Chapter 5 Information Systems

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The research firm Cybersource estimated that online credit card fraud in the United States amounted to about BLANK in 2012:

3.5 billion

Online bill payments now accounts for BLANK of all bill payments:

50%

The Data Encryption Standard uses a BLANK bit key

56

Which of the following is an example of an integrity violation of e-commerce security?

An unauthorized person intercepts an online communication and changes its contents

Which of the following is an example of an integrity violation of e-commerce security?

An unauthorized person intercepts an online communication and changes its contents.

Online bill payments are believed to cost BLANK to process compared to BLANK for paper bills:

20 to 30 cents, 3 to 7

The research firm Cybersource estimated that online credit card fraud in the United States amounted to about BLANK in 2012.

3.5 billion

BLANK refers to the ability to identify the person or entity with whom you are dealing on the Internet:

Authenticity

Which of the following dimensions of e-commerce security is not provided for by encryption?

Availability

Most of the world's spam is delivered via which of the following?

Botnets

A BLANK is a hardware or software that acts as a filter to prevent unwanted packets from entering a network:

Firewall

A BLANK is hardware or software that acts as a filter to prevent unwanted packets from entering a network:

Firewall

Which dimensions of security is spoofing a threat to?

Integrity and authenticity

The overall rate of online credit card fraud is BLANK% of all online card transactions

Less than 1

Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other?

NFC

BLANK refers to the ability to identify the person or entity with whom you are dealing on the Internet.

Nonrepudiation

All of the following statements about PKI are true except:

PKI guarantees that the verifying computer of the merchant is secure

All of the following are used for authentication except:

Packet filters

What is the first step in developing an e-commerce security plan?

Perform a risk assessment

BLANK refers to the ability to ensure that messages and data are only available to those authorized to view them:

Privacy

All of the following statements about public key encryption are true except:

Public key encryption ensures authentication of the sender

Software that is used to obtain private user information such as user's keystrokes or copies of e-mail is referred to as:

Spyware

none of the following payment systems offers immediate monetary value except:

Store value/debit card

P2P payment systems are a variation on what type of payment system?

Stored value payment system

A digital certificate contains all of the following except the:

Subject's private key

An example of a privacy violation of e-commerce security is:

Your online purchasing history being sold to other merchants without your consent.

An intrusion detection system can perform all of the following functions except:

blocking suspicious activity

Rustock is an example of which of the following?

botnet

Most of the world's spam is delivered via which of the following?

botnets

In the United States, the primary form of online payment is:

credit cards

Botnets are typically used for all of the following except:

phishing attacks

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

spyware

All of the following statements about symmetric key encryption are true except:

symmetric key encryption is computationally slower

Which of the following did Dropbox implement after a series of security snafus in 2011 and 2012?

two-factor authenticiation

Linden Dollars, created for use in Second Life, are an example of:

virtual currency

Which of the following did Dropbox implement after a series of security snafus in 2011 and 2012?

Two-factor authentication

Which of the following is the current standard used to protect Wi-Fi networks?

WPA2

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

Checking network traffic to see if it matches certain patterns or preconfigured rules

Which of the following countries has been found to have engaged in cyberespionage against Google?

China

The six dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and:

Confidentiality

All of the following are limitations of the existing online credit card payment systems except:

Cost to consumers

Which of the following left the WikiLeaks Web site effectively inoperable in August 2012?

DDoS attack

Bitcoins are an example of:

Digital cash

All of the following are examples of an access control?

Digital signatures

Malware that comes with a downloaded file that a user requests is called a:

Drive-by download

Which of the following is not an example of a PUP?

Drive-by download

All of the following are factors in contributing to the increase in cybercrime except:

The Internet's similarity to telephone networks

Which of the following is not a key point of vulnerability when dealing with e-commerce?

The credit card companies

What is the most frequent cause of stolen credit cards and card information today?

The hacking and looting of corporate servers storing credit card information

Which of the most frequent cause of stolen credit cards and card information today?

The hacking and looting of corporate servers storing credit card information


Set pelajaran terkait

Inheritance and Populations Test

View Set

Topic 5 : Biochemical activity of the thyroid and parathyroid hormones

View Set

Fundamentals ATI - missed practice questions

View Set

Constitution AP Classroom Questions

View Set

Chapter 12: Postpartum Physiological Assessments and Nursing Care

View Set

Final Study Guide- Select All That Apply

View Set