CIS 450 Ch 5

Ace your homework & exams now with Quizwiz!

There is a finite number of Bitcoins that can be created.

True

All of the following statements about PKI are true except:

PKI guarantees that the verifying computer of the merchant is secure.

What is the first step in developing an e-commerce security plan?

Perform a risk assessment

CryptoLocker is an example of ransomware.

True

Exploit kits are often rented or sold as a commercial product.

True

Factoring Attack on RSA-Export Keys (FREAK) is an example of a software vulnerability.

True

Accessing data without authorization on Dropbox is an example of which of the following?

cloud security issue

Proxy servers are also known as:

dual home systems

A ________ is a hardware or software component that acts as a filter to prevent unwanted packets from entering a network.

firewall

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

spyware

All the following statements about symmetric key cryptography are true except:

symmetric key cryptography is computationally slower.

PCI-DSS is a standard established by which of the following?

the credit card industry

What is the most frequent cause of stolen credit cards and card information today?

the hacking and looting of corporate servers storing credit card information

Conficker is an example of a:

worm

An intrusion detection system can perform all of the following functions except:

blocking suspicious activity

Confidentiality is sometimes confused with:

Privacy

Which of the following was designed to cripple Iranian nuclear centrifuges?

Stuxnet

PayPal is the most popular alternative payment method in the United States.

True

SLS/TLS cannot provide irrefutability.

True

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.

True

Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.

True

Angler is an example of:

an exploit kit

Bitcoins are an example of

digital cash

Which of the following is not an example of a PUP?

drive-by download

The overall rate of online credit card fraud is ________ of all online card transactions.

less than 1%

In 2015, online bill payment accounted for ________ of all bill payments, while paper checks accounted for ________.

more than 50%, less than 20%

PayPal is an example of a(n):

online stored value payment system.

All of the following statements about public key cryptography are true except:

public key cryptography ensures authentication of the sender.

Symmetric key cryptography is also known as:

secret key cyrptography

Linden Dollars, created for use in Second Life, are an example of:

virtual currency

Which of the following is an example of an online privacy violation?

your online purchasing history being sold to other merchants without your consent

Which of the following statements is not true?

A VPN uses a dedicated secure line

________ is not an example of malicious code.

A sniffer

All of the following statements about Apple Pay are true except which of the following?

Apple Pay is subject to recent regulations issued by the Bureau of Consumer Financial Protection applicable to GPR transactions.

________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.

Authenticity

All of the following are prominent hacktivist groups except:

Avid Life

Apple Pay uses near field communication (NFC) chips.

True

Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties.

False

A worm does not need to be activated by a user for it to replicate itself.

True

Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?

NFC

A Trojan horse appears to be benign, but then does something other than expected.

True

________ refers to the ability to ensure that an e-commerce site continues to function as intended.

Availability

All of the following are examples of social/mobile peer-to-peer payment systems except:

Bill Me Later

The attack on Dyn, Twitter, Amazon, and other major organizations in October 2016, is an example of which of the following?

DDos attack

Phishing attacks rely on browser parasites.

False

Which of the following statements is not true?

The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates.


Related study sets

Unit 10 Mixed bag (Peripheral neuropathy, FTT, GFTT, Cerebral Palsy)

View Set

ECON Final Exam Ch. 16 Multiple Choice

View Set

Assessment 3 N450 Personality disorders

View Set

A.P. Statistics Review for Fall Final Exam - Multiple Choice Questions

View Set

Theatre Appreciation Unit 2, Chapter 7,8

View Set

Technology for Success Module 6 Quiz (Security and Safety)

View Set

Vector Calculus Mid-Term #1 WebAssign Study Guide

View Set

Bio 183 Final Prep - NCSU Jacquet

View Set

Acute II Final: Neonatal & OB complications

View Set

Accounting Chapter 10: Stockholders' Equity

View Set