Deck 5: E-Commerce Security and Payment Systems

ملء الشاشة (f)
exit full mode
سؤال
Typically,the more security measures added to an e-commerce site,the slower and more difficult it becomes to use.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Confidentiality is sometimes confused with:

A)privacy.
B)authenticity.
C)integrity.
D)nonrepudiation.
سؤال
All of the following experienced high-profile data breaches in 2015 except:

A)CVS.
B)Walgreens.
C)Amazon.
D)Experian.
سؤال
______________ refers to the ability to ensure that e-commerce participants do not deny their online actions.

A)Nonrepudiation
B)Authenticity
C)Availability
D)Integrity
سؤال
Which of the following is an example of an online privacy violation?

A)your e-mail being read by a hacker
B)your online purchasing history being sold to other merchants without your consent
C)your computer being used as part of a botnet
D)your e-mail being altered by a hacker
سؤال
Bitcoins are an example of:

A)digital cash.
B)virtual currency.
C)a stored value payment system.
D)an EBPP system.
سؤال
______________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.

A)Nonrepudiation
B)Authenticity
C)Availability
D)Integrity
سؤال
The overall rate of online credit card fraud is ________ of all online card transactions.

A)less than 1%
B)around 5%
C)around 10%
D)around 15%
سؤال
Why is it difficult to accurately estimate the actual amount of cybercrime?
سؤال
Which of the following is the leading cause of data breaches?

A)theft of a computer
B)accidental disclosures
C)hackers
D)DDoS attacks
سؤال
All of the following are prominent hacktivist groups except:

A)Anonymous.
B)LulzSec.
C)Impact Team.
D)Avid Life.
سؤال
________ refers to the ability to ensure that messages and data are only available to those authorized to view them.

A)Confidentiality
B)Integrity
C)Privacy
D)Availability
سؤال
Which of the following is an example of an integrity violation of e-commerce security?

A)A website is not actually operated by the entity the customer believes it to be.
B)A merchant uses customer information in a manner not intended by the customer.
C)A customer denies that he or she is the person who placed the order.
D)An unauthorized person intercepts an online communication and changes its contents.
سؤال
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

A)spyware.
B)a backdoor.
C)browser parasite.
D)adware.
سؤال
What is the most frequent cause of stolen credit cards and card information today?

A)lost cards
B)the hacking and looting of corporate servers storing credit card information
C)sniffing programs
D)phishing attacks
سؤال
Conficker is an example of a:

A)virus.
B)worm.
C)Trojan horse.
D)botnet.
سؤال
Accessing data without authorization on Dropbox is an example of which of the following?

A)social network security issue
B)cloud security issue
C)mobile platform security issue
D)sniffing
سؤال
In 2016,Yahoo revealed that it had experienced which of the following?

A)a high-profile data breach
B)a DDoS attack that shut down its website
C)a hacktivist attack to protest its employment policies
D)a browser parasite
سؤال
Which of the following has the Internet Advertising Bureau urged advertisers to abandon?

A)HTML
B)HTML5
C)Adobe Flash
D)Adobe Acrobat
سؤال
____________ refers to the ability to ensure that an e-commerce site continues to function as intended.

A)Nonrepudiation
B)Authenticity
C)Availability
D)Integrity
سؤال
According to Ponemon Institute's 2015 survey,which of the following was not among the causes of the costliest cybercrimes?

A)malicious insiders
B)malicious code
C)denial of service
D)botnets
سؤال
________ typically attack governments,organizations,and sometimes individuals for political purposes.

A)Crackers
B)White hats
C)Grey hats
D)Hacktivists
سؤال
A Trojan horse appears to be benign,but then does something other than expected.
سؤال
Automatically redirecting a web link to a different address is an example of:

A)sniffing.
B)social engineering.
C)pharming.
D)DDoS attack.
سؤال
A worm does not need to be activated by a user for it to replicate itself.
سؤال
Vishing attacks exploit SMS messages.
سؤال
Which dimension(s)of security is spoofing a threat to?

A)integrity
B)availability
C)integrity and authenticity
D)availability and integrity
سؤال
Shellshock is an example of which of the following?

A)mobile malware
B)software vulnerability
C)botnet
D)Trojan horse
سؤال
Which of the following was designed to cripple Iranian nuclear centrifuges?

A)Stuxnet
B)Flame
C)Snake
D)Storm
سؤال
Factoring Attack on RSA-Export Keys (FREAK)is an example of a software vulnerability.
سؤال
Spoofing a website is a threat to the integrity of the website.
سؤال
______________ is not an example of malicious code.

A)Scareware
B)A Trojan horse
C)A bot
D)A sniffer
سؤال
Malware that comes with a downloaded file requested by a user is called a:

A)Trojan horse.
B)backdoor.
C)drive-by download.
D)PUP.
سؤال
What is the Internet of Things (IoT)and what security issues and challenges does it raise?
سؤال
Exploit kits are often rented or sold as a commercial product.
سؤال
Which of the following is not an example of a PUP?

A)adware
B)browser parasite
C)drive-by download
D)spyware
سؤال
Angler is an example of a:

A)worm.
B)exploit kit.
C)phishing.
D)hacktivism.
سؤال
The attack on Dyn,Twitter,Amazon,and other major organizations in October 2016,is an example of which of the following?

A)SQL injection attack
B)browser parasite
C)DDoS attack
D)MitM attack
سؤال
CryptoLocker is an example of ransomware.
سؤال
Phishing attacks rely on browser parasites.
سؤال
Which of the following statements is not true?

A)A VPN provides both confidentiality and integrity.
B)A VPN uses both authentication and encryption.
C)A VPN uses a dedicated secure line.
D)The primary use of VPNs is to establish secure communications among business partners.
سؤال
All the following statements about symmetric key cryptography are true except:

A)in symmetric key cryptography,both the sender and the receiver use the same key to encrypt and decrypt a message.
B)the Data Encryption Standard is a symmetric key encryption system.
C)symmetric key cryptography is computationally slower.
D)symmetric key cryptography is a key element in digital envelopes.
سؤال
Proxy servers are also known as:

A)firewalls.
B)application gateways.
C)dual home systems.
D)packet filters.
سؤال
An intrusion detection system can perform all of the following functions except:

A)examining network traffic.
B)setting off an alarm when suspicious activity is detected.
C)checking network traffic to see if it matches certain patterns or preconfigured rules.
D)blocking suspicious activity.
سؤال
A digital certificate contains all of the following except the:

A)subject's private key.
B)subject's public key.
C)digital signature of the certification authority.
D)digital certificate serial number.
سؤال
All of the following are methods of securing channels of communication except:

A)SSL/TLS.
B)certificates.
C)VPN.
D)FTP.
سؤال
Which of the following statements is not true?

A)Apple's Touch ID stores a user's actual fingerprint.
B)Biometric devices reduce the opportunity for spoofing.
C)A retina scan is an example of a biometric device.
D)Biometric data stored on an iPhone is encrypted.
سؤال
Describe the Great Cannon.Who developed it,how has it been used,and how does it differ from the Great Firewall?
سؤال
Which of the following is not an example of an access control?

A)firewalls
B)proxy servers
C)digital signatures
D)login passwords
سؤال
Discuss and explain malicious code threats and how they work.Include the different types of viruses.
سؤال
Symmetric key cryptography is also known as:

A)public key cryptography.
B)secret key cryptography.
C)PGP.
D)PKI.
سؤال
_____________ is the current standard used to protect Wi-Fi networks.

A)WEP
B)TLS
C)WPA2
D)WPA3
سؤال
All of the following statements about public key cryptography are true except:

A)public key cryptography uses two mathematically related digital keys.
B)public key cryptography ensures authentication of the sender.
C)public key cryptography does not ensure message integrity.
D)public key cryptography is based on the idea of irreversible mathematical functions.
سؤال
A ________ is hardware or software component that acts as a filter to prevent unwanted packets from entering a network.

