Chapter 9 and chapter 10 quizzes
Chapter 9
Test | Quiz_09 |
Started | 12/12/16 5:18 PM |
Submitted | 12/12/16 5:22 PM |
Status | Completed |
Attempt Score | 9.5 out of 10 points |
Time Elapsed | 4 minutes out of 40 minutes |
Results Displayed | Submitted Answers, Correct Answers |
- Question 1
0.5 out of 0.5 points
Confidentiality, integrity, and awareness are the three components of the CIA security triad. | |||||||
|
- Question 2
0.5 out of 0.5 points
A method used to ensure confidentiality and integrity of data transmitted over the Internet by encrypting data packets, sending them in packets across the Internet, and decrypting them at the destination address best describes | |||||||
|
- Question 3
0.5 out of 0.5 points
A botnet is | |||||||
|
- Question 4
0.5 out of 0.5 points
According to the CSI Computer Crime and Security Survey, firewalls were the most commonly used defense technologies in 2008. | |||||||
|
- Question 5
0.5 out of 0.5 points
Access control involves authorization and authentication. | |||||||
|
- Question 6
0.5 out of 0.5 points
The probability that a vulnerability will be known and used best describes | |||||||
|
- Question 7
0.5 out of 0.5 points
A summary of a message, converted into a string of digits after the hash has been applied, best describes | |||||||
|
- Question 8
0.5 out of 0.5 points
A special category of software that can monitor activity across a network or on a host computer, watch for suspicious activity, and take automated action based on what it sees best describes | |||||||
|
- Question 9
0.5 out of 0.5 points
The success and security of EC is measured by | |||||||
|
- Question 10
0.5 out of 0.5 points
Assurance that stored data has not been modified without authorization and a message that was sent is the same message that was received is referred to as | |||||||
|
- Question 11
0.5 out of 0.5 points
The process of verifying the real identity of an individual, computer, computer program, or EC Web site best describes | |||||||
|
- Question 12
0.5 out of 0.5 points
Fingerprint scanners, facial recognition systems, and voice recognition are examples of ________ that recognize a person by some physical trait. | |||||||
|
- Question 13
0.5 out of 0.5 points
The protection of information systems against unauthorized access to or modification of information that is stored, processed, or being sent over a network is referred to as | |||||||
|
- Question 14
0.5 out of 0.5 points
A law that makes it a crime to send commercial e-mail messages with false or misleading message headers or misleading subject lines is | |||||||
|
- Question 15
0.5 out of 0.5 points
Keystroke logging captures and records user keystrokes. | |||||||
|
- Question 16
0.5 out of 0.5 points
A method of evaluating the security of a computer system or a network by simulating an attack from a malicious source best describes | |||||||
|
- Question 17
0.5 out of 0.5 points
Which of the following is not an advantage of virtual private networks (VPN) for data communications? | |||||||
|
- Question 18
0.5 out of 0.5 points
Which of the following is the underlying reason why comprehensive EC security is necessary? | |||||||
|
- Question 19
0 out of 0.5 points
Due care in EC is those actions that a company is reasonably expected to take based on the risks affecting its business and transactions. | |||||||
|
- Question 20
0.5 out of 0.5 points
Internet fraud has grown even faster than the Internet itself. | |||||||
|
Chapter 10
- Question 1
0.5 out of 0.5 points
A smart card containing a small gold plate on the face that when inserted in a smart card reader makes contact and passes data to and from the embedded microchip is a | |||||||
|
- Question 2
0.5 out of 0.5 points
Costs associated with fraudulent transactions include | |||||||
|
- Question 3
0.5 out of 0.5 points
Key tools used in combating fraud include | |||||||
|
- Question 4
0.5 out of 0.5 points
Which of the following is an open application operating system for smart cards? | |||||||
|
- Question 5
0.5 out of 0.5 points
________ offer Internet Merchant Accounts, which are special accounts for credit card authorization and payment processing. | |||||||
|
- Question 6
0.5 out of 0.5 points
During the processing of card payments, which of the following involves the transfer of money from the buyer’s to the merchant’s account? | |||||||
|
- Question 7
0.5 out of 0.5 points
The micropayment model where up-front payments are made to a debit account, and then purchases are deducted as they are made is | |||||||
|
- Question 8
0.5 out of 0.5 points
Which of the following is the basic configuration for processing online payments where the merchant system deals only with order information? | |||||||
|
- Question 9
0.5 out of 0.5 points
The type of payment card where the money for a purchased item comes directly out of the holder’s checking account is a | |||||||
|
- Question 10
0.5 out of 0.5 points
Systems that aggregate online purchases are | |||||||
|
- Question 11
0.5 out of 0.5 points
Factors influencing whether a particular e-payment method achieves critical mass include | |||||||
|
- Question 12
0.5 out of 0.5 points
The type of contact card that is erasable and modifiable is | |||||||
|
- Question 13
0.5 out of 0.5 points
A ________ has two separate chips embedded in the card, contact and contactless, which eliminates the need to carry multiple cards to support the various smart card readers and applications. | |||||||
|
- Question 14
0.5 out of 0.5 points
Which of the following spurred the use of debit cards by eliminating the requirement for merchants to issue receipts for debit purchases of $15 or less? | |||||||
|
- Question 15
0.5 out of 0.5 points
The nationwide batch-oriented electronic funds transfer system that provides for the interbank clearing of electronic payments for participating financial institutions is the | |||||||
|
- Question 16
0.5 out of 0.5 points
Which of the following provides the holder with credit to make purchases up to a limit fixed by the card issuer? | |||||||
|
- Question 17
0.5 out of 0.5 points
The process of determining whether a card is active and whether the customer has sufficient funds for the purchase is called | |||||||
|
- Question 18
0.5 out of 0.5 points
Each of the following is a payment card type except | |||||||
|
- Question 19
0.5 out of 0.5 points
An advantage of e-checks is that they | |||||||
|
- Question 20
0.5 out of 0.5 points
The micropayment model where payments from a single consumer are batched together and processed only after a certain time period has expired or a certain monetary threshold is reached describes | |||||||
|