MISY 5350 E- Commerce Chapter 1-5
Study online at https://quizlet.com/_e2fx92
1.Next generation firewalls provide all of the following except:
A) an application-centric approach to firewall control.
B) the ability to identify applications regardless of the port, protocol,
or security evasion tools used.
C) the ability to automatically update applications on a client computer
with security patches.
D) the ability to identify users regardless of the device or IP address.: the
ability to automatically update applications on a client computer with
security patches.
2.Confidentiality is sometimes confused with:
A) privacy.
B) authenticity.
C) integrity.
D) nonrepudiation.: A
3. refers to the ability to ensure that e-commerce participants do
not deny their online actions.
A) Nonrepudiation
B) Authenticity
C) Availability
D) Integrity: A
4. refers to the ability to identify the person or entity with whom
you are dealing on the Internet.
A) Nonrepudiation
B) Authenticity
C) Availability
D) Integrity: B
5.Which of the following is an example of an integrity violation of e-
commerce security?
A) A website is not actually operated by the entity the customer believes it
to be. B) A merchant uses customer information in a manner not intended
by the customer. C) A customer denies that he or she is the person who
placed the order.
D) An unauthorized person intercepts an online communication and changes
its contents: D
6. refers to the ability to ensure that an e-commerce site
continues to function as intended.
A) Nonrepudiation
B) Authenticity
C) Availability
, MISY 5350 E- Commerce Chapter 1-5
Study online at https://quizlet.com/_e2fx92
D) Integrity: C
, MISY 5350 E- Commerce Chapter 1-5
Study online at https://quizlet.com/_e2fx92
7.6) Which of the following is an example of an online privacy violation?
A) your e-mail being read by a hacker
B) your online purchasing history being sold to other merchants without
your consent
C) your computer being used as part of a botnet
D) your e-mail being altered by a hacker: B
8.7) refers to the ability to ensure that messages and data are
only available to those authorized to view them.
A) Confidentiality
B) Integrity
C) Privacy
D) Availability: A
9.Which of the following is not a key factor for establishing e-
commerce security?
A) data integrity
B) technology
C) organizational policies
D) laws and industry standards: A
10.According to Ponemon Institute's 2019 survey, which of the following
was not among the causes of the costliest cybercrimes?
A) malicious insiders
B) web-based attacks
C) denial of service
D) botnets: botnet
11.Which of the following is a brute force attack which hackers launch via
botnets and automated tools using known user name and password
combi- nations?
A) credential stuffing
B) phishing
C) pharming
D) MitM attack: credential stuffing
12.Conficker is an example of a:
A) virus.
B) worm.
C) Trojan horse.
D) botnet.: worm
13.Accessing data without authorization on Dropbox is an example of a:
A) social network security issue.
B) cloud security issue.
, MISY 5350 E- Commerce Chapter 1-5
Study online at https://quizlet.com/_e2fx92
C) mobile platform security issue.
D) sniffing issue.: cloud security issue
14.Which of the following is the leading cause of data breaches?
A) theft of a computer
B) accidental disclosures
C) hackers
D) DDoS attacks: hackers
15.Software that is used to obtain private user information such as a
user's keystrokes or copies of e-mail is referred to as:
A) spyware.
B) a backdoor.
C) a browser parasite.
D) adware.: spyware
16.Which of the following technologies is aimed at reducing e-mail
address spoofing and phishing?
A) TLS
B) WPA
C) DMARC
D) MFA: DMARC
17.Which dimensions of security is spoofing a threat to?
A) integrity and confidentiality
B) availability and authenticity
C) integrity and authenticity
D) availability and integrity: integrity and authenticity
18.Which of the following is not an example of malicious code?
A) scareware
B) Trojan horse
C) bot
D) sniffer: sniffer
19.The attack against Dyn servers is an example of a(n):
A) SQL injection attack.
B) Browser parasite.
C) DDoS attack.
D) MitM attack.: DDos attack
20.Malware that comes with a downloaded file requested by a user is
called a:
A) Trojan horse.
