eCommerce Exam 1 Chapter 5 Pt. 1

Ace your homework & exams now with Quizwiz!

Which of the following is an example of an integrity violation of e-commerce security?

An unauthorized person intercepts an online communication and changes its contents.

________ is the ability to identify the person or entity with whom you are dealing on the Internet.

Authenticity

Which of the following is not an example of a potentially unwanted program (PUP)?

drive-by download

Which dimension(s) of security is spoofing a threat to?

integrity and authenticity

Confidentiality is sometimes confused with

privacy

Conficker is an example of a

worm.

Which of the following is an example of an online privacy violation?

your online purchasing history being sold to other merchants without your consent

All of the following are examples of cryptocurrencies except:

Zelle.

Beebone is an example of which of the following?

botnet

According to Ponemon Institute's 2017 survey, which of the following was not among the causes of the most costly cybercrimes?

botnets

Accessing data without authorization on Dropbox is an example of a:

cloud security issue.

Which of the following is not a key factor for establishing e-commerce security?

data integrity

Malware that comes with a downloaded file that a user requests is called a:

drive-by download.

Which of the following is the leading cause of data breaches?Which of the following is the leading cause of data breaches?

hackers

The overall rate of online credit card fraud is ________ of all online card transactions

less than 1%

Automatically redirecting a web link to a different address is an example of which of the following?

pharming

________ is the ability to ensure that an e-commerce site continues to function as intended.

Availability

Which of the following is not an example of malicious code?

sniffer

) Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

spyware.

What is the most frequent cause of stolen credit cards and card information today?

the hacking and looting of corporate servers storing credit card information

________ is the ability to ensure that messages and data are only available to those authorized to view them.

Confidentiality

The attack on Dyn Inc. in 2016 is an example of which of the following?

DDoS attack

________ is the ability to ensure that e-commerce participants do not deny their online actions.

Nonrepudiation

Which of the following was designed to cripple Iranian nuclear centrifuges?

Stuxnet

According to the Identity Theft Resource Center, the number of data breaches in 2017 increased by ________ compared to 2016.

55%

Which of the following statements about data breaches in 2017 is not true?

According to the Identity Theft Resource Center, employee error was the leading cause of data breaches.According to the Identity Theft Resource Center, employee error was the leading cause of data breaches.

Which of the following did the Internet Advertising Bureau urge advertisers to abandon?

Adobe Flash

________ typically attack governments, organizations, and sometimes individuals for political purposes.

Hacktivists

Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.

TRUE

According to Symantec, almost half of the e-mail addresses involved in business e-mail compromise (BEC) phishing that it analyzed had an IP address originating in:

Nigeria.


Related study sets

16. Bile Secretion and Gall Bladder Function (DSA + Lecture)

View Set

Ch 4 pt5 Variable Life Insurance Products

View Set