eCommerce Exam 1 Chapter 5 Pt. 1
Which of the following is an example of an integrity violation of e-commerce security?
An unauthorized person intercepts an online communication and changes its contents.
________ is the ability to identify the person or entity with whom you are dealing on the Internet.
Authenticity
Which of the following is not an example of a potentially unwanted program (PUP)?
drive-by download
Which dimension(s) of security is spoofing a threat to?
integrity and authenticity
Confidentiality is sometimes confused with
privacy
Conficker is an example of a
worm.
Which of the following is an example of an online privacy violation?
your online purchasing history being sold to other merchants without your consent
All of the following are examples of cryptocurrencies except:
Zelle.
Beebone is an example of which of the following?
botnet
According to Ponemon Institute's 2017 survey, which of the following was not among the causes of the most costly cybercrimes?
botnets
Accessing data without authorization on Dropbox is an example of a:
cloud security issue.
Which of the following is not a key factor for establishing e-commerce security?
data integrity
Malware that comes with a downloaded file that a user requests is called a:
drive-by download.
Which of the following is the leading cause of data breaches?Which of the following is the leading cause of data breaches?
hackers
The overall rate of online credit card fraud is ________ of all online card transactions
less than 1%
Automatically redirecting a web link to a different address is an example of which of the following?
pharming
________ is the ability to ensure that an e-commerce site continues to function as intended.
Availability
Which of the following is not an example of malicious code?
sniffer
) Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:
spyware.
What is the most frequent cause of stolen credit cards and card information today?
the hacking and looting of corporate servers storing credit card information
________ is the ability to ensure that messages and data are only available to those authorized to view them.
Confidentiality
The attack on Dyn Inc. in 2016 is an example of which of the following?
DDoS attack
________ is the ability to ensure that e-commerce participants do not deny their online actions.
Nonrepudiation
Which of the following was designed to cripple Iranian nuclear centrifuges?
Stuxnet
According to the Identity Theft Resource Center, the number of data breaches in 2017 increased by ________ compared to 2016.
55%
Which of the following statements about data breaches in 2017 is not true?
According to the Identity Theft Resource Center, employee error was the leading cause of data breaches.According to the Identity Theft Resource Center, employee error was the leading cause of data breaches.
Which of the following did the Internet Advertising Bureau urge advertisers to abandon?
Adobe Flash
________ typically attack governments, organizations, and sometimes individuals for political purposes.
Hacktivists
Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.
TRUE
According to Symantec, almost half of the e-mail addresses involved in business e-mail compromise (BEC) phishing that it analyzed had an IP address originating in:
Nigeria.