660 MT - Chp 5

Ace your homework & exams now with Quizwiz!

The Data Encryption Standard uses a(n) ________-bit key.

56

Which of the following statements is not true?

A VPN uses a dedicated secure line.

Which of the following has the Internet Advertising Bureau urged advertisers to abandon?

Adobe Flash

All of the following experienced high-profile data breaches in 2014 except:

Amazon.

Which of the following is an example of an integrity violation of e-commerce security?

An unauthorized person intercepts an online communication and changes its contents.

All of the following statements about Apple Pay are true except which of the following?

Apple Pay is available for both iPhone 5s and iPhone 6s.

Which of the following statements is not true?

Apple's Touch ID stores a user's actual fingerprint.

________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.

Authenticity

All of the following are prominent hacktivist groups except:

Avid Life.

________ refers to the ability to ensure that messages and data are only available to those authorized to view them.

Confidentiality

________ typically attack governments, organizations, and sometimes individuals for political purposes.

Hacktivists

________ refers to the ability to ensure that e-commerce participants do not deny their online actions.

Nonrepudiation

All of the following statements about PKI are true except:

PKI guarantees that the verifying computer of the merchant is secure.

What is the first step in developing an e-commerce security plan?

Perform a risk assessment.

Which of the following was designed to cripple Iranian nuclear centrifuges?

Stuxnet

Which of the following statements is not true?

The Cybersecurity Information Sharing Act is strongly supported by most large technology companies and privacy advocates.

Zeus is an example of which of the following?

Trojan horse/botnet

Which of the following is the current standard used to protect Wi-Fi networks?

WPA2

In 2014, Sony experienced which of the following?

a high-profile data breach

To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:

an authorization management system.

Which of the following dimensions of e-commerce security is not provided for by encryption?

availability

A fingerprint scan is an example of which of the following?

biometrics

An intrusion detection system can perform all of the following functions except:

blocking suspicious activity.

Rustock is an example of which of the following?

botnet

All of the following are limitations of the existing online credit card payment system except:

cost to consumers.

According to Ponemon Institute's 2015 survey, which of the following was not among the causes of the most costly cybercrimes?

denial of service

Bitcoins are an example of:

digital cash.

Which of the following is the leading cause of data breaches?

hackers

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

spyware.

A digital certificate contains all of the following except the:

subject's private key.

What is the most frequent cause of stolen credit cards and card information today?

the hacking and looting of corporate servers storing credit card information

Slammer is an example of which of the following?

worm

Which of the following is an example of an online privacy violation?

your online purchasing history being sold to other merchants without your consent

________ refers to the ability to ensure that an e-commerce site continues to function as intended.

Availability

All of the following are examples of social/mobile peer-to-peer payment systems except:

Bill Me Later.

All of the following are methods of securing channels of communication except:

FTP

Which of the following is not a major trend in e-commerce payments in 2015-2016?

Mobile retail payment volume decreases.

Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?

NFC

Which of the following is the most common protocol for securing a digital channel of communication?

SSL/TLS

Accessing data without authorization on Dropbox is an example of which of the following?

cloud security issue

Which of the following is not an example of an access control?

digital signatures

Which of the following is not an example of a PUP?

drive-by download

Malware that comes with a downloaded file that a user requests is called a:

drive-by download.

Proxy servers are also known as:

dual home systems.

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

firewall

Which dimension(s) of security is spoofing a threat to?

integrity and authenticity

The overall rate of online credit card fraud is ________ of all online card transactions.

less than 1%

In 2014, online bill payment accounted for ________ of all bill payments, while paper checks accounted for ________.

more than 50%; less than 25%

PayPal is an example of what type of payment system?

online stored value payment system

All of the following are used for authentication except:

packet filters.

Automatically redirecting a Web link to a different address is an example of which of the following?

pharming

Confidentiality is sometimes confused with:

privacy

All of the following statements about public key cryptography are true except:

public key cryptography ensures authentication of the sender.

Symmetric key cryptography is also known as:

secret key cryptography.

Which of the following is not an example of malicious code?

sniffer

FREAK is an example of which of the following?

software vulnerability

All the following statements about symmetric key cryptography are true except:

symmetric key cryptography is computationally slower.

Next generation firewalls provide all of the following except:

the ability to automatically update applications with security patches.

PCI-DSS is a standard established by which of the following?

the credit card industry

Linden Dollars, created for use in Second Life, are an example of:

virtual currency.


Related study sets

Questions from exams 1-3 (final)

View Set

1.2 STUDY Implementing Hard Drives Lesson Review [220-902]

View Set

Practice Test #2 - AWS Certified Cloud Practitioner (Stephane)

View Set

Chapter 9 Level II National Codes (HCPCS)

View Set

AD Banker P&C Chapter 1 Practice Exams

View Set

Micro ch.5 viral structure and multiplication

View Set

managerial accounting chapter 6: Cost-Volume-Profit-Analysis

View Set