IS Chapter 5 - Final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following is an example of an integrity violation of e-commerce security?

An unauthorized person intercepts an online communication and changes its contents

BLANK refers to the ability to identify the person or entity with whom you are dealing on the Internet:

Authenticity

Most of the world's spam is delivered via which of the following?

Botnets

none of the following payment systems offers immediate monetary value except:

Store value/debit card

Which of the following did Dropbox implement after a series of security snafus in 2011 and 2012?

Two-factor authentication

An example of a privacy violation of e-commerce security is:

Your online purchasing history being sold to other merchants without your consent.

An intrusion detection system can perform all of the following functions except:

blocking suspicious activity

Rustock is an example of which of the following?

botnet

Most of the world's spam is delivered via which of the following?

botnets

In the United States, the primary form of online payment is:

credit cards

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

spyware

Which of the following is an example of an integrity violation of e-commerce security?

An unauthorized person intercepts an online communication and changes its contents.

Which of the following dimensions of e-commerce security is not provided for by encryption?

Availability

Software that is used to obtain private user information such as user's keystrokes or copies of e-mail is referred to as:

Spyware

Botnets are typically used for all of the following except:

phishing attacks

All of the following statements about symmetric key encryption are true except:

symmetric key encryption is computationally slower

Online bill payments are believed to cost BLANK to process compared to BLANK for paper bills:

20 to 30 cents, 3 to 7

The research firm Cybersource estimated that online credit card fraud in the United States amounted to about BLANK in 2012.

3.5 billion

The research firm Cybersource estimated that online credit card fraud in the United States amounted to about BLANK in 2012:

3.5 billion

Online bill payments now accounts for BLANK of all bill payments:

50%

The Data Encryption Standard uses a BLANK bit key

56

Which of the following countries has been found to have engaged in cyberespionage against Google?

China

The six dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and:

Confidentiality

A BLANK is a hardware or software that acts as a filter to prevent unwanted packets from entering a network:

Firewall

A BLANK is hardware or software that acts as a filter to prevent unwanted packets from entering a network:

Firewall

BLANK refers to the ability to ensure that messages and data are only available to those authorized to view them:

Privacy

Which dimensions of security is spoofing a threat to?

Integrity and authenticity

The overall rate of online credit card fraud is BLANK% of all online card transactions

Less than 1

All of the following are used for authentication except:

Packet filters

Which of the following is not a key point of vulnerability when dealing with e-commerce?

The credit card companies

Which of the following did Dropbox implement after a series of security snafus in 2011 and 2012?

two-factor authenticiation

All of the following statements about public key encryption are true except:

Public key encryption ensures authentication of the sender

BLANK refers to the ability to identify the person or entity with whom you are dealing on the Internet.

Nonrepudiation

All of the following statements about PKI are true except:

PKI guarantees that the verifying computer of the merchant is secure

What is the first step in developing an e-commerce security plan?

Perform a risk assessment

What is the most frequent cause of stolen credit cards and card information today?

The hacking and looting of corporate servers storing credit card information

Which of the most frequent cause of stolen credit cards and card information today?

The hacking and looting of corporate servers storing credit card information


Set pelajaran terkait

Chapter 11: Solutions- Properties and Behavior

View Set

HESI RN MENTAL HEALTH HESI REVIEW - MULTIPLE CHOICE

View Set

N120 Review for Chapt 17, 18, 19, VTE, Septic Shock

View Set

Text A: What is friendship all about?

View Set