A)firewall
B)virtual private network
C)proxy server
D)PPTP
سؤال
All of the following statements about PKI are true except:

A)the term PKI refers to the certification authorities and digital certificate procedures that are accepted by all parties.
B)PKI is not effective against insiders who have a legitimate access to corporate systems including customer information.
C)PKI guarantees that the verifying computer of the merchant is secure.
D)the acronym PKI stands for public key infrastructure.
سؤال
Next generation firewalls provide all of the following except:

A)an application-centric approach to firewall control.
B)the ability to identify applications regardless of the port,protocol,or security evasion tools used.
C)the ability to automatically update applications with security patches.
D)the ability to identify users regardless of the device or IP address.
سؤال
The Data Encryption Standard uses a(n)________-bit key.

A)8
B)56
C)256
D)512
سؤال
All of the following are used for authentication except:

A)digital signatures.
B)certificates of authority.
C)biometric devices.
D)packet filters.
سؤال
What is a sniffing attack and how does it differ from a MitM attack?
سؤال
Which of the following dimensions of e-commerce security does not involve encryption?

A)confidentiality
B)availability
C)message integrity
D)nonrepudiation
سؤال
PCI-DSS is a standard established by which of the following?

A)the banking industry
B)the credit card industry
C)the federal government
D)the retail industry
سؤال
All of the following statements about Apple Pay are true except which of the following?

A)Apple Pay is subject to recent regulations issued by the Bureau of Consumer Financial Protection applicable to GPR transactions.
B)Apple Pay is based on Touch ID biometric fingerprint scanning.
C)Apple Pay can be used for mobile payments at the point of sale at a physical store.
D)Apple Pay relies on NFC chip technology.
سؤال
To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents,you would use:

A)access controls.
B)an authorization management system.
C)security tokens.
D)an authorization policy.
سؤال
All of the following are limitations of the existing online credit card payment system except:

A)poor security.
B)cost to consumers.
C)cost to merchant.
D)social equity.
سؤال
Discuss the security of communications channels.Include definitions and explanations for the terms Secure Sockets Layer/Transport Layer Security (SSL/TLS),secure negotiated session,session key,and VPN.
سؤال
Apple Pay uses near field communication (NFC)chips.
سؤال
Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?

A)DES
B)NFC
C)IM
D)text messaging
سؤال
Explain the difference between symmetric key cryptography and public key cryptography.Which dimensions of e-commerce security does encryption address?
سؤال
PayPal is an example of a(n):

A)online stored value payment system.
B)digital checking system.
C)accumulating balance system.
D)digital credit card system.
سؤال
Which of the following is the most common protocol for securing a digital channel of communication?

A)DES
B)SSL/TLS
C)VPN
D)HTTP
سؤال
Linden Dollars,created for use in Second Life,are an example of:

A)digital cash.
B)virtual currency.
C)EBPP.
D)peer-to-peer payment systems.
سؤال
PayPal is the most popular alternative payment method in the United States.
سؤال
What dimensions do digital signatures and hash digests add to public key cryptography? Describe how this technology works.
سؤال
What is the first step in developing an e-commerce security plan?

A)Create a security organization.
B)Develop a security policy.
C)Perform a risk assessment.
D)Perform a security audit.
سؤال
Which of the following statements is not true?

A)Most states require companies that maintain personal data on their residents to publicly disclose when a security breach affecting those residents has occurred.
B)The USA Patriot Act broadly expanded law enforcement's investigative and surveillance powers.
C)The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates.
D)The Federal Trade Commission has asserted that it has authority over corporations' data security practices.
سؤال
SLS/TLS cannot provide irrefutability.
سؤال
A fingerprint scan is an example of which of the following?

A)biometrics
B)encryption
C)IDS
D)firewall
سؤال
The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.
سؤال
All of the following are examples of social/mobile peer-to-peer payment systems except:

A)Venmo.
B)Bill Me Later.
C)Square Cash.
D)Google Wallet.
سؤال
Which of the following is not a major trend in e-commerce payments in 2016-2017?

