Deck 5: E-Commerce Security and Payment Systems

Full screen (f)
exit full mode
Question
Which of the following is an example of an online privacy violation?

A)your e-mail being read by a hacker
B)your online purchasing history being sold to other merchants without your consent
C)your computer being used as part of a botnet
D)your e-mail being altered by a hacker
Use Space or
up arrow
down arrow
to flip the card.
Question
________ refers to the ability to ensure that messages and data are only available to those authorized to view them.

A)Confidentiality
B)Integrity
C)Privacy
D)Availability
Question
The overall rate of online credit card fraud is ________ of all online card transactions.

A)less than 1%
B)around 5%
C)around 10%
D)around 15%
Question
In 2014, Sony experienced which of the following?

A)a high-profile data breach
B)a DDoS attack that shut down its Web site
C)a hacktivist attack to protest its employment policies
D)a browser parasite
Question
All of the following are prominent hacktivist groups except:

A)Anonymous.
B)LulzSec.
C)Impact Team.
D)Avid Life.
Question
________ refers to the ability to ensure that an e-commerce site continues to function as intended.

A)Nonrepudiation
B)Authenticity
C)Availability
D)Integrity
Question
Accessing data without authorization on Dropbox is an example of which of the following?

A)social network security issue
B)cloud security issue
C)mobile platform security issue
D)sniffing
Question
Which of the following is the leading cause of data breaches?

A)theft of a computer
B)accidental disclosures
C)hackers
D)DDoS attacks
Question
Which of the following is an example of an integrity violation of e-commerce security?

A)A Web site is not actually operated by the entity the customer believes it to be.
B)A merchant uses customer information in a manner not intended by the customer.
C)A customer denies that he or she is the person who placed the order.
D)An unauthorized person intercepts an online communication and changes its contents.
Question
Confidentiality is sometimes confused with:

A)privacy.
B)authenticity.
C)integrity.
D)nonrepudiation.
Question
Bitcoins are an example of:

A)digital cash.
B)virtual currency.
C)a stored value payment system.
D)an EBPP system.
Question
Slammer is an example of which of the following?

A)virus
B)worm
C)Trojan horse
D)botnet
Question
Typically, the more security measures added to an e-commerce site, the faster and easier it becomes to use.
Question
Which of the following has the Internet Advertising Bureau urged advertisers to abandon?

A)HTML
B)HTML5
C)Adobe Flash
D)Adobe Acrobat
Question
Why is it difficult to accurately estimate the actual amount of cybercrime?
Question
________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.

A)Nonrepudiation
B)Authenticity
C)Availability
D)Integrity
Question
What is the most frequent cause of stolen credit cards and card information today?

A)lost cards
B)the hacking and looting of corporate servers storing credit card information
C)sniffing programs
D)phishing attacks
Question
All of the following experienced high-profile data breaches in 2014 except:

A)eBay.
B)Home Depot.
C)Amazon.
D)Sony.
Question
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

A)spyware.
B)a backdoor.
C)browser parasite.
D)adware.
Question
________ refers to the ability to ensure that e-commerce participants do not deny their online actions.

A)Nonrepudiation
B)Authenticity
C)Availability
D)Integrity
Question
Vishing attacks exploit SMS messages.
Question
Which of the following is not an example of a PUP?

A)adware
B)browser parasite
C)drive-by download
D)spyware
Question
________ typically attack governments, organizations, and sometimes individuals for political purposes.

A)Crackers
B)White hats
C)Grey hats
D)Hacktivists
Question
What is the Internet of Things (Io
T)and what security issues and challenges does it raise?
Question
ShellShock is an example of a software vulnerability.
Question
A Trojan horse appears to be benign, but then does something other than expected.
Question
According to Ponemon Institute's 2015 survey, which of the following was not among the causes of the most costly cybercrimes?

A)malicious insiders
B)malicious code
C)denial of service
D)botnets
Question
Automatically redirecting a Web link to a different address is an example of which of the following?

