MIS 276 Exam 2 Quiz 7

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

________ refers to the ability to ensure that e-commerce participants do not deny their online actions. A. Integrity B. Nonrepudiation C. Authenticity D. Availability

B. Nonrepudiation

All of the following are limitations of the existing online credit card payment system except: A. cost to merchant B. consumer difficulty in repudiating charges C. poor security D. social equity

B. consumer difficulty in repudiating charges

Which of the following is not an example of a PUP? A. adware B. drive-by download C. spyware D. browser parasite

B. drive-by download

All of the following are methods of protecting internet communications except: A. digital certificates B. file transfer protocol C. digital envelopes D. secure socket layer protocol

B. file transfer protocol

What is the first step in developing an e-commerce security plan? A. Develop a security policy. B. Create a security organization. C. Perform a security audit. D. Perform a risk assessment.

D. Perform a risk assessment.

Which of the following is not an example of a network access control? A. intrusion prevention system (IPS) B. proxy servers C. firewalls D. digital signatures

D. digital signatures

Proxy servers are also known as: A. dual home systems. B. application getaways. C. packet filters. D. firewalls.

A. dual home systems.

Which of the following is an example of an integrity violation of e-commerce security? A. A merchant uses customer information in a manner not intended by the customer. B. A customer denies that he or she is the person who placed the order. C. An unauthorized person intercepts an online communication and changes its contents. D. A Web site is not actually operated by the entity the customer believes it to be.

C. An unauthorized person intercepts an online communication and changes its contents.

All of the following statements about Apple Pay are true except which of the following? A. Apple Pay can use Touch ID biometric fingerprint scanning. B. Apple Pay relies on NFC chip technology. C. As of 2016, Apple Pay is about the fourth most popular mobile wallet at about 7% of all mobile wallet users. D. Apple Pay can be used for mobile payments at the point of sale at a physical store.

C. As of 2016, Apple Pay is about the fourth most popular mobile wallet at about 7% of all mobile wallet users.

Which of the following is the second leading cause of data breaches? A. hackers B. theft of a computer C. employee error / negligence D. DDoS attacks

C. employee error / negligence


संबंधित स्टडी सेट्स

PrepU Chp 28: Assessment of Hematologic Function and Treatment Modalities

View Set

APUSH Period 3 Chapter 7 "We the People" (How did the definition of citizenship in the new republic exclude Native Americans and African Americans?)

View Set

Quiz Bowl Questions: U.S. Presidents (44 President)

View Set

Concepts of Database Management 7th Edition

View Set

Financial Markets and Institutions Final

View Set

Neuroscience: Exploring the Brain: 2

View Set

accounting chapter 8-inventories and costs of goods sold

View Set