person intercepts an online communication and changes its contents.

5) __ refers to the ability to identify the person or entity with whom you are dealing on the Internet.

Authenticity

32) Which of the following left the WikiLeaks Web site effectively inoperable in August 2012?

DDoS attack

28) Bitcoins are an example of:

Digital cash

23) Malware that comes with a downloaded file that a user requests is called a:

Drive-by download

12) Software that is used to obtain private user information such as a user's keystrokes or copies of email is referred to as:

Spyware

22) P2P payment systems are a variation on what type of payment system?

Stored value payment system

1) All of the the following are factors in contributing to the increase in cybercrime except:

The internet's similarity to telephone networks.

26) Which of the following did Dropbox implement after a series of security snafus in 2011 and 2012?

Two-factor authentication

19) Which of the following dimensions of e-commerce security is not provided for by encryption?

availability

7) __ refers to the ability to ensure that an e-commerce site continues to function as intended.

availability

14) Which dimension(s) of security is spoofing a threat to?

integrity and authenticity

16) Symmetric Key Encryption is also known as:

secret key encryption

15) All of the following are examples of malicious code except:

sniffers

18) A digital certificate contains all of the following except the:

subject's private key.

13) What is the most frequent cause of stolen credit cards and card information today?

the hacking and looting of corporate servers storing credit card information

8) An example of a privacy violation of e-commerce security is:

your online purchasing history being sold to other merchants without your consent.

31) Rustock is an example of which of the following?

Botnet

10) Most of the world's spam is delivered via which of the following?

Botnets

30) The research firm Cybersource estimated that online credit card fraud in the United States amounted to about ___ in 2011.

$3.4 billion

29) Online payments are believed to cost ___ to process compared to ___ for paper bills.

20 to 30 cents, $3 to $7

2) The Computer Security Institute reported in its 2011 survey that approximately __ percent of responding organizations experienced a computer security incident within the previous 12 months.

45

25) Which of the following countries has been found to have engaged in cyber espionage against Google?

China

9) __ refers to the ability to ensure that messages and data are only available to those authorized to view them.

Confidentiality

24) All of the following are limitations of the existing online credit card payment system except:

Cost to consumers

20) All of the following are methods of securing channels of communication except:

FTP

21) A __ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

Firewall

3) According to the Computer Security Institute's 2011 Computer Crime and Security Survey, which of the following was the most commonly reported type of attack?

Malware infection

4) __ refers to the ability to ensure that e-commerce participants do not deny their online actions.

Nonrepudiation

27) In the United States, the primary form of online payment is:

PayPal

11) Botnets are typically used for all of the following except:

Phishing attacks

17) Which of the following statements about public key encryption is not true?

Public key encryption ensures authentication of the sender.


संबंधित स्टडी सेट्स

CISSP Chapter 6 - Cryptography & Symmetric Key Algorithms

View Set

Les éléments et le tableau périodique

View Set

PN NCLEX 6th Edition- Adult Renal/Urinary

View Set

Chemistry and Society Final Exam

View Set

Chapter 6 Informational Text and Text Complexity

View Set