A) 8
B) 56
C) 256
D) 512
Correct Answer
verified
Multiple Choice
A) confidentiality
B) availability
C) message integrity
D) nonrepudiation
Correct Answer
verified
Multiple Choice
A) virus.
B) worm.
C) Trojan horse.
D) botnet.
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) less than 1%
B) around 5%
C) around 10%
D) around 15%
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) CVS.
B) Walgreens.
C) Amazon.
D) Experian.
Correct Answer
verified
Multiple Choice
A) adware
B) browser parasite
C) drive-by download
D) spyware
Correct Answer
verified
Multiple Choice
A) poor security.
B) cost to consumers.
C) cost to merchant.
D) social equity.
Correct Answer
verified
Multiple Choice
A) privacy.
B) authenticity.
C) integrity.
D) nonrepudiation.
Correct Answer
verified
Multiple Choice
A) the banking industry
B) the credit card industry
C) the federal government
D) the retail industry
Correct Answer
verified
Multiple Choice
A) Apple Pay is subject to recent regulations issued by the Bureau of Consumer Financial Protection applicable to GPR transactions.
B) Apple Pay is based on Touch ID biometric fingerprint scanning.
C) Apple Pay can be used for mobile payments at the point of sale at a physical store.
D) Apple Pay relies on NFC chip technology.
Correct Answer
verified
Multiple Choice
A) Anonymous.
B) LulzSec.
C) Impact Team.
D) Avid Life.
Correct Answer
verified
Multiple Choice
A) Trojan horse.
B) backdoor.
C) drive-by download.
D) PUP.
Correct Answer
verified
Multiple Choice
A) mobile malware
B) software vulnerability
C) botnet
D) Trojan horse
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) A website is not actually operated by the entity the customer believes it to be.
B) A merchant uses customer information in a manner not intended by the customer.
C) A customer denies that he or she is the person who placed the order.
D) An unauthorized person intercepts an online communication and changes its contents.
Correct Answer
verified
Multiple Choice
A) SQL injection attack
B) browser parasite
C) DDoS attack
D) MitM attack
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) DES
B) NFC
C) IM
D) text messaging
Correct Answer
verified
Showing 21 - 40 of 85
Related Exams