A)sniffing
B)social engineering
C)pharming
D)DDoS attack
Question
Which dimension(s)of security is spoofing a threat to?

A)integrity
B)availability
C)integrity and authenticity
D)availability and integrity
Question
Spoofing a Web site is a threat to the integrity of the Web site.
Question
Malware that comes with a downloaded file that a user requests is called a:

A)Trojan horse.
B)backdoor.
C)drive-by download.
D)PUP.
Question
Exploit kits are often rented or sold as a commercial product.
Question
A worm does not need to be activated by a user in order for it to replicate itself.
Question
FREAK is an example of which of the following?

A)mobile malware
B)software vulnerability
C)botnet
D)Trojan horse
Question
Which of the following was designed to cripple Iranian nuclear centrifuges?

A)Stuxnet
B)Flame
C)Snake
D)Storm
Question
Rustock is an example of which of the following?

A)worm
B)botnet
C)phishing
D)hacktivism
Question
Zeus is an example of which of the following?

A)SQL injection attack
B)browser parasite
C)DDoS attack
D)Trojan horse/botnet
Question
Phishing attacks rely on browser parasites.
Question
Which of the following is not an example of malicious code?

A)scareware
B)Trojan horse
C)bot
D)sniffer
Question
CryptoLocker is an example of ransomware.
Question
Next generation firewalls provide all of the following except:

A)an application-centric approach to firewall control.
B)the ability to identify applications regardless of the port, protocol, or security evasion tools used.
C)the ability to automatically update applications with security patches.
D)the ability to identify users regardless of the device or IP address.
Question
An intrusion detection system can perform all of the following functions except:

A)examining network traffic.
B)setting off an alarm when suspicious activity is detected.
C)checking network traffic to see if it matches certain patterns or preconfigured rules.
D)blocking suspicious activity.
Question
All the following statements about symmetric key cryptography are true except:

A)in symmetric key cryptography, both the sender and the receiver use the same key to encrypt and decrypt a message.
B)the Data Encryption Standard is a symmetric key encryption system.
C)symmetric key cryptography is computationally slower.
D)symmetric key cryptography is a key element in digital envelopes.
Question
What is a sniffing attack and how does it differ from a MitM attack?
Question
All of the following are used for authentication except:

A)digital signatures.
B)certificates of authority.
C)biometric devices.
D)packet filters.
Question
A digital certificate contains all of the following except the:

A)subject's private key.
B)subject's public key.
C)digital signature of the certification authority.
D)digital certificate serial number.
Question
All of the following statements about PKI are true except:

A)The term PKI refers to the certification authorities and digital certificate procedures that are accepted by all parties.
B)PKI is not effective against insiders who have a legitimate access to corporate systems including customer information.
C)PKI guarantees that the verifying computer of the merchant is secure.
D)The acronym PKI stands for public key infrastructure.
Question
Discuss and explain the various types of malicious code and how they work. Include the different types of viruses.
Question
All of the following statements about public key cryptography are true except:

A)public key cryptography uses two mathematically related digital keys.
B)public key cryptography ensures authentication of the sender.
C)public key cryptography does not ensure message integrity.
D)public key cryptography is based on the idea of irreversible mathematical functions.
Question
All of the following are methods of securing channels of communication except:

A)SSL/TLS.
B)certificates.
C)VPN.
D)FTP.
Question
Which of the following statements is not true?

A)Apple's Touch ID stores a user's actual fingerprint.
B)Biometric devices reduce the opportunity for spoofing.
C)A retina scan is an example of a biometric device.
D)Biometric data stored on an iPhone is encrypted.
Question
Which of the following is not an example of an access control?

A)firewalls
B)proxy servers
C)digital signatures
D)login passwords
Question
The Data Encryption Standard uses a(n)________-bit key.

