eCommerce Exam 1 Chapter 5 Pt. 3 T/F

Ace your homework & exams now with Quizwiz!

Bluetooth is the primary enabling technology for mobile wallets.

FALSE

Phishing attacks rely on browser parasites.

FALSE

A Trojan horse appears to be benign, but then does something other than expected.

TRUE

A drive-by download is malware that comes with a downloaded file that a user intentionally or unintentionally requests.

TRUE

FREAK is an example of a software vulnerability.

TRUE

SSL/TLS cannot provide irrefutability.

TRUE

Spoofing is the attempt to hide a hacker's true identity by using someone else's e-mail or IP address.

TRUE

The creation of Bitcoins consumes a significant amount of energy.

TRUE

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.

TRUE

There is a finite number of Bitcoins that can be created.

TRUE

WannaCry is an example of ransomware.

TRUE

Zelle is an example of a P2P mobile payment app.

TRUE


Related study sets

Inquizitive - Synthesizing Ideas

View Set

ECON - 2302 Ch. 27, Ch 5 , Ch 6, Ch 28, Ch 21, Ch 32 Study Questions Final

View Set

Metrix Learning CompTIA A+ 220-1102 Review Questions

View Set

Grammar Unit 4- Identifying Types of Phrases

View Set