Deck 9: Electronic Commerce Security and Fraud Protection
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/44
العب
ملء الشاشة (f)
Deck 9: Electronic Commerce Security and Fraud Protection
1
According to the CSI Computer Crime and Security Survey, firewalls were the most commonly used defense technologies in 2008.
False
2
According to the CSI Computer Crime Security Survey, the most frequently occurring computer attacks were from viruses in 2008.
True
3
The Internet and its network protocols were never intended for use by untrustworthy people or criminals.
True
4
The motives of hackers have shifted from the desire for fame and notoriety to advancing personal and political agendas.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
5
Keystroke logging captures and records user keystrokes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
6
Information security departments with huge workloads and limited budgets optimize their EC security programs for efficiency and tend to work strategically.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
7
Cybercrimes are intentional crimes carried out on the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
8
Propagation method and payload are the two components of a virus.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
9
Worms cannot spread via instant messages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
10
Honeypots are blogs created solely for marketing purposes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
11
Confidentiality, integrity, and awareness are the three components of the CIA security triad.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
12
Access control involves authorization and authentication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
13
Encryption algorithm is the mathematical formula used to encrypt plaintext into ciphertext, and vice versa.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
14
Strong EC security makes online shopping more convenient for customers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
15
Preventing vulnerability during the EC design and pre-implementation stage is far more expensive than mitigating problems later.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following is the underlying reason why comprehensive EC security is necessary?
A) The Internet was designed for maximum efficiency without regard for its security or users with malicious intent.
B) The shift toward profit-motivated crimes
C) Security costs and efforts from reacting to crises and paying for damages are greater than if an EC strategy is in place.
D) Many companies fail to implement basic IT security management best practices, business continuity plans, and disaster recovery plans.
A) The Internet was designed for maximum efficiency without regard for its security or users with malicious intent.
B) The shift toward profit-motivated crimes
C) Security costs and efforts from reacting to crises and paying for damages are greater than if an EC strategy is in place.
D) Many companies fail to implement basic IT security management best practices, business continuity plans, and disaster recovery plans.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
17
A botnet is
A) a huge number of hijacked Internet computers that have been set up to forward traffic, including spam and viruses, to other computers on the Internet.
B) a piece of software code that inserts itself into a host or operating system to launch DOS attacks.
C) a piece of code in a worm that spreads rapidly and exploits some known vulnerability.
D) a production system that looks like it does real work, but that acts as a decoy and is watched to study how network intrusions occur.
A) a huge number of hijacked Internet computers that have been set up to forward traffic, including spam and viruses, to other computers on the Internet.
B) a piece of software code that inserts itself into a host or operating system to launch DOS attacks.
C) a piece of code in a worm that spreads rapidly and exploits some known vulnerability.
D) a production system that looks like it does real work, but that acts as a decoy and is watched to study how network intrusions occur.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
18
________ is the criminal, fraudulent process of attempting to acquire confidential information by masquerading as a trustworthy entity.
A) Spamming
B) Pretexting
C) Social engineering
D) Phishing
A) Spamming
B) Pretexting
C) Social engineering
D) Phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
19
The mechanism that determines who can legitimately use a network resource best describes
A) access control.
B) confidentiality.
C) key encryption.
D) digital envelope.
A) access control.
B) confidentiality.
C) key encryption.
D) digital envelope.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
20
Each of the following is a true statement about access control except:
A) Access control determines which persons, programs, or machines can legitimately use a network resource and which resources he, she,or it can use.
B) Access control lists (ACLs) define users' rights, such as what they are allowed to read, view, write, print, copy, delete, execute, modify, or move.
C) All resources need to be considered together to identify the rights of users or categories of users.
D) After a user has been identified, the user must be authenticated.
A) Access control determines which persons, programs, or machines can legitimately use a network resource and which resources he, she,or it can use.
B) Access control lists (ACLs) define users' rights, such as what they are allowed to read, view, write, print, copy, delete, execute, modify, or move.
C) All resources need to be considered together to identify the rights of users or categories of users.
D) After a user has been identified, the user must be authenticated.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
21
Encryption components include each of the following except
A) encryption algorithm.
B) key value.
C) ciphertext.
D) internal control environment.
A) encryption algorithm.
B) key value.
C) ciphertext.
D) internal control environment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
22
A scheme for securing e-payments using public key encryption and various technical components best describes
A) message digesting.
B) Data Encryption Standard.
C) public key infrastructure.
D) key space.
A) message digesting.
B) Data Encryption Standard.
C) public key infrastructure.
D) key space.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
23
A method of encryption that uses a pair of matched keys, including a public key to encrypt a message and a private key to decrypt it, describes
A) data encryption standard.
B) public asymmetric key encryption.
C) symmetric private key encryption.
D) paired key encryption.
A) data encryption standard.
B) public asymmetric key encryption.
C) symmetric private key encryption.