A)8
B)56
C)256
D)512
Question
A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

A)firewall
B)virtual private network
C)proxy server
D)PPTP
Question
Which of the following statements is not true?

A)A VPN provides both confidentiality and integrity.
B)A VPN uses both authentication and encryption.
C)A VPN uses a dedicated secure line.
D)The primary use of VPNs is to establish secure communications among business partners.
Question
Which of the following is the current standard used to protect Wi-Fi networks?

A)WEP
B)TLS
C)WPA2
D)WPA3
Question
Which of the following dimensions of e-commerce security is not provided for by encryption?

A)confidentiality
B)availability
C)message integrity
D)nonrepudiation
Question
Proxy servers are also known as:

A)firewalls.
B)application gateways.
C)dual home systems.
D)packet filters.
Question
Discuss the Great Cannon. Who developed it, how has it been used, and how does it differ from the Great Firewall?
Question
Symmetric key cryptography is also known as:

A)public key cryptography.
B)secret key cryptography.
C)PGP.
D)PKI.
Question
Explain the difference between symmetric key cryptography and public key cryptography. Which dimensions of e-commerce security does encryption address?
Question
PCI-DSS is a standard established by which of the following?

A)the banking industry
B)the credit card industry
C)the federal government
D)the retail industry
Question
Which of the following is the most common protocol for securing a digital channel of communication?

A)DES
B)SSL/TLS
C)VPN
D)HTTP
Question
The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.
Question
SLS/TLS cannot provide irrefutability.
Question
All of the following statements about Apple Pay are true except which of the following?

A)Apple Pay is available for both iPhone 5s and iPhone 6s.
B)Apple Pay is based on Touch ID biometric fingerprint scanning.
C)Apple Pay can be used for mobile payments at the point of sale at a physical store.
D)Apple Pay relies on NFC chip technology.
Question
Linden Dollars, created for use in Second Life, are an example of:

A)digital cash.
B)virtual currency.
C)EBPP.
D)peer-to-peer payment systems.
Question
What is the first step in developing an e-commerce security plan?

A)Create a security organization.
B)Develop a security policy.
C)Perform a risk assessment.
D)Perform a security audit.
Question
Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?

A)DES
B)NFC
C)IM
D)text messaging
Question
All of the following are limitations of the existing online credit card payment system except:

A)poor security.
B)cost to consumers.
C)cost to merchant.
D)social equity.
Question
Apple Pay uses near field communication (NF
C)chips.
Question
Which of the following is not a major trend in e-commerce payments in 2015-2016?

A)Mobile retail payment volume decreases.
B)PayPal remains the most popular alternative payment method.
C)Apple introduces Apple Pay.
D)Payment by credit and/or debit card remains the dominant form of online payment.
Question
PayPal is the most popular alternative payment method in the United States.
Question
All of the following are examples of social/mobile peer-to-peer payment systems except:

A)Venmo.
B)Bill Me Later.
C)Square Cash.
D)Google Wallet.
Question
Which of the following statements is not true?

A)A majority of states require companies that maintain personal data on their residents to publicly disclose when a security breach affecting those residents has occurred.
B)The USA Patriot Act broadly expanded law enforcement's investigative and surveillance powers.
C)The Cybersecurity Information Sharing Act is strongly supported by most large technology companies and privacy advocates.
D)The Federal Trade Commission has asserted that it has authority over corporations' data security practices.
Question
A fingerprint scan is an example of which of the following?

A)biometrics
B)encryption
C)IDS
D)firewall
Question
What dimensions do digital signatures and hash digests add to public key cryptography and how do they work?
Question
Discuss the security of communications channels. Include definitions and explanations for the terms Secure Sockets Layer/Transport Layer Security (SSL/TL
S), secure negotiated session, session key, and VPN.
Question
To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:

A)access controls.
B)an authorization management system.
C)security tokens.
D)an authorization policy.
Question
PayPal is an example of what type of payment system?

A)online stored value payment system
B)digital checking system
C)accumulating balance system
D)digital credit card system
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/85
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: E-Commerce Security and Payment Systems
1
Which of the following is an example of an online privacy violation?

A)your e-mail being read by a hacker
B)your online purchasing history being sold to other merchants without your consent
C)your computer being used as part of a botnet
D)your e-mail being altered by a hacker
B
2
________ refers to the ability to ensure that messages and data are only available to those authorized to view them.

A)Confidentiality
B)Integrity
C)Privacy
D)Availability
A
3
The overall rate of online credit card fraud is ________ of all online card transactions.

A)less than 1%
B)around 5%
C)around 10%
D)around 15%
A
4
In 2014, Sony experienced which of the following?

A)a high-profile data breach
B)a DDoS attack that shut down its Web site
C)a hacktivist attack to protest its employment policies
D)a browser parasite
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
5
All of the following are prominent hacktivist groups except:

A)Anonymous.
B)LulzSec.
C)Impact Team.
D)Avid Life.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
6
________ refers to the ability to ensure that an e-commerce site continues to function as intended.

A)Nonrepudiation
B)Authenticity
C)Availability
D)Integrity
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
7
Accessing data without authorization on Dropbox is an example of which of the following?

A)social network security issue
B)cloud security issue
C)mobile platform security issue
D)sniffing
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is the leading cause of data breaches?

A)theft of a computer
B)accidental disclosures
C)hackers
D)DDoS attacks
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is an example of an integrity violation of e-commerce security?

A)A Web site is not actually operated by the entity the customer believes it to be.
B)A merchant uses customer information in a manner not intended by the customer.
C)A customer denies that he or she is the person who placed the order.
D)An unauthorized person intercepts an online communication and changes its contents.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
10
Confidentiality is sometimes confused with:

A)privacy.
B)authenticity.
C)integrity.
D)nonrepudiation.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
11
Bitcoins are an example of:

A)digital cash.
B)virtual currency.
C)a stored value payment system.
D)an EBPP system.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
12
Slammer is an example of which of the following?

A)virus
B)worm
C)Trojan horse
D)botnet
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
13
Typically, the more security measures added to an e-commerce site, the faster and easier it becomes to use.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following has the Internet Advertising Bureau urged advertisers to abandon?

A)HTML
B)HTML5
C)Adobe Flash
D)Adobe Acrobat
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
15
Why is it difficult to accurately estimate the actual amount of cybercrime?
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
16
________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.

A)Nonrepudiation
B)Authenticity
C)Availability
D)Integrity
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
17
What is the most frequent cause of stolen credit cards and card information today?

A)lost cards
B)the hacking and looting of corporate servers storing credit card information
C)sniffing programs
D)phishing attacks
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
18
All of the following experienced high-profile data breaches in 2014 except:

A)eBay.
B)Home Depot.
C)Amazon.
D)Sony.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
19
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

A)spyware.
B)a backdoor.
C)browser parasite.
D)adware.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
20
________ refers to the ability to ensure that e-commerce participants do not deny their online actions.

A)Nonrepudiation
B)Authenticity
C)Availability
D)Integrity
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
21
Vishing attacks exploit SMS messages.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is not an example of a PUP?

A)adware
B)browser parasite
C)drive-by download
D)spyware
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
23
________ typically attack governments, organizations, and sometimes individuals for political purposes.

A)Crackers
B)White hats
C)Grey hats
D)Hacktivists
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
24
What is the Internet of Things (Io
T)and what security issues and challenges does it raise?
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
25
ShellShock is an example of a software vulnerability.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
26
A Trojan horse appears to be benign, but then does something other than expected.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
27
According to Ponemon Institute's 2015 survey, which of the following was not among the causes of the most costly cybercrimes?

A)malicious insiders
B)malicious code
C)denial of service
D)botnets
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
28
Automatically redirecting a Web link to a different address is an example of which of the following?

