20 questions
________ refers to the ability to ensure that e-commerce participants do not deny their online actions.
Authenticity
Nonrepudiation
Integrity
Availability
________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.
Authenticity
Nonrepudiation
Availability
Integrity
Which of the following is an example of an integrity violation of e-commerce security?
A merchant uses customer information in a manner not intended by the customer.
An unauthorized person intercepts an online communication and changes its contents.
A website is not actually operated by the entity the customer believes it to be.
A customer denies that he or she is the person who placed the order.
The overall rate of online credit card fraud is ________ of all online card transactions.
around 15%
less than 1%
around 10%
around 5%
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:
browser parasite.
a backdoor.
adware.
spyware.
Malware that comes with a downloaded file requested by a user is called a:
Trojan horse.
PUP.
drive-by download.
backdoor.
Automatically redirecting a web link to a different address is an example of:
pharming.
DDoS attack.
sniffing.
social engineering.
________ typically attack governments, organizations, and sometimes individuals for political purposes.
Grey hats
White hats
Crackers
Hacktivists
A worm does not need to be activated by a user for it to replicate itself.
True
Fasle
Vishing attacks exploit SMS messages.
True
False
A ________ is a hardware or software component that acts as a filter to prevent unwanted packets from entering a network.
PPTP
virtual private network
proxy server
firewall
Which of the following is the most common protocol for securing a digital channel of communication?
HTTP
SSL/TLS
DES
VPN
Linden Dollars, created for use in Second Life, are an example of:
peer-to-peer payment systems.
digital cash.
virtual currency.
EBPP.
Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?
NFC
IM
text messaging
DES
There is a finite number of Bitcoins that can be created.
True
False
Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.
True
False
Bitcoins are an example of:
digital Cash
a stored value payment system.
virtual currency.
an EBPP system.
________ refers to the ability to ensure that an e-commerce site continues to function as intended.
Authenticity
Integrity
Nonrepudiation
Availability
________ refers to the ability to ensure that messages and data are only available to those authorized to view them.
Availability
Privacy
Integrity
Confidentiality
Which dimension(s) of security is spoofing a threat to?
integrity and authenticity
availability and integrity
integrity
availability