A)Mobile retail payment volume decreases.
B)PayPal remains the most popular alternative payment method.
C)Google refocuses Google Wallet solely on sending and receiving money.
D)Payment by credit and/or debit card remains the dominant form of online payment.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/85
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 5: E-Commerce Security and Payment Systems
1
Typically,the more security measures added to an e-commerce site,the slower and more difficult it becomes to use.
True
2
Confidentiality is sometimes confused with:

A)privacy.
B)authenticity.
C)integrity.
D)nonrepudiation.
A
3
All of the following experienced high-profile data breaches in 2015 except:

A)CVS.
B)Walgreens.
C)Amazon.
D)Experian.
C
4
______________ refers to the ability to ensure that e-commerce participants do not deny their online actions.

A)Nonrepudiation
B)Authenticity
C)Availability
D)Integrity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is an example of an online privacy violation?

A)your e-mail being read by a hacker
B)your online purchasing history being sold to other merchants without your consent
C)your computer being used as part of a botnet
D)your e-mail being altered by a hacker
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
6
Bitcoins are an example of:

A)digital cash.
B)virtual currency.
C)a stored value payment system.
D)an EBPP system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
7
______________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.

A)Nonrepudiation
B)Authenticity
C)Availability
D)Integrity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
8
The overall rate of online credit card fraud is ________ of all online card transactions.

A)less than 1%
B)around 5%
C)around 10%
D)around 15%
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
9
Why is it difficult to accurately estimate the actual amount of cybercrime?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following is the leading cause of data breaches?

A)theft of a computer
B)accidental disclosures
C)hackers
D)DDoS attacks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
11
All of the following are prominent hacktivist groups except:

A)Anonymous.
B)LulzSec.
C)Impact Team.
D)Avid Life.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
12
________ refers to the ability to ensure that messages and data are only available to those authorized to view them.

A)Confidentiality
B)Integrity
C)Privacy
D)Availability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following is an example of an integrity violation of e-commerce security?

A)A website is not actually operated by the entity the customer believes it to be.
B)A merchant uses customer information in a manner not intended by the customer.
C)A customer denies that he or she is the person who placed the order.
D)An unauthorized person intercepts an online communication and changes its contents.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
14
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

A)spyware.
B)a backdoor.
C)browser parasite.
D)adware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
15
What is the most frequent cause of stolen credit cards and card information today?

A)lost cards
B)the hacking and looting of corporate servers storing credit card information
C)sniffing programs
D)phishing attacks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
16
Conficker is an example of a:

A)virus.
B)worm.
C)Trojan horse.
D)botnet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
17
Accessing data without authorization on Dropbox is an example of which of the following?

A)social network security issue
B)cloud security issue
C)mobile platform security issue
D)sniffing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
18
In 2016,Yahoo revealed that it had experienced which of the following?

A)a high-profile data breach
B)a DDoS attack that shut down its website
C)a hacktivist attack to protest its employment policies
D)a browser parasite
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following has the Internet Advertising Bureau urged advertisers to abandon?

A)HTML
B)HTML5
C)Adobe Flash
D)Adobe Acrobat
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
20
____________ refers to the ability to ensure that an e-commerce site continues to function as intended.

A)Nonrepudiation
B)Authenticity
C)Availability
D)Integrity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
21
According to Ponemon Institute's 2015 survey,which of the following was not among the causes of the costliest cybercrimes?

A)malicious insiders
B)malicious code
C)denial of service
D)botnets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
22
________ typically attack governments,organizations,and sometimes individuals for political purposes.

A)Crackers
B)White hats
C)Grey hats
D)Hacktivists
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
23
A Trojan horse appears to be benign,but then does something other than expected.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
24
Automatically redirecting a web link to a different address is an example of:

A)sniffing.
B)social engineering.
C)pharming.
D)DDoS attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
25
A worm does not need to be activated by a user for it to replicate itself.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
26
Vishing attacks exploit SMS messages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
27
Which dimension(s)of security is spoofing a threat to?