A)sniffing
B)social engineering
C)pharming
D)DDoS attack
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
29
Which dimension(s)of security is spoofing a threat to?

A)integrity
B)availability
C)integrity and authenticity
D)availability and integrity
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
30
Spoofing a Web site is a threat to the integrity of the Web site.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
31
Malware that comes with a downloaded file that a user requests is called a:

A)Trojan horse.
B)backdoor.
C)drive-by download.
D)PUP.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
32
Exploit kits are often rented or sold as a commercial product.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
33
A worm does not need to be activated by a user in order for it to replicate itself.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
34
FREAK is an example of which of the following?

A)mobile malware
B)software vulnerability
C)botnet
D)Trojan horse
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following was designed to cripple Iranian nuclear centrifuges?

A)Stuxnet
B)Flame
C)Snake
D)Storm
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
36
Rustock is an example of which of the following?

A)worm
B)botnet
C)phishing
D)hacktivism
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
37
Zeus is an example of which of the following?

A)SQL injection attack
B)browser parasite
C)DDoS attack
D)Trojan horse/botnet
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
38
Phishing attacks rely on browser parasites.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following is not an example of malicious code?

A)scareware
B)Trojan horse
C)bot
D)sniffer
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
40
CryptoLocker is an example of ransomware.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
41
Next generation firewalls provide all of the following except:

A)an application-centric approach to firewall control.
B)the ability to identify applications regardless of the port, protocol, or security evasion tools used.
C)the ability to automatically update applications with security patches.
D)the ability to identify users regardless of the device or IP address.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
42
An intrusion detection system can perform all of the following functions except:

A)examining network traffic.
B)setting off an alarm when suspicious activity is detected.
C)checking network traffic to see if it matches certain patterns or preconfigured rules.
D)blocking suspicious activity.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
43
All the following statements about symmetric key cryptography are true except:

A)in symmetric key cryptography, both the sender and the receiver use the same key to encrypt and decrypt a message.
B)the Data Encryption Standard is a symmetric key encryption system.
C)symmetric key cryptography is computationally slower.
D)symmetric key cryptography is a key element in digital envelopes.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
44
What is a sniffing attack and how does it differ from a MitM attack?
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
45
All of the following are used for authentication except:

A)digital signatures.
B)certificates of authority.
C)biometric devices.
D)packet filters.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
46
A digital certificate contains all of the following except the:

A)subject's private key.
B)subject's public key.
C)digital signature of the certification authority.
D)digital certificate serial number.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
47
All of the following statements about PKI are true except:

A)The term PKI refers to the certification authorities and digital certificate procedures that are accepted by all parties.
B)PKI is not effective against insiders who have a legitimate access to corporate systems including customer information.
C)PKI guarantees that the verifying computer of the merchant is secure.
D)The acronym PKI stands for public key infrastructure.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
48
Discuss and explain the various types of malicious code and how they work. Include the different types of viruses.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
49
All of the following statements about public key cryptography are true except:

A)public key cryptography uses two mathematically related digital keys.
B)public key cryptography ensures authentication of the sender.
C)public key cryptography does not ensure message integrity.
D)public key cryptography is based on the idea of irreversible mathematical functions.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
50
All of the following are methods of securing channels of communication except:

A)SSL/TLS.
B)certificates.
C)VPN.
D)FTP.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
51
Which of the following statements is not true?

A)Apple's Touch ID stores a user's actual fingerprint.
B)Biometric devices reduce the opportunity for spoofing.
C)A retina scan is an example of a biometric device.
D)Biometric data stored on an iPhone is encrypted.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
52
Which of the following is not an example of an access control?

A)firewalls
B)proxy servers
C)digital signatures
D)login passwords
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
53
The Data Encryption Standard uses a(n)________-bit key.

A)8
B)56
C)256
D)512
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
54
A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

A)firewall
B)virtual private network
C)proxy server
D)PPTP
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
55
Which of the following statements is not true?

