itm 4278 ch 5
The Data Encryption Standard uses a(n) ________-bit key.
56
All of the following statements about Apple Pay are true except which of the following?
Apple Pay is available for both iPhone 5s and iPhone 6s.
Smishing attacks exploit SMS messages.
True
Spoofing involves attempting to hide a true identity by using someone else's e-mail or IP address.
True
Which of the following dimensions of e-commerce security is not provided for by encryption?
availability
An intrusion detection system can perform all of the following functions except:
blocking suspicious activity.
All of the following are limitations of the existing online credit card payment system except:
cost to consumers.
Which of the following is not an example of an access control?
digital signatures
Which of the following is not an example of a PUP?
drive-by download
Which dimension(s) of security is spoofing a threat to?
integrity and authenticity
The overall rate of online credit card fraud is ________ % of all online card transactions.
less than 1
Online bill payment now accounts for ________ of all bill payments, while paper checks account for ________.
more than 50%, less than 25%
All of the following are used for authentication except:
packet filters.
All of the following statements about public key cryptography are true except:
public key cryptography ensures authentication of the sender.
A digital certificate contains all of the following except the:
subject's private key.
All the following statements about symmetric key cryptography are true except:
symmetric key cryptography is computationally slower.
Next generation firewalls provide all of the following except:
the ability to automatically update applications with security patches
To allow employees to connect securely over the Internet to their corporate network, you would use a(n) ________.
virtual private network
________ text is text that has been encrypted and thus cannot be read by anyone other than the sender and the receiver.
Cipher
________ refers to the ability to ensure that messages and data are only available to those authorized to view them.
Confidentiality
Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties.
False
SLS/TLS provides irrefutability.
False
Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other?
NFC
All of the following statements about PKI are true except:
PKI guarantees that the verifying computer of the merchant is secure.
Most of the world's malware is delivered via which of the following?
Trojan horses