Chapter 5

Ace your homework & exams now with Quizwiz!

A fingerprint scan is an example of which of the following

Biometrics

Which of the following is not an example of an access control?

Digital signatures

Proxy servers are also known as:

Dual home systems

FREAK is an example of which of the following:

Software vulnerability

Which of the following dimensions of e-commerce security is not provided for by encryption?

availability

Rustock is an example of which of the following

botnet

PCI-DSS is a standard established by which of the following?

credit card industry

Malware that comes with a downloaded file that a user requests is called a:

drive-by download

Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties.

false

Vishing attacks exploit SMS messages.

false

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

firewall

Which of the following is the leading cause of data breaches?

hackers

The overall rate of online credit card fraud is ________ of all online card transactions.

less than 1%

PayPal is an example of what type of payment system?

online stored value payment system

Which of the following was designed to cripple Iranian nuclear centrifuges:

stuxnet

All the following statements about symmetric key cryptography are true except:

symmetric key cryptography is computationally slower

Next generation firewalls provide all of the following except:

the ability to automatically update applications with security patches

Zeus is an example of which of the following:

trojan horse

Apple Pay uses near field communication (NFC) chips.

true

Exploit kits are often rented or sold as a commercial product.

true

PayPal is the most popular alternative payment method in the United States.

true

SLS/TLS cannot provide irrefutability.

true

ShellShock is an example of a software vulnerability.

true

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.

true

There is a finite number of Bitcoins that can be created.

true

Which of the following is an example of an integrity violation of e-commerce security?

An unauthorized person intercepts an online communication and changes its contents.

Automatically redirecting a Web link to a different address is an example of which of the following:

Pharming

All of the following statements about Apple Pay are true except which of the following?

Apple Pay is available for both iPhone 5s and iPhone 6s

________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.

Authenticity

________ refers to the ability to ensure that an e-commerce site continues to function as intended.

Availability

________ refers to the ability to ensure that messages and data are only available to those authorized to view them.

Confidentiality

Define and explain how EBPP systems work. Describe each of the main EBPP business models.

EBPP refers to electronic billing presentment and payment systems, which are forms of online payment systems for monthly bills. Analysts expect electronic bill presentment and payment to become one of the fastest growing e-commerce businesses in the United States over the next several years because everyone involved stands to benefit from the process. Billers will cut costs by eliminating printing, paper, envelopes, postage, and the processing of paper checks and payments. Furthermore, EBPP will offer billers an opportunity to enhance customer service and target market. Customers will save time and eliminate checks and postage. Companies can use EBPP to present bills to individual customers electronically or they can contract with a service to handle all billing and payment collection for them. There are two main types of EBPP business models: biller-direct and consolidator. In biller-direct systems, a biller delivers the bill to customers via its own Web site or via a third-party's site. A service bureau is often used to provide the necessary infrastructure. The second major type of EBPP business model is the consolidator model. In this model, a third party, such as a financial institution or portal, aggregates all bills for consumers and ideally permits one-stop bill payment (pay anyone).

Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?

NFC

________ refers to the ability to ensure that e-commerce participants do not deny their online actions.

Nonrepudiation

All of the following statements about PKI are true except:

PKI guarantees that the verifying computer of the merchant is secure

What is the first step in developing an e-commerce security plan?

Perform a risk assessment


Related study sets

The Great Gatsby Study Guide (Comprehension)

View Set

Praxis: Missed Practice Test Questions

View Set

Unit 7 Progress Check: MCQ practice

View Set

Exam 3: Clinical Pathology: Endocrinology

View Set