A)A VPN provides both confidentiality and integrity.
B)A VPN uses both authentication and encryption.
C)A VPN uses a dedicated secure line.
D)The primary use of VPNs is to establish secure communications among business partners.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
56
Which of the following is the current standard used to protect Wi-Fi networks?

A)WEP
B)TLS
C)WPA2
D)WPA3
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
57
Which of the following dimensions of e-commerce security is not provided for by encryption?

A)confidentiality
B)availability
C)message integrity
D)nonrepudiation
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
58
Proxy servers are also known as:

A)firewalls.
B)application gateways.
C)dual home systems.
D)packet filters.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
59
Discuss the Great Cannon. Who developed it, how has it been used, and how does it differ from the Great Firewall?
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
60
Symmetric key cryptography is also known as:

A)public key cryptography.
B)secret key cryptography.
C)PGP.
D)PKI.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
61
Explain the difference between symmetric key cryptography and public key cryptography. Which dimensions of e-commerce security does encryption address?
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
62
PCI-DSS is a standard established by which of the following?

A)the banking industry
B)the credit card industry
C)the federal government
D)the retail industry
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
63
Which of the following is the most common protocol for securing a digital channel of communication?

A)DES
B)SSL/TLS
C)VPN
D)HTTP
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
64
The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
65
SLS/TLS cannot provide irrefutability.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
66
All of the following statements about Apple Pay are true except which of the following?

A)Apple Pay is available for both iPhone 5s and iPhone 6s.
B)Apple Pay is based on Touch ID biometric fingerprint scanning.
C)Apple Pay can be used for mobile payments at the point of sale at a physical store.
D)Apple Pay relies on NFC chip technology.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
67
Linden Dollars, created for use in Second Life, are an example of:

A)digital cash.
B)virtual currency.
C)EBPP.
D)peer-to-peer payment systems.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
68
What is the first step in developing an e-commerce security plan?

A)Create a security organization.
B)Develop a security policy.
C)Perform a risk assessment.
D)Perform a security audit.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
69
Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?

A)DES
B)NFC
C)IM
D)text messaging
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
70
All of the following are limitations of the existing online credit card payment system except:

A)poor security.
B)cost to consumers.
C)cost to merchant.
D)social equity.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
71
Apple Pay uses near field communication (NF
C)chips.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
72
Which of the following is not a major trend in e-commerce payments in 2015-2016?

A)Mobile retail payment volume decreases.
B)PayPal remains the most popular alternative payment method.
C)Apple introduces Apple Pay.
D)Payment by credit and/or debit card remains the dominant form of online payment.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
73
PayPal is the most popular alternative payment method in the United States.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
74
All of the following are examples of social/mobile peer-to-peer payment systems except:

A)Venmo.
B)Bill Me Later.
C)Square Cash.
D)Google Wallet.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
75
Which of the following statements is not true?

A)A majority of states require companies that maintain personal data on their residents to publicly disclose when a security breach affecting those residents has occurred.
B)The USA Patriot Act broadly expanded law enforcement's investigative and surveillance powers.
C)The Cybersecurity Information Sharing Act is strongly supported by most large technology companies and privacy advocates.
D)The Federal Trade Commission has asserted that it has authority over corporations' data security practices.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
76
A fingerprint scan is an example of which of the following?

A)biometrics
B)encryption
C)IDS
D)firewall
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
77
What dimensions do digital signatures and hash digests add to public key cryptography and how do they work?
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
78
Discuss the security of communications channels. Include definitions and explanations for the terms Secure Sockets Layer/Transport Layer Security (SSL/TL
S), secure negotiated session, session key, and VPN.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
79
To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:

A)access controls.
B)an authorization management system.
C)security tokens.
D)an authorization policy.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
80
PayPal is an example of what type of payment system?

A)online stored value payment system
B)digital checking system
C)accumulating balance system
D)digital credit card system
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 85 flashcards in this deck.