CIS 450 Ch 5
There is a finite number of Bitcoins that can be created.
True
All of the following statements about PKI are true except:
PKI guarantees that the verifying computer of the merchant is secure.
What is the first step in developing an e-commerce security plan?
Perform a risk assessment
CryptoLocker is an example of ransomware.
True
Exploit kits are often rented or sold as a commercial product.
True
Factoring Attack on RSA-Export Keys (FREAK) is an example of a software vulnerability.
True
Accessing data without authorization on Dropbox is an example of which of the following?
cloud security issue
Proxy servers are also known as:
dual home systems
A ________ is a hardware or software component that acts as a filter to prevent unwanted packets from entering a network.
firewall
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:
spyware
All the following statements about symmetric key cryptography are true except:
symmetric key cryptography is computationally slower.
PCI-DSS is a standard established by which of the following?
the credit card industry
What is the most frequent cause of stolen credit cards and card information today?
the hacking and looting of corporate servers storing credit card information
Conficker is an example of a:
worm
An intrusion detection system can perform all of the following functions except:
blocking suspicious activity
Confidentiality is sometimes confused with:
Privacy
Which of the following was designed to cripple Iranian nuclear centrifuges?
Stuxnet
PayPal is the most popular alternative payment method in the United States.
True
SLS/TLS cannot provide irrefutability.
True
The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.
True
Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.
True
Angler is an example of:
an exploit kit
Bitcoins are an example of
digital cash
Which of the following is not an example of a PUP?
drive-by download
The overall rate of online credit card fraud is ________ of all online card transactions.
less than 1%
In 2015, online bill payment accounted for ________ of all bill payments, while paper checks accounted for ________.
more than 50%, less than 20%
PayPal is an example of a(n):
online stored value payment system.
All of the following statements about public key cryptography are true except:
public key cryptography ensures authentication of the sender.
Symmetric key cryptography is also known as:
secret key cyrptography
Linden Dollars, created for use in Second Life, are an example of:
virtual currency
Which of the following is an example of an online privacy violation?
your online purchasing history being sold to other merchants without your consent
Which of the following statements is not true?
A VPN uses a dedicated secure line
________ is not an example of malicious code.
A sniffer
All of the following statements about Apple Pay are true except which of the following?
Apple Pay is subject to recent regulations issued by the Bureau of Consumer Financial Protection applicable to GPR transactions.
________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.
Authenticity
All of the following are prominent hacktivist groups except:
Avid Life
Apple Pay uses near field communication (NFC) chips.
True
Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties.
False
A worm does not need to be activated by a user for it to replicate itself.
True
Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?
NFC
A Trojan horse appears to be benign, but then does something other than expected.
True
________ refers to the ability to ensure that an e-commerce site continues to function as intended.
Availability
All of the following are examples of social/mobile peer-to-peer payment systems except:
Bill Me Later
The attack on Dyn, Twitter, Amazon, and other major organizations in October 2016, is an example of which of the following?
DDos attack
Phishing attacks rely on browser parasites.
False
Which of the following statements is not true?
The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates.