Filters
Question type

Study Flashcards

All of the following statements about public key encryption are true except:


A) Public key encryption uses two mathematically related digital keys.
B) Public key encryption ensures authentication of the sender.
C) Public key encryption does not ensure message integrity.
D) Public key encryption is based on the idea of irreversible mathematical functions.

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

All the following statements about symmetric key encryption are true except:


A) In symmetric key encryption, both the sender and the receiver use the same key to encrypt and decrypt a message.
B) The Data Encryption Standard is a symmetric key encryption system.
C) Symmetric key encryption is computationally slower.
D) Symmetric key encryption is a key element in digital envelopes.

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

A(n) ________ vulnerability involves a vulnerability unknown to security experts that is actively exploited before there is a patch available.

Correct Answer

verifed

verified

All of the following statements about debit cards are true except:


A) Debit cards eliminate the need for consumers to write a paper check when making a purchase.
B) Debit cards enable consumers to make purchases even if they do not have sufficient funds at the time of purchase.
C) Debit cards do not provide any float.
D) Debit cards do not have the protections provided by Regulation Z to credit cards.

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

________ refers to the ability to ensure that information being displayed on a Web site, or transmitted or received over the Internet, has not been altered in any way by an unauthorized party.

Correct Answer

verifed

verified

Define and explain how EBPP systems work. Describe each of the main EBPP business models.

Correct Answer

verifed

verified

EBPP refers to electronic billing presen...

View Answer

Typically, the more security measures added to a Web site, the slower and more difficult it becomes to use.

A) True
B) False

Correct Answer

verifed

verified

All of the following are examples of stored value payment systems except:


A) smart cards.
B) credit cards.
C) gift certificates.
D) prepaid cards.

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

All of the following statements about PKI are true except:


A) The term PKI refers to the certification authorities and digital certificate procedures that are accepted by all parties.
B) PKI is not effective against insiders who have a legitimate access to corporate systems including customer information.
C) PKI guarantees that the verifying computer of the merchant is secure.
D) The acronym PKI stands for public key infrastructure.

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other?


A) DES
B) NFC
C) IM
D) text messaging

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

To allow employees to connect securely over the Internet to their corporate network, you would use a(n) ________

Correct Answer

verifed

verified

VPN, virtu...

View Answer

Which of the following is not a key point of vulnerability when dealing with e-commerce?


A) the client computer
B) the server
C) the communications pipeline
D) the credit card companies

E) None of the above
F) All of the above

Correct Answer

verifed

verified

What is the first step in developing an e-commerce security plan?


A) Create a security organization.
B) Develop a security policy.
C) Perform a risk assessment.
D) Perform a security audit.

E) A) and C)
F) B) and D)

Correct Answer

verifed

verified

What is the most frequent cause of stolen credit cards and card information today?


A) lost cards
B) the hacking and looting of corporate servers storing credit card information
C) sniffing programs
D) phishing attacks

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

B

What is the last step in developing an e-commerce security plan?


A) Perform a security audit.
B) Develop an implementation plan.
C) Create a security organization.
D) Develop a security policy.

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

A

To internal computers, a proxy server is known as the ________.

Correct Answer

verifed

verified

Insiders present a greater security threat to e-commerce sites than outsiders.

A) True
B) False

Correct Answer

verifed

verified

A(n) ________ is a type of firewall that filters communications based on the application being requested.

Correct Answer

verifed

verified

application gateway

All of the following are methods of securing channels of communication except:


A) SSL/TLS.
B) certificates.
C) VPN.
D) FTP.

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

If you used a symmetric key encryption for large documents, with public key encryption to encrypt and send the symmetric key, you would be using a digital:


A) envelope.
B) signature.
C) certificate.
D) hash.

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

Showing 1 - 20 of 86

Related Exams

Show Answer