The communications lines in a client/server environment are specifically vulnerable to -
Answers Tapping
How do software vendors correct flaws in their software after it has been distributed? - Answers
They issue patches
The intentional defacement or destruction of a Web site is called - Answers cyber-vandalism
The HIPAA Act of 1996 - Answers outlines medical security and privacy rules
A Trojan horse - Answers is software that appears to be benign but does something other than
expected
Which of the following specifications replaces WEP with a stronger security standard that
features changing encryption keys? - Answers WPA2
________ controls ensure that valuable business data files on either disk or tape are not subject
to unauthorized access, change, or destruction while they are in use or in storage - Answers
Data security
Computer forensics tasks include all of the following except - Answers collecting physical
evidence on the computer
________ use scanning software to look for known problems such as bad passwords, the
removal of important files, security attacks in progress, and system administration errors -
Answers Intrusion detection systems
________ refers to policies, procedures, and technical measures used to prevent unauthorized
access, alteration, theft, or physical damage to information systems. - Answers "Security"
What standards are referred to when discussing universal standards as a unique feature of e-
commerce? - Answers common spoken and written languages
The effort required to locate a suitable product is called - Answers search costs
Reducing the business process layers in a distribution channel is called - Answers
disintermediation
What is the primary benefit to consumers of disintermediation? - Answers lower costs
eBay is an example of - Answers C2C e-commerce.
Market creators - Answers provide a digital environment where buyers and sellers can establish
prices for products.
Content providers use ________ systems to process large amounts of very small monetary