B) backdoor.
Study online at https://quizlet.com/_e2fx92
1.Next generation firewalls provide all of the following except:
A) an application-centric approach to firewall control.
B) the ability to identify applications regardless of the port, protocol,
or security evasion tools used.
C) the ability to automatically update applications on a client computer
with security patches.
D) the ability to identify users regardless of the device or IP address.: the
ability to automatically update applications on a client computer with
security patches.
2.Confidentiality is sometimes confused with:
A) privacy.
B) authenticity.
C) integrity.
D) nonrepudiation.: A
3. refers to the ability to ensure that e-commerce participants do
not deny their online actions.
A) Nonrepudiation
B) Authenticity
C) Availability
D) Integrity: A
4. refers to the ability to identify the person or entity with whom
you are dealing on the Internet.
A) Nonrepudiation
B) Authenticity
C) Availability
D) Integrity: B
5.Which of the following is an example of an integrity violation of e-
commerce security?
A) A website is not actually operated by the entity the customer believes it
to be. B) A merchant uses customer information in a manner not intended
by the customer. C) A customer denies that he or she is the person who
placed the order.
D) An unauthorized person intercepts an online communication and changes
its contents: D
6. refers to the ability to ensure that an e-commerce site
continues to function as intended.
A) Nonrepudiation
B) Authenticity
C) Availability
, MISY 5350 E- Commerce Chapter 1-5
Study online at https://quizlet.com/_e2fx92
D) Integrity: C
, MISY 5350 E- Commerce Chapter 1-5
Study online at https://quizlet.com/_e2fx92
7.6) Which of the following is an example of an online privacy violation?
A) your e-mail being read by a hacker
B) your online purchasing history being sold to other merchants without
your consent
C) your computer being used as part of a botnet
D) your e-mail being altered by a hacker: B
8.7) refers to the ability to ensure that messages and data are
only available to those authorized to view them.
A) Confidentiality
B) Integrity
C) Privacy
D) Availability: A
9.Which of the following is not a key factor for establishing e-
commerce security?
A) data integrity
B) technology
C) organizational policies
D) laws and industry standards: A
10.According to Ponemon Institute's 2019 survey, which of the following
was not among the causes of the costliest cybercrimes?
A) malicious insiders
B) web-based attacks
C) denial of service
D) botnets: botnet
11.Which of the following is a brute force attack which hackers launch via
botnets and automated tools using known user name and password
combi- nations?
A) credential stuffing
B) phishing
C) pharming
D) MitM attack: credential stuffing
12.Conficker is an example of a:
A) virus.
B) worm.
C) Trojan horse.
D) botnet.: worm
13.Accessing data without authorization on Dropbox is an example of a:
A) social network security issue.
B) cloud security issue.
, MISY 5350 E- Commerce Chapter 1-5
Study online at https://quizlet.com/_e2fx92
C) mobile platform security issue.
D) sniffing issue.: cloud security issue
14.Which of the following is the leading cause of data breaches?
A) theft of a computer
B) accidental disclosures
C) hackers
D) DDoS attacks: hackers
15.Software that is used to obtain private user information such as a
user's keystrokes or copies of e-mail is referred to as:
A) spyware.
B) a backdoor.
C) a browser parasite.
D) adware.: spyware
16.Which of the following technologies is aimed at reducing e-mail
address spoofing and phishing?
A) TLS
B) WPA
C) DMARC
D) MFA: DMARC
17.Which dimensions of security is spoofing a threat to?
A) integrity and confidentiality
B) availability and authenticity
C) integrity and authenticity
D) availability and integrity: integrity and authenticity
18.Which of the following is not an example of malicious code?
A) scareware
B) Trojan horse
C) bot
D) sniffer: sniffer
19.The attack against Dyn servers is an example of a(n):
A) SQL injection attack.
B) Browser parasite.
C) DDoS attack.
D) MitM attack.: DDos attack
20.Malware that comes with a downloaded file requested by a user is
called a:
A) Trojan horse.
B) backdoor.