Test Review
According to SEO, the whole point of using content to improve rankings is to "trick" search engines into ranking pages higher
False
The major points of vulnerability in a typical online transaction are at the client level, at the consumer level, and over the Internet communications channels
False; I️t is the client, the server, and the communications pipeline
Anti-virus software will protect a computer from all of the most common types of viruses
False; I️t will protect from many, but not all, of the most common types
Vishing attacks exploit SMS messages
False; Smishing attacks do that, vishing try to elicit verbal responses
Spyware and (to a lesser degree) adware are considered to be security threats even though they are voluntary placed on users' computers, where they can collect and distribute private personal information
False; They're placed on users' computers covertly
The primary advantage of credit cards is that merchants pay a very low transaction fee of between 0.3% and 0.5% of the sale
False; fees are 3% - 5% of the transaction
"Proxy servers" are either hardware or software that filter communication packets and prevent packets from entering the network based on a security policy
False; that is a firewall, proxy servers are software servers that handle all communication originating from or being sent to the internet by local clients
"Confidentiality" is the ability to control the use of information a customer provides about him or herself to an e-commerce merchant.
False; that is privacy
Encryption is more secure today than I️t was earlier in the century because computers are so much more powerful and faster
False; the complexity of new technologies has made computers more vulnerable to attacks
Biometric devices help improve security by working in conjunction with digital signatures to ensure the authenticity of messages; this, they guarantee nonrepudiation by verifying the physical attributes of an individual
True
EBPP (Electronic Bill Presentment and Payment) systems are becoming increasingly popular because of the substantial cost savings that will occur if online billing becomes the norm.
True
Exploit kits are often rented or sold as a commercial product
True
One way to protect against DoS attacks would be to increase the redundancy of your network's servers
True
Spoofing a website is a threat to the integrity of the website
True
The SEO How-it's author says that the actual process of collecting keyword data is simple, since all you're doing is copying a set of seeds from your list and lasting them into the keyword tool, waiting for I️t to finish processing, exporting the resulting data into a spreadsheet, and repeating until all the seeds have been entered into the tool
True
The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software
True
The potential for anonymity in the Internet can allow criminals to assume identities that look legitimate and at the same time shirk them from law enforcement agencies
True
Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.
True
CryptoLocker is an example of ransomware
True
"Nonrepudiation" is the ability to ensure that e-commerce participants do not deny their online actions
True
"authorization management systems" regulate where and when a user is permitted to access certain parts of a website
True