100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

MISY 5350 E- Commerce Chapter 1-5

Rating
-
Sold
-
Pages
42
Grade
A+
Uploaded on
21-01-2025
Written in
2024/2025

MISY 5350 E- Commerce Chapter 1-5

Institution
MISY 5350 E- Commerce Chapter 1-5
Course
MISY 5350 E- Commerce Chapter 1-5











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
MISY 5350 E- Commerce Chapter 1-5
Course
MISY 5350 E- Commerce Chapter 1-5

Document information

Uploaded on
January 21, 2025
Number of pages
42
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

MISY 5350 E- Commerce Chapter 1-5
Study online at https://quizlet.com/_e2fx92
1.Next generation firewalls provide all of the following except:
A) an application-centric approach to firewall control.
B) the ability to identify applications regardless of the port, protocol,
or security evasion tools used.
C) the ability to automatically update applications on a client computer
with security patches.
D) the ability to identify users regardless of the device or IP address.: the
ability to automatically update applications on a client computer with
security patches.
2.Confidentiality is sometimes confused with:
A) privacy.
B) authenticity.
C) integrity.
D) nonrepudiation.: A
3. refers to the ability to ensure that e-commerce participants do
not deny their online actions.
A) Nonrepudiation
B) Authenticity
C) Availability
D) Integrity: A
4. refers to the ability to identify the person or entity with whom
you are dealing on the Internet.
A) Nonrepudiation
B) Authenticity
C) Availability
D) Integrity: B
5.Which of the following is an example of an integrity violation of e-
commerce security?
A) A website is not actually operated by the entity the customer believes it
to be. B) A merchant uses customer information in a manner not intended
by the customer. C) A customer denies that he or she is the person who
placed the order.
D) An unauthorized person intercepts an online communication and changes
its contents: D
6. refers to the ability to ensure that an e-commerce site
continues to function as intended.
A) Nonrepudiation
B) Authenticity
C) Availability


, MISY 5350 E- Commerce Chapter 1-5
Study online at https://quizlet.com/_e2fx92
D) Integrity: C






, MISY 5350 E- Commerce Chapter 1-5
Study online at https://quizlet.com/_e2fx92
7.6) Which of the following is an example of an online privacy violation?
A) your e-mail being read by a hacker
B) your online purchasing history being sold to other merchants without
your consent
C) your computer being used as part of a botnet
D) your e-mail being altered by a hacker: B
8.7) refers to the ability to ensure that messages and data are
only available to those authorized to view them.
A) Confidentiality
B) Integrity
C) Privacy
D) Availability: A
9.Which of the following is not a key factor for establishing e-
commerce security?
A) data integrity
B) technology
C) organizational policies
D) laws and industry standards: A
10.According to Ponemon Institute's 2019 survey, which of the following
was not among the causes of the costliest cybercrimes?
A) malicious insiders
B) web-based attacks
C) denial of service
D) botnets: botnet
11.Which of the following is a brute force attack which hackers launch via
botnets and automated tools using known user name and password
combi- nations?
A) credential stuffing
B) phishing
C) pharming
D) MitM attack: credential stuffing
12.Conficker is an example of a:
A) virus.
B) worm.
C) Trojan horse.
D) botnet.: worm
13.Accessing data without authorization on Dropbox is an example of a:
A) social network security issue.
B) cloud security issue.


, MISY 5350 E- Commerce Chapter 1-5
Study online at https://quizlet.com/_e2fx92
C) mobile platform security issue.
D) sniffing issue.: cloud security issue
14.Which of the following is the leading cause of data breaches?
A) theft of a computer
B) accidental disclosures
C) hackers
D) DDoS attacks: hackers
15.Software that is used to obtain private user information such as a
user's keystrokes or copies of e-mail is referred to as:
A) spyware.
B) a backdoor.
C) a browser parasite.
D) adware.: spyware
16.Which of the following technologies is aimed at reducing e-mail
address spoofing and phishing?
A) TLS
B) WPA
C) DMARC
D) MFA: DMARC
17.Which dimensions of security is spoofing a threat to?
A) integrity and confidentiality
B) availability and authenticity
C) integrity and authenticity
D) availability and integrity: integrity and authenticity
18.Which of the following is not an example of malicious code?
A) scareware
B) Trojan horse
C) bot
D) sniffer: sniffer
19.The attack against Dyn servers is an example of a(n):
A) SQL injection attack.
B) Browser parasite.
C) DDoS attack.
D) MitM attack.: DDos attack
20.Malware that comes with a downloaded file requested by a user is
called a:
A) Trojan horse.
B) backdoor.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Registerednurse HAVARD UNIVERSITY
View profile
Follow You need to be logged in order to follow users or courses
Sold
20
Member since
1 year
Number of followers
3
Documents
4791
Last sold
1 month ago

3.0

2 reviews

5
0
4
0
3
2
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions