Chapter 9

Test Quiz_09
Started 12/12/16 5:18 PM
Submitted 12/12/16 5:22 PM
Status Completed
Attempt Score 9.5 out of 10 points
Time Elapsed 4 minutes out of 40 minutes
Results Displayed Submitted Answers, Correct Answers
  • Question 1

0.5 out of 0.5 points

Confidentiality, integrity, and awareness are the three components of the CIA security triad.
Selected Answer:  False
Correct Answer:  False
  • Question 2

0.5 out of 0.5 points

A method used to ensure confidentiality and integrity of data transmitted over the Internet by encrypting data packets, sending them in packets across the Internet, and decrypting them at the destination address best describes
Selected Answer:  

protocol tunneling.

Correct Answer:  

protocol tunneling.

  • Question 3

0.5 out of 0.5 points

A botnet is
Selected Answer: a huge number of hijacked Internet computers that have been set up to forward traffic, including spam and viruses, to other computers on the Internet.
Correct Answer: a huge number of hijacked Internet computers that have been set up to forward traffic, including spam and viruses, to other computers on the Internet.
  • Question 4

0.5 out of 0.5 points

According to the CSI Computer Crime and Security Survey, firewalls were the most commonly used defense technologies in 2008.
Selected Answer:  False
Correct Answer:  False
  • Question 5

0.5 out of 0.5 points

Access control involves authorization and authentication.
Selected Answer:  True
Correct Answer:  True
  • Question 6

0.5 out of 0.5 points

The probability that a vulnerability will be known and used best describes
Selected Answer:  

risk.

Correct Answer:  

risk.

  • Question 7

0.5 out of 0.5 points

A summary of a message, converted into a string of digits after the hash has been applied, best describes
Selected Answer:  

message digest.

Correct Answer:  

message digest.

  • Question 8

0.5 out of 0.5 points

A special category of software that can monitor activity across a network or on a host computer, watch for suspicious activity, and take automated action based on what it sees best describes
Selected Answer:  

intrusion detection system.

Correct Answer:  

intrusion detection system.

  • Question 9

0.5 out of 0.5 points

The success and security of EC is measured by
Selected Answer:  

confidentiality, integrity, and availability.

Correct Answer:  

confidentiality, integrity, and availability.

  • Question 10

0.5 out of 0.5 points

Assurance that stored data has not been modified without authorization and a message that was sent is the same message that was received is referred to as
Selected Answer:  

integrity.

Correct Answer:  

integrity.

  • Question 11

0.5 out of 0.5 points

The process of verifying the real identity of an individual, computer, computer program, or EC Web site best describes
Selected Answer:  

authentication.

Correct Answer:  

authentication.

  • Question 12

0.5 out of 0.5 points

Fingerprint scanners, facial recognition systems, and voice recognition are examples of ________ that recognize a person by some physical trait.
Selected Answer:  

biometric systems

Correct Answer:  

biometric systems

  • Question 13

0.5 out of 0.5 points

The protection of information systems against unauthorized access to or modification of information that is stored, processed, or being sent over a network is referred to as
Selected Answer:  

information assurance.

Correct Answer:  

information assurance.

  • Question 14

0.5 out of 0.5 points

A law that makes it a crime to send commercial e-mail messages with false or misleading message headers or misleading subject lines is
Selected Answer:  

CAN-SPAM.

Correct Answer:  

CAN-SPAM.

  • Question 15

0.5 out of 0.5 points

Keystroke logging captures and records user keystrokes.
Selected Answer:  True
Correct Answer:  True
  • Question 16

0.5 out of 0.5 points

A method of evaluating the security of a computer system or a network by simulating an attack from a malicious source best describes
Selected Answer:  

penetration test.

Correct Answer:  

penetration test.

  • Question 17

0.5 out of 0.5 points

Which of the following is not an advantage of virtual private networks (VPN) for data communications?
Selected Answer:  

They ensure the confidentiality and integrity of the data transmitted over the Internet without requiring encryption.

Correct Answer:  

They ensure the confidentiality and integrity of the data transmitted over the Internet without requiring encryption.

