Filters
Question type

Study Flashcards

What is the first step in developing an e-commerce security plan?


A) Create a security organization.
B) Develop a security policy.
C) Perform a risk assessment.
D) Perform a security audit.

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

Apple Pay uses near field communication (NFC) chips.

A) True
B) False

Correct Answer

verifed

verified

________ text is text that has been encrypted and thus cannot be read by anyone other than the sender and the receiver.

Correct Answer

verifed

verified

A(n) ________ is a feature of viruses, worms, and Trojans that allows an attacker to remotely access a compromised computer.

Correct Answer

verifed

verified

What is the most frequent cause of stolen credit cards and card information today?


A) lost cards
B) the hacking and looting of corporate servers storing credit card information
C) sniffing programs
D) phishing attacks

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:


A) spyware.
B) a backdoor.
C) pupware.
D) adware.

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Showing 81 - 86 of 86

Related Exams

Show Answer