Ecommerce Ch 5
________ is not an example of malicious code.
A sniffer
Bitcoins are an example of
digital cash
A ________ is a hardware or software component that acts as a filter to prevent unwanted packets from entering a network.
firewall
________ refers to the ability to ensure that messages and data are only available to those authorized to view them.
Confidentiality
________ is the current standard used to protect Wi-Fi networks.
WPA2
In 2016, Yahoo revealed that it had experienced which of the following?
a high-profile data breach
Angler is an example of:
an exploit kit.
According to Ponemon Institute's 2015 survey, which of the following was not among the causes of the costliest cybercrimes?
botnets
Accessing data without authorization on Dropbox is an example of which of the following?
cloud security issue
Malware that comes with a downloaded file requested by a user is called a:
drive-by download
Proxy servers are also known as:
dual home systems.
Which dimension(s) of security is spoofing a threat to?
integrity and authenticity
The overall rate of online credit card fraud is ________ of all online card transactions.
less than 1%
Symmetric key cryptography is also known as:
secret key cryptography.
Shellshock is an example of which of the following?
software vulnerability
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:
spyware
Next generation firewalls provide all of the following except:
the ability to automatically update applications with security patches.
What is the most frequent cause of stolen credit cards and card information today?
the hacking and looting of corporate servers storing credit card information
Which of the following is an example of an online privacy violation?
your online purchasing history being sold to other merchants without your consent
The Data Encryption Standard uses a(n) ________-bit key.
56
Which of the following has the Internet Advertising Bureau urged advertisers to abandon?
Adobe Flash
All of the following experienced high-profile data breaches in 2015 except
Amazon
Which of the following was designed to cripple Iranian nuclear centrifuges?
Stuxnet
Which of the following dimensions of e-commerce security does not involve encryption?
availability
Which of the following is the leading cause of data breaches?
hackers
Automatically redirecting a web link to a different address is an example of:
pharming.
Confidentiality is sometimes confused with:
privacy
All of the following statements about public key cryptography are true except:
public key cryptography ensures authentication of the sender.
All the following statements about symmetric key cryptography are true except:
symmetric key cryptography is computationally slower.
Which of the following is not an example of a PUP?
drive-by download
Conficker is an example of a:
worm
Which of the following is an example of an integrity violation of e-commerce security?
An unauthorized person intercepts an online communication and changes its contents.
________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.
Authenticity
________ refers to the ability to ensure that an e-commerce site continues to function as intended.
Availability
All of the following are prominent hacktivist groups except:
Avid Life.
The attack on Dyn, Twitter, Amazon, and other major organizations in October 2016, is an example of which of the following?
DDoS attack
________ typically attack governments, organizations, and sometimes individuals for political purposes.
Hacktivists
________ refers to the ability to ensure that e-commerce participants do not deny their online actions.
Nonrepudiation