Test Review

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

According to SEO, the whole point of using content to improve rankings is to "trick" search engines into ranking pages higher

False

The major points of vulnerability in a typical online transaction are at the client level, at the consumer level, and over the Internet communications channels

False; I️t is the client, the server, and the communications pipeline

Anti-virus software will protect a computer from all of the most common types of viruses

False; I️t will protect from many, but not all, of the most common types

Vishing attacks exploit SMS messages

False; Smishing attacks do that, vishing try to elicit verbal responses

Spyware and (to a lesser degree) adware are considered to be security threats even though they are voluntary placed on users' computers, where they can collect and distribute private personal information

False; They're placed on users' computers covertly

The primary advantage of credit cards is that merchants pay a very low transaction fee of between 0.3% and 0.5% of the sale

False; fees are 3% - 5% of the transaction

"Proxy servers" are either hardware or software that filter communication packets and prevent packets from entering the network based on a security policy

False; that is a firewall, proxy servers are software servers that handle all communication originating from or being sent to the internet by local clients

"Confidentiality" is the ability to control the use of information a customer provides about him or herself to an e-commerce merchant.

False; that is privacy

Encryption is more secure today than I️t was earlier in the century because computers are so much more powerful and faster

False; the complexity of new technologies has made computers more vulnerable to attacks

Biometric devices help improve security by working in conjunction with digital signatures to ensure the authenticity of messages; this, they guarantee nonrepudiation by verifying the physical attributes of an individual

True

EBPP (Electronic Bill Presentment and Payment) systems are becoming increasingly popular because of the substantial cost savings that will occur if online billing becomes the norm.

True

Exploit kits are often rented or sold as a commercial product

True

One way to protect against DoS attacks would be to increase the redundancy of your network's servers

True

Spoofing a website is a threat to the integrity of the website

True

The SEO How-it's author says that the actual process of collecting keyword data is simple, since all you're doing is copying a set of seeds from your list and lasting them into the keyword tool, waiting for I️t to finish processing, exporting the resulting data into a spreadsheet, and repeating until all the seeds have been entered into the tool

True

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software

True

The potential for anonymity in the Internet can allow criminals to assume identities that look legitimate and at the same time shirk them from law enforcement agencies

True

Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.

True

CryptoLocker is an example of ransomware

True

"Nonrepudiation" is the ability to ensure that e-commerce participants do not deny their online actions

True

"authorization management systems" regulate where and when a user is permitted to access certain parts of a website

True


Set pelajaran terkait

Connecting with Computer Science Chapter 1

View Set

Quiz: Riders Covering Additional Insureds

View Set

Growth and Development: OB & PEDS

View Set

Animation Final exam study guide

View Set

HESI Abdominal Assessment Case Study

View Set

executive and legislative branch

View Set

NUR 304 Chapter 22 - Ethics and values in Nursing

View Set