Filters
Question type

Study Flashcards

Which of the following has the Internet Advertising Bureau urged advertisers to abandon?


A) HTML
B) HTML5
C) Adobe Flash
D) Adobe Acrobat

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

Discuss and explain the various types of malicious code and how they work. Include the different types of viruses.

Correct Answer

verifed

verified

Malicious code includes a variety of thr...

View Answer

Angler is an example of which of the following?


A) worm
B) exploit kit
C) phishing
D) hacktivism

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Phishing attacks rely on browser parasites.

A) True
B) False

Correct Answer

verifed

verified

According to Symantec, almost half of the e-mail addresses involved in business e-mail compromise (BEC) phishing that it analyzed had an IP address originating in:


A) China.
B) Russia.
C) Nigeria.
D) North Korea.

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.

A) True
B) False

Correct Answer

verifed

verified

What is the Internet of Things (IoT)and what security issues and challenges does it raise?

Correct Answer

verifed

verified

The Internet of Things (IoT) involves th...

View Answer

Which dimension(s) of security is spoofing a threat to?


A) integrity
B) availability
C) integrity and authenticity
D) availability and integrity

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

All of the following are limitations of the existing online credit card payment system except:


A) poor security.
B) cost to consumers.
C) cost to merchant.
D) social equity.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

B

Which of the following is not a key factor for establishing e-commerce security?


A) data integrity
B) technology
C) organizational policies
D) laws and industry standards

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

A Trojan horse appears to be benign, but then does something other than expected.

A) True
B) False

Correct Answer

verifed

verified

Define and explain how EBPP systems work. Describe each of the main EBPP business models.

Correct Answer

verifed

verified

EBPP refers to electronic billing presen...

View Answer

________ is the ability to identify the person or entity with whom you are dealing on the Internet.


A) Nonrepudiation
B) Authenticity
C) Availability
D) Integrity

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

B

The Data Encryption Standard uses a(n) ________-bit key.


A) 8
B) 56
C) 256
D) 512

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Why is it difficult to accurately estimate the actual amount of cybercrime?

Correct Answer

verifed

verified

It is difficult to accurately estimate the actual amount of cybercrime, in part, because many companies are hesitant to report it due to the fear of losing the trust of their customers, and because even if crime is reported, it may be difficult to quantify the actual dollar amount of the loss.

Which of the following is not an example of malicious code?


A) scareware
B) Trojan horse
C) bot
D) sniffer

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Which of the following is not an example of an access control?


A) firewalls
B) proxy servers
C) digital signatures
D) login passwords

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?


A) DES
B) NFC
C) IM
D) text messaging

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

All the following statements about symmetric key cryptography are true except:


A) in symmetric key cryptography, both the sender and the receiver use the same key to encrypt and decrypt a message.
B) the Data Encryption Standard is a symmetric key encryption system.
C) symmetric key cryptography is computationally slower.
D) symmetric key cryptography is a key element in digital envelopes.

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

What is the first step in developing an e-commerce security plan?


A) Create a security organization.
B) Develop a security policy.
C) Perform a risk assessment.
D) Perform a security audit.

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Showing 1 - 20 of 85

Related Exams

Show Answer