click below
click below
Normal Size Small Size show me how
Mana 4345 ch 5 quiz
test like questions from ecommerce 2012 8/e
| Question | Answer |
|---|---|
| Most complaints to the Internet Crime Complaint Center in 2010 involved: | non-delivery of payment/merchandise |
| The Computer Security Institute reported in its 2010 survey that approximately ________ percent of responding organizations detected breaches of computer security within the previous 12 months. | 46% |
| What types of Internet fraud resulted in the highest loss per incident according to the IC3? | non-delivery |
| What is the most common type of attack against computer systems? | Malware infection |
| The research firm Cybersource estimates online credit card fraud in the United States amounted to approximately ________ in 2010. | $2.7 billion |
| The overall rate of online credit card fraud is about ________ percent of all online card transactions. | .9% |
| The six key dimensions to e-commerce security are: nonrepudiation, authenticity, availability, integrity, privacy, and: | confidentiality. |
| ________ refers to the ability to ensure that e-commerce participants do not deny their online actions. | Nonrepudiation |
| What is an example of an integrity violation of e-commerce security? | An unauthorized person intercepts an online communication and changes its contents |
| ________ refers to the ability to identify the person or entity with whom you are dealing on the Internet. | Authenticity |
| ________ refers to the ability to ensure that an e-commerce site continues to function as intended. | Availability |
| What are some key points of vulnerability when dealing with e-commerce? | internet communications, servers, and clients |
| What are some file types most likely to be infected by a file-infecting virus: | .exe, .dll, and .drv |
| What are some file types likely to be infected by a macro virus: | .doc, .xls, and .ppt. |
| The Slammer worm targeted a known vulnerability in: | Microsoft SQL Server database software. |
| Botnets are used for many activities including: | sending spam, DDoS attacks, stealing information, and storing network traffic for later analysis |
| Netsky.P is an example of a: | worm/Trojan horse. |
| Software that is used to obtain private user information such as user's keystrokes or copies of e-mail is referred to as: | spyware |
| What is the most frequent cause of stolen credit cards and card information today? | systematic hacking and looting of corporate servers |
| What dimension(s) of security is(are) spoofing a threat to? | integrity and authenticity |
| Examples of malicious code include: | viruses, bots, worms. |
| Symmetric key encryption is also known as: | secret key encryption |
| With symmetric key encryption | both the sender and the receiver use the same key to encrypt and decrypt a message |
| The Data Encryption Standard uses a(n) ________-bit key. | 56 |
| public key encryption uses: | two mathematically related digital keys, public key encryption is based on the idea of irreversible mathematical functions. public key encryption does not ensure message integrity |
| If you used a symmetric key encryption for large documents, with public key encryption to encrypt and send the symmetric key, you would be using a digital: | envelope. |
| the acronym PKI stands for public key infrastructure what are some additional facts about PKI: | the term PKI refers to the certification authorities and digital certificate procedures that are accepted by all parties, is not effective against insiders who have a legitimate access to corporate systems including customer information |
| A digital certificate contains: | subject's public key, digital certificate serial number, digital signature of the certification authority |
| SSL is available in what levels? | 40-bit and 128-bit |
| What are methods of securing channels of communication: | Secure Sockets Layer (SSL), Virtual Private Networks (VPN) |
| A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network. | firewall |
| What are used for authentication: | digital signatures, certificates of authority, biometric devices |
| Proxy servers are also known as: | dual home systems |
| What is the first step in developing an e-commerce security plan? | Perform a risk assessment. |
| What are examples of access controls? | Firewalls, proxy servers, login procedures |
| What is the last step in developing an e-commerce security plan? | Perform a security audit. |
| ________ is a private organization that monitors and tracks online criminal activity reported to it by private corporations and government agencies. | CERT Coordination Center |
| What law makes DoS attacks illegal? | National Information Infrastructure Protection Act |
| What are features of cash: | it is instantly convertible into other forms of value without intermediation, it requires no authentication, it is anonymous. |
| The most common payment system based on the number of transactions is: | cash. |
| P2P payment systems are a variation on what type of payment system? | (Peer-to-peer) stored value payment system i.e. PayPal |
| What are the facts about debit cards: | debit cards eliminate the need for consumers to write a paper check when making a purchase, debit cards do not have the protections provided by Regulation Z to credit cards, debit cards do not provide any float |
| What are examples of stored value payment systems: | gift certificates, prepaid cards, smart cards, and debit cards |
| What payment systems offers immediate monetary value: | stored value/debit card |
| What payment systems provide some security against unauthorized use: | personal checks, debit cards, accumulating balance. |
| Both cash and personal checks share what characteristics? | low fixed costs for merchant |
| What are limitations of the existing online credit card payment system: | social equity, poor security, and cost to merchant |
| Which of the following is best suited for processing micropayments? | digital accumulating balance payment system |