Filters
Question type

Study Flashcards

The Data Encryption Standard uses a(n) ________-bit key.


A) 8
B) 56
C) 256
D) 512

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Which of the following dimensions of e-commerce security does not involve encryption?


A) confidentiality
B) availability
C) message integrity
D) nonrepudiation

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

Conficker is an example of a:


A) virus.
B) worm.
C) Trojan horse.
D) botnet.

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Explain how an online credit card transaction works,identifying the parties involved and describing how SSL/TLS is involved.What are the limitations of online credit card payment systems?

Correct Answer

verifed

verified

The five parties involved in a credit ca...

View Answer

The overall rate of online credit card fraud is ________ of all online card transactions.


A) less than 1%
B) around 5%
C) around 10%
D) around 15%

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Apple Pay uses near field communication (NFC)chips.

A) True
B) False

Correct Answer

verifed

verified

All of the following experienced high-profile data breaches in 2015 except:


A) CVS.
B) Walgreens.
C) Amazon.
D) Experian.

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Which of the following is not an example of a PUP?


A) adware
B) browser parasite
C) drive-by download
D) spyware

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

All of the following are limitations of the existing online credit card payment system except:


A) poor security.
B) cost to consumers.
C) cost to merchant.
D) social equity.

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Confidentiality is sometimes confused with:


A) privacy.
B) authenticity.
C) integrity.
D) nonrepudiation.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

PCI-DSS is a standard established by which of the following?


A) the banking industry
B) the credit card industry
C) the federal government
D) the retail industry

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

All of the following statements about Apple Pay are true except which of the following?


A) Apple Pay is subject to recent regulations issued by the Bureau of Consumer Financial Protection applicable to GPR transactions.
B) Apple Pay is based on Touch ID biometric fingerprint scanning.
C) Apple Pay can be used for mobile payments at the point of sale at a physical store.
D) Apple Pay relies on NFC chip technology.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

All of the following are prominent hacktivist groups except:


A) Anonymous.
B) LulzSec.
C) Impact Team.
D) Avid Life.

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

Malware that comes with a downloaded file requested by a user is called a:


A) Trojan horse.
B) backdoor.
C) drive-by download.
D) PUP.

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

Shellshock is an example of which of the following?


A) mobile malware
B) software vulnerability
C) botnet
D) Trojan horse

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

What is a sniffing attack and how does it differ from a MitM attack?

Correct Answer

verifed

verified

A sniffer is a type of eavesdropping pro...

View Answer

Which of the following is an example of an integrity violation of e-commerce security?


A) A website is not actually operated by the entity the customer believes it to be.
B) A merchant uses customer information in a manner not intended by the customer.
C) A customer denies that he or she is the person who placed the order.
D) An unauthorized person intercepts an online communication and changes its contents.

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

The attack on Dyn,Twitter,Amazon,and other major organizations in October 2016,is an example of which of the following?


A) SQL injection attack
B) browser parasite
C) DDoS attack
D) MitM attack

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?


A) DES
B) NFC
C) IM
D) text messaging

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

Showing 21 - 40 of 85

Related Exams

Show Answer