chapter 5 e-commerce

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

software vulnerability

FREAK is an example

paypal is an example of

online stored value payment system

trojan horse

zeuse is an example

which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other

NFC

all of the following are true about PKI except

PKI guarantees that the verifying computer of the merchant is secure

which of the following is an example of an integrity violation of e-commerce security

an unauthorized person intercepts an online communication and changes it contents

all of the following statements about apple pay are true except which

apple pay is available for both iPhone 5s and 6s

pharming

automatically redirecting a web link to a different address is an example

which of the following dimensions of e-commerce security is not provided for by encryption

availability

a fingerprint scan is an example of

biometrics

which of the following is not an example of an access control

digital signatures

proxy servers are also known as

dual home systems

digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties

false

visiting attacks exploit SMS messages

false

a____ is hardware or software that acts as a filter to prevent unwanted packets from entering a network

firewall

which of the following is the leading cause of data breaches

hackers

the overall rate of online credit card fraud is _____ of all online card transactions

less than 1%

drive-by download

malware that comes with a downloaded file that a user requests

what is the first step in developing an e-commerce security plan

perform a risk assessment

botnet

rustock is an example

all of the following statements about symmetric key cryptography are true except

symmetric key cryptography is computationally slower

next generation firewalls provide all of the following except

the ability to automatically update applications with security patches

availability

the ability to ensure that an e-commerce site continues to function as intended

nonrepudiation

the ability to ensure that e-commerce participants do not deny their online actions

confidentiality

the ability to ensure that messages and data are only availably to those authorized to view them

authenticity

the ability to identify the person or entity with whom you are dealing on the internet

PCI-DSS is standard established by which of the following

the credit card industry

SLS/TLS cannot provide irrefutability

true

apple pay uses near field communication (NFC) chips

true

exploit knits are often rented or sold as commercial product

true

paypal is the most popular alternative payment method in the US

true

shellshock is an example of a software vulnerability

true

the easiest and least expensive way to prevent threats to system integrity is to install anti-virus software

true

there is a finite number of bitcoins that can be created

true

stuxnet

was designed to cripple iranian nuclear centrifuges


Set pelajaran terkait

Chapter 46: Assessment and Management of patients with Diabetes

View Set

Lecture 6 Fama-French Three factor Model

View Set

Concepts of DC Final Exam Review

View Set

Quiz Chapter 14 - Brain Cranial Nerves

View Set