D) paired key encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
24
Security functions or characteristics of digital signatures include each of the following except:
A) A digital signature is the electronic equivalent of a personal signature, which can be forged.
B) Digital signatures are based on public keys for authenticating the identity of the sender of a message or document.
C) Digital signatures ensure that the original content of an electronic message or document is unchanged.
D) Digital signatures are portable.
A) A digital signature is the electronic equivalent of a personal signature, which can be forged.
B) Digital signatures are based on public keys for authenticating the identity of the sender of a message or document.
C) Digital signatures ensure that the original content of an electronic message or document is unchanged.
D) Digital signatures are portable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
25
The combination of the encrypted original message and the digital signature, using the recipient's public key, best describes
A) digital envelope.
B) message digest.
C) hash.
D) digital signature.
A) digital envelope.
B) message digest.
C) hash.
D) digital signature.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which of the following is not an advantage of virtual private networks (VPN) for data communications?
A) They are less expensive than private leased lines because they use the public Internet to carry information.
B) They ensure the confidentiality and integrity of the data transmitted over the Internet without requiring encryption.
C) They can reduce communication costs dramatically because VPN equipment is cheaper than other remote solutions.
D) Remote users can use broadband connections rather than make long distance calls to access an organization's private network.
A) They are less expensive than private leased lines because they use the public Internet to carry information.
B) They ensure the confidentiality and integrity of the data transmitted over the Internet without requiring encryption.
C) They can reduce communication costs dramatically because VPN equipment is cheaper than other remote solutions.
D) Remote users can use broadband connections rather than make long distance calls to access an organization's private network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
27
A special category of software that can monitor activity across a network or on a host computer, watch for suspicious activity, and take automated action based on what it sees best describes
A) honeynet.
B) intrusion detection system.
C) firewall.
D) virtual private network.
A) honeynet.
B) intrusion detection system.
C) firewall.
D) virtual private network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
28
Which of the following are controls established to protect the system regardless of the application?
A) general controls
B) application controls
C) broad controls
D) systems controls
A) general controls
B) application controls
C) broad controls
D) systems controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
29
Software applications that have some degree of reactivity, autonomy, and adaptability best describes
A) EC avatars.
B) EC bots.
C) worms.
D) intelligent agents.
A) EC avatars.
B) EC bots.
C) worms.
D) intelligent agents.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
30
The work atmosphere that a company sets for its employees describes
A) acceptable use policy.
B) internal control environment.
C) internal politics.
D) standard of due care.
A) acceptable use policy.
B) internal control environment.
C) internal politics.
D) standard of due care.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
31
A law that makes it a crime to send commercial e-mail messages with false or misleading message headers or misleading subject lines is
A) EEA.
B) DCMA.
C) SSL.
D) CAN-SPAM.
A) EEA.
B) DCMA.
C) SSL.
D) CAN-SPAM.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
32
According to an InformationWeek survey, the majority of security challenges for corporations include
A) managing the complexity of security.
B) preventing data breaches from outside attackers.
C) enforcing security policies.
D) all of the above.
A) managing the complexity of security.
B) preventing data breaches from outside attackers.
C) enforcing security policies.
D) all of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
33
Which of the following is a policy that informs users of their responsibilities when using company networks, wireless devices, and customer data?
A) business impact analysis
B) business plan
C) acceptable use policy
D) EC security program
A) business impact analysis
B) business plan
C) acceptable use policy
D) EC security program
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
34
The key reasons why EC criminals cannot be stopped include each of the following except:
A) Sophisticated hackers use browsers to crack into Web sites.
B) Strong EC security makes online shopping inconvenient and demanding on customers.
C) There is lack of cooperation from credit card issuers and foreign ISPs.
D) Online shoppers do not take necessary precautions to avoid becoming a victim.
A) Sophisticated hackers use browsers to crack into Web sites.
B) Strong EC security makes online shopping inconvenient and demanding on customers.
C) There is lack of cooperation from credit card issuers and foreign ISPs.
D) Online shoppers do not take necessary precautions to avoid becoming a victim.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
35
Computer security categories include ________, ________, and ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
36
A ________ is a plan that keeps the business running after a disaster occurs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
37
________ are computers infected with malware that are under the control of a spammer, hacker, or other criminal.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
38
________ are weaknesses in software or other mechanisms that threaten the confidentiality, integrity, or availability of an asset.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
39
A ________ is a malicious hacker who may represent a serious problem for a corporation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
40
________ is the protection of information systems against unauthorized access to or modification of information whether in storage, processing, or in transit, and against the denial of service to authorized users, including those measures necessary to detect, document, and counter such threats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
41
A ________ attack is an attack on a Web site in which an attacker uses specialized software to send a flood of data packets to the target computer with the aim of overloading its resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
42
List the six major objectives of EC defense strategies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
43
Briefly discuss the five encryption components.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck
44
Briefly describe four major components for protecting internal information flow inside an organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 44 في هذه المجموعة.
فتح الحزمة
k this deck