A)integrity
B)availability
C)integrity and authenticity
D)availability and integrity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
28
Shellshock is an example of which of the following?

A)mobile malware
B)software vulnerability
C)botnet
D)Trojan horse
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
29
Which of the following was designed to cripple Iranian nuclear centrifuges?

A)Stuxnet
B)Flame
C)Snake
D)Storm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
30
Factoring Attack on RSA-Export Keys (FREAK)is an example of a software vulnerability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
31
Spoofing a website is a threat to the integrity of the website.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
32
______________ is not an example of malicious code.

A)Scareware
B)A Trojan horse
C)A bot
D)A sniffer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
33
Malware that comes with a downloaded file requested by a user is called a:

A)Trojan horse.
B)backdoor.
C)drive-by download.
D)PUP.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
34
What is the Internet of Things (IoT)and what security issues and challenges does it raise?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
35
Exploit kits are often rented or sold as a commercial product.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
36
Which of the following is not an example of a PUP?

A)adware
B)browser parasite
C)drive-by download
D)spyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
37
Angler is an example of a:

A)worm.
B)exploit kit.
C)phishing.
D)hacktivism.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
38
The attack on Dyn,Twitter,Amazon,and other major organizations in October 2016,is an example of which of the following?

A)SQL injection attack
B)browser parasite
C)DDoS attack
D)MitM attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
39
CryptoLocker is an example of ransomware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
40
Phishing attacks rely on browser parasites.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
41
Which of the following statements is not true?

A)A VPN provides both confidentiality and integrity.
B)A VPN uses both authentication and encryption.
C)A VPN uses a dedicated secure line.
D)The primary use of VPNs is to establish secure communications among business partners.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
42
All the following statements about symmetric key cryptography are true except:

A)in symmetric key cryptography,both the sender and the receiver use the same key to encrypt and decrypt a message.
B)the Data Encryption Standard is a symmetric key encryption system.
C)symmetric key cryptography is computationally slower.
D)symmetric key cryptography is a key element in digital envelopes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
43
Proxy servers are also known as:

A)firewalls.
B)application gateways.
C)dual home systems.
D)packet filters.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
44
An intrusion detection system can perform all of the following functions except:

A)examining network traffic.
B)setting off an alarm when suspicious activity is detected.
C)checking network traffic to see if it matches certain patterns or preconfigured rules.
D)blocking suspicious activity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
45
A digital certificate contains all of the following except the:

A)subject's private key.
B)subject's public key.
C)digital signature of the certification authority.
D)digital certificate serial number.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
46
All of the following are methods of securing channels of communication except:

A)SSL/TLS.
B)certificates.
C)VPN.
D)FTP.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
47
Which of the following statements is not true?

A)Apple's Touch ID stores a user's actual fingerprint.
B)Biometric devices reduce the opportunity for spoofing.
C)A retina scan is an example of a biometric device.
D)Biometric data stored on an iPhone is encrypted.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
48
Describe the Great Cannon.Who developed it,how has it been used,and how does it differ from the Great Firewall?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
49
Which of the following is not an example of an access control?

A)firewalls
B)proxy servers
C)digital signatures
D)login passwords
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
50
Discuss and explain malicious code threats and how they work.Include the different types of viruses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
51
Symmetric key cryptography is also known as:

A)public key cryptography.
B)secret key cryptography.
C)PGP.
D)PKI.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
52
_____________ is the current standard used to protect Wi-Fi networks.

A)WEP
B)TLS
C)WPA2
D)WPA3
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
53
All of the following statements about public key cryptography are true except:

A)public key cryptography uses two mathematically related digital keys.
B)public key cryptography ensures authentication of the sender.
C)public key cryptography does not ensure message integrity.
D)public key cryptography is based on the idea of irreversible mathematical functions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
54
A ________ is hardware or software component that acts as a filter to prevent unwanted packets from entering a network.

