IS Chapter 5 - Final
Which of the following is an example of an integrity violation of e-commerce security?
An unauthorized person intercepts an online communication and changes its contents
BLANK refers to the ability to identify the person or entity with whom you are dealing on the Internet:
Authenticity
Most of the world's spam is delivered via which of the following?
Botnets
none of the following payment systems offers immediate monetary value except:
Store value/debit card
Which of the following did Dropbox implement after a series of security snafus in 2011 and 2012?
Two-factor authentication
An example of a privacy violation of e-commerce security is:
Your online purchasing history being sold to other merchants without your consent.
An intrusion detection system can perform all of the following functions except:
blocking suspicious activity
Rustock is an example of which of the following?
botnet
Most of the world's spam is delivered via which of the following?
botnets
In the United States, the primary form of online payment is:
credit cards
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:
spyware
Which of the following is an example of an integrity violation of e-commerce security?
An unauthorized person intercepts an online communication and changes its contents.
Which of the following dimensions of e-commerce security is not provided for by encryption?
Availability
Software that is used to obtain private user information such as user's keystrokes or copies of e-mail is referred to as:
Spyware
Botnets are typically used for all of the following except:
phishing attacks
All of the following statements about symmetric key encryption are true except:
symmetric key encryption is computationally slower
Online bill payments are believed to cost BLANK to process compared to BLANK for paper bills:
20 to 30 cents, 3 to 7
The research firm Cybersource estimated that online credit card fraud in the United States amounted to about BLANK in 2012.
3.5 billion
The research firm Cybersource estimated that online credit card fraud in the United States amounted to about BLANK in 2012:
3.5 billion
Online bill payments now accounts for BLANK of all bill payments:
50%
The Data Encryption Standard uses a BLANK bit key
56
Which of the following countries has been found to have engaged in cyberespionage against Google?
China
The six dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and:
Confidentiality
A BLANK is a hardware or software that acts as a filter to prevent unwanted packets from entering a network:
Firewall
A BLANK is hardware or software that acts as a filter to prevent unwanted packets from entering a network:
Firewall
BLANK refers to the ability to ensure that messages and data are only available to those authorized to view them:
Privacy
Which dimensions of security is spoofing a threat to?
Integrity and authenticity
The overall rate of online credit card fraud is BLANK% of all online card transactions
Less than 1
All of the following are used for authentication except:
Packet filters
Which of the following is not a key point of vulnerability when dealing with e-commerce?
The credit card companies
Which of the following did Dropbox implement after a series of security snafus in 2011 and 2012?
two-factor authenticiation
All of the following statements about public key encryption are true except:
Public key encryption ensures authentication of the sender
BLANK refers to the ability to identify the person or entity with whom you are dealing on the Internet.
Nonrepudiation
All of the following statements about PKI are true except:
PKI guarantees that the verifying computer of the merchant is secure
What is the first step in developing an e-commerce security plan?
Perform a risk assessment
What is the most frequent cause of stolen credit cards and card information today?
The hacking and looting of corporate servers storing credit card information
Which of the most frequent cause of stolen credit cards and card information today?
The hacking and looting of corporate servers storing credit card information