CSIS 1010 Chapter 5

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

All of the following are examples of social/mobile peer-to-peer payment systems except:

Bill Me Later.

An intrusion detection system can perform all of the following functions except:

blocking suspicious activity.

Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties.

False

Conficker is an example of a:

worm

Which of the following dimensions of e-commerce security is not provided for by encryption?

availability

Which of the following is not a key factor for establishing e-commerce security?

data integrity

Phishing attacks rely on browser parasites.

False

All of the following statements about PKI are true except:

PKI guarantees that the verifying computer of the merchant is secure.

Which of the following is the most common protocol for securing a digital channel of communication?

SSL/TLS

According to Symantec, the number of data breaches in 2016 increased by ________ compared to 2015.

20%

Which of the following was designed to cripple Iranian nuclear centrifuges?

Stuxnet

Which of the following statements is not true?

The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates.

To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:

an authorization management system.

Face ID is an example of which of the following?

biometrics

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

firewall

The overall rate of online credit card fraud is ________ of all online card transactions.

less than 1%

Today, online bill payment accounts for ________ of all bill payments, while paper checks account for ________.

more than 55%; less than 20%

Which of the following statements is not true?

A VPN uses a dedicated secure line.

Which of the following statements about data breaches in 2016 is not true?

According to Symantec, the total number of data breaches in 2016 increased significantly from the number in 2015.

________ is the ability to ensure that an e-commerce site continues to function as intended.

Availability

The Data Encryption Standard uses a(n) ________-bit key.

56

A Trojan horse appears to be benign, but then does something other than expected.

True

A drive-by download is malware that comes with a downloaded file that a user intentionally or unintentionally requests.

True

Which of the following has the Internet Advertising Bureau urged advertisers to abandon?

Adobe Flash

________ is the ability to ensure that messages and data are only available to those authorized to view them.

Confidentiality

What is the most frequent cause of stolen credit cards and card information today?

the hacking and looting of corporate servers storing credit card information

Linden Dollars, created for use in Second Life, are an example of:

virtual currency.

Exploit kits can be purchased by users to protect their computers from malware.

False

All of the following statements about Apple Pay are true except which of the following?

Apple Pay is subject to regulations issued by the Bureau of Consumer Financial Protection applicable to GPR transactions.

The attack on Dyn Inc., in October 2016 is an example of which of the following?

DDoS attack

________ typically attack governments, organizations, and sometimes individuals for political purposes.

Hacktivists

Apple Pay uses near field communication (NFC) chips.

True

PayPal is the most popular alternative payment method in the United States.

True

SSL/TLS cannot provide irrefutability.

True

Spoofing is the attempt to hide a hacker's true identity by using someone else's e-mail or IP address.

True

The Internet Advertising Bureau has urged advertisers to abandon Adobe Flash in favor of HTML5.

True

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.

True

There is a finite number of Bitcoins that can be created.

True

According to Ponemon Institute's 2017 survey, which of the following was not among the causes of the most costly cybercrimes?

botnets

Accessing data without authorization on Dropbox is an example of a:

cloud security issue.

All of the following are limitations of the existing online credit card payment system except:

cost to consumers.

Bitcoins are an example of:

digital cash.

Which of the following is not an example of a PUP?

drive-by download

Malware that comes with a downloaded file that a user requests is called a:

drive-by download.

Which of the following is the leading cause of data breaches?

hackers

Which dimension(s) of security is spoofing a threat to?

integrity and authenticity

Confidentiality is sometimes confused with:

privacy

Asymmetric key cryptography is also known as:

public key cryptography.

Which of the following is not an example of malicious code?

sniffer

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

spyware

A digital certificate contains all of the following except the:

subject's private key.

All the following statements about symmetric key cryptography are true except:

symmetric key cryptography is computationally slower.

Next generation firewalls provide all of the following except:

the ability to automatically update applications with security patches.

PCI-DSS is a standard established by which of the following?

the credit card industry

Which of the following is an example of an online privacy violation?

your online purchasing history being sold to other merchants without your consent

Which of the following is an example of an integrity violation of e-commerce security?

An unauthorized person intercepts an online communication and changes its contents.

Which of the following statements is not true?

Apple's Touch ID stores a digital replica of a user's actual fingerprint in Apple's iCloud.

________ is the ability to identify the person or entity with whom you are dealing on the Internet.

Authenticity

Which of the following is not a major trend in e-commerce payments in 2017-2018?

Mobile retail payment volume decreases.

Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?

NFC

According to Symantec, almost half of the e-mail addresses involved in business e-mail compromise (BEC) phishing that it analyzed had an IP address originating in:

Nigeria

________ is the ability to ensure that e-commerce participants do not deny their online actions.

Nonrepudiation

Changeup is an example of a software vulnerability.

True

Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.

True

WannaCry is an example of ransomware.

True

Which of the following is the current standard used to protect Wi-Fi networks?

WPA2

Which of the following is not an example of an access control?

digital signatures

Proxy servers are also known as:

dual home systems.

Angler is an example of which of the following?

exploit kit

PayPal is an example of what type of payment system?

online stored value payment system

All of the following are used for authentication except:

packet filters.

Automatically redirecting a web link to a different address is an example of which of the following?

pharming

All of the following statements about public key cryptography are true except:

public key cryptography ensures authentication of the sender.


संबंधित स्टडी सेट्स

Chapter 3 Globalization and sport

View Set

Unit 8: Regulation of Securities and their Issues

View Set

Lab 1 - Lab Safety, Ubiquity, Aseptic Technique

View Set

Understanding Firewall and IDS Evasion Techniques

View Set

Bio155 Mastering Nutrition Chapter 6

View Set

Psychology Chapter 13 Practice Quiz

View Set