A)firewall
B)virtual private network
C)proxy server
D)PPTP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
55
All of the following statements about PKI are true except:

A)the term PKI refers to the certification authorities and digital certificate procedures that are accepted by all parties.
B)PKI is not effective against insiders who have a legitimate access to corporate systems including customer information.
C)PKI guarantees that the verifying computer of the merchant is secure.
D)the acronym PKI stands for public key infrastructure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
56
Next generation firewalls provide all of the following except:

A)an application-centric approach to firewall control.
B)the ability to identify applications regardless of the port,protocol,or security evasion tools used.
C)the ability to automatically update applications with security patches.
D)the ability to identify users regardless of the device or IP address.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
57
The Data Encryption Standard uses a(n)________-bit key.

A)8
B)56
C)256
D)512
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
58
All of the following are used for authentication except:

A)digital signatures.
B)certificates of authority.
C)biometric devices.
D)packet filters.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
59
What is a sniffing attack and how does it differ from a MitM attack?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
60
Which of the following dimensions of e-commerce security does not involve encryption?

A)confidentiality
B)availability
C)message integrity
D)nonrepudiation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
61
PCI-DSS is a standard established by which of the following?

A)the banking industry
B)the credit card industry
C)the federal government
D)the retail industry
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
62
All of the following statements about Apple Pay are true except which of the following?

A)Apple Pay is subject to recent regulations issued by the Bureau of Consumer Financial Protection applicable to GPR transactions.
B)Apple Pay is based on Touch ID biometric fingerprint scanning.
C)Apple Pay can be used for mobile payments at the point of sale at a physical store.
D)Apple Pay relies on NFC chip technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
63
To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents,you would use:

A)access controls.
B)an authorization management system.
C)security tokens.
D)an authorization policy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
64
All of the following are limitations of the existing online credit card payment system except:

A)poor security.
B)cost to consumers.
C)cost to merchant.
D)social equity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
65
Discuss the security of communications channels.Include definitions and explanations for the terms Secure Sockets Layer/Transport Layer Security (SSL/TLS),secure negotiated session,session key,and VPN.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
66
Apple Pay uses near field communication (NFC)chips.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
67
Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?

A)DES
B)NFC
C)IM
D)text messaging
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
68
Explain the difference between symmetric key cryptography and public key cryptography.Which dimensions of e-commerce security does encryption address?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
69
PayPal is an example of a(n):

A)online stored value payment system.
B)digital checking system.
C)accumulating balance system.
D)digital credit card system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
70
Which of the following is the most common protocol for securing a digital channel of communication?

A)DES
B)SSL/TLS
C)VPN
D)HTTP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
71
Linden Dollars,created for use in Second Life,are an example of:

A)digital cash.
B)virtual currency.
C)EBPP.
D)peer-to-peer payment systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
72
PayPal is the most popular alternative payment method in the United States.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
73
What dimensions do digital signatures and hash digests add to public key cryptography? Describe how this technology works.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
74
What is the first step in developing an e-commerce security plan?

A)Create a security organization.
B)Develop a security policy.
C)Perform a risk assessment.
D)Perform a security audit.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
75
Which of the following statements is not true?

A)Most states require companies that maintain personal data on their residents to publicly disclose when a security breach affecting those residents has occurred.
B)The USA Patriot Act broadly expanded law enforcement's investigative and surveillance powers.
C)The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates.
D)The Federal Trade Commission has asserted that it has authority over corporations' data security practices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
76
SLS/TLS cannot provide irrefutability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
77
A fingerprint scan is an example of which of the following?

A)biometrics
B)encryption
C)IDS
D)firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
78
The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
79
All of the following are examples of social/mobile peer-to-peer payment systems except:

A)Venmo.
B)Bill Me Later.
C)Square Cash.
D)Google Wallet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
80
Which of the following is not a major trend in e-commerce payments in 2016-2017?

A)Mobile retail payment volume decreases.
B)PayPal remains the most popular alternative payment method.
C)Google refocuses Google Wallet solely on sending and receiving money.
D)Payment by credit and/or debit card remains the dominant form of online payment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 85 في هذه المجموعة.