Bus 210 - 01 Chapter 5

Ace your homework & exams now with Quizwiz!

Firewall

A ___ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

Subject's private key

A digital certificate contains all of the following EXCEPT the:

Sniffers

All of the following are examples of malicious code EXCEPT:

The Internet's similarity to telephone networks

All of the following are factors in contributing to the increase in cybercrime EXCEPT:

Cost to consumers

All of the following are limitations of the existing online credit card payment system EXCEPT:

Packet filters

All of the following are used for authentication EXCEPT:

Public key encryption ensures authentication of the sender

All of the following statements about public key encryption are true EXCEPT:

Spyware

Software that is used to obtain private user information such as a users keystrokes or copies of e-mail is referred to as:

Perform a risk assessment

What is the first step in developing an e-commerce security plan?

The hacking and looting of corporate servers storing credit card information

What is the most frequent cause of stolen credit cards and card information today?

Integrity and authenticity

Which dimension(s) of security is spoofing a threat to?

Availability

Which of the following dimensions of e-commerce security is NOT provided for by encryption?

The credit card companies

Which of the following is NOT a key point of vulnerability when dealing with e-commerce?

Availability

___ refers to the ability to ensure that an e-commerce site continues to function as intended.

Authenticity

___ refers to the ability to identify the person or entity with whom you are dealing on the Internet.

Nonrepudiation

____ refers to the ability to ensure that e-commerce participants do not deny their online actions.

credit cards

In the United States, the primary form of online payment is:

Drive-by download

Malware that comes with a downloaded file that a user requests is called a:

Botnets

Most of the world's spam is delivered via which of the following?

Confidentiality

The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and:


Related study sets

Chapter 5 - Section 1 Understanding and testing power and Power Devices

View Set

AZ Ethical Legal/Nursing Jurisprudence adaptive quiz

View Set

CH 34 - Assessment and Management of Patients with Inflammatory Rheumatic Disorders

View Set

Lesson 2: The End of Segregation

View Set