  • Question 18

0.5 out of 0.5 points

Which of the following is the underlying reason why comprehensive EC security is necessary?
Selected Answer:  

Security costs and efforts from reacting to crises and paying for damages are greater than if an EC strategy is in place.

Correct Answer:  

Security costs and efforts from reacting to crises and paying for damages are greater than if an EC strategy is in place.

  • Question 19

0 out of 0.5 points

Due care in EC is those actions that a company is reasonably expected to take based on the risks affecting its business and transactions.
Selected Answer:  False
Correct Answer:  True
  • Question 20

0.5 out of 0.5 points

 

Internet fraud has grown even faster than the Internet itself.
Selected Answer:  True
Correct Answer:  True

Chapter 10

  • Question 1

0.5 out of 0.5 points

A smart card containing a small gold plate on the face that when inserted in a smart card reader makes contact and passes data to and from the embedded microchip is a
Selected Answer:  

contact card.

Correct Answer:  

contact card.

  • Question 2

0.5 out of 0.5 points

Costs associated with fraudulent transactions include
Selected Answer:  

All of these.

Correct Answer:  

All of these.

  • Question 3

0.5 out of 0.5 points

Key tools used in combating fraud include
Selected Answer:  

All of these.

Correct Answer:  

All of these.

  • Question 4

0.5 out of 0.5 points

Which of the following is an open application operating system for smart cards?
Selected Answer:  

MULTOS.

Correct Answer:  

MULTOS.

  • Question 5

0.5 out of 0.5 points

________ offer Internet Merchant Accounts, which are special accounts for credit card authorization and payment processing.
Selected Answer:  

Acquiring banks

Correct Answer:  

Acquiring banks

  • Question 6

0.5 out of 0.5 points

During the processing of card payments, which of the following involves the transfer of money from the buyer’s to the merchant’s account?
Selected Answer:  

settlement

Correct Answer:  

settlement

  • Question 7

0.5 out of 0.5 points

The micropayment model where up-front payments are made to a debit account, and then purchases are deducted as they are made is
Selected Answer:  

stored value.

Correct Answer:  

stored value.

  • Question 8

0.5 out of 0.5 points

Which of the following is the basic configuration for processing online payments where the merchant system deals only with order information?
Selected Answer:  

use a point of sale system operated by an acquirer

Correct Answer:  

use a point of sale system operated by an acquirer

  • Question 9

0.5 out of 0.5 points

The type of payment card where the money for a purchased item comes directly out of the holder’s checking account is a
Selected Answer:  

debit card.

Correct Answer:  

debit card.

  • Question 10

0.5 out of 0.5 points

Systems that aggregate online purchases are
Selected Answer:  

closed-loop systems.

Correct Answer:  

closed-loop systems.

  • Question 11

0.5 out of 0.5 points

Factors influencing whether a particular e-payment method achieves critical mass include
Selected Answer:  

All of these.

Correct Answer:  

All of these.

  • Question 12

0.5 out of 0.5 points

The type of contact card that is erasable and modifiable is
Selected Answer:  

EEPROM.

Correct Answer:  

EEPROM.

  • Question 13

0.5 out of 0.5 points

A ________ has two separate chips embedded in the card, contact and contactless, which eliminates the need to carry multiple cards to support the various smart card readers and applications.
Selected Answer:  

hybrid smart card

Correct Answer:  

hybrid smart card

  • Question 14

0.5 out of 0.5 points

Which of the following spurred the use of debit cards by eliminating the requirement for merchants to issue receipts for debit purchases of $15 or less?
Selected Answer:  

U.S. Electronic Funds Transfer Act

Correct Answer:  

U.S. Electronic Funds Transfer Act

  • Question 15

0.5 out of 0.5 points

The nationwide batch-oriented electronic funds transfer system that provides for the interbank clearing of electronic payments for participating financial institutions is the
Selected Answer:  

Automated Clearing House Network.

Correct Answer:  

Automated Clearing House Network.

  • Question 16

0.5 out of 0.5 points

Which of the following provides the holder with credit to make purchases up to a limit fixed by the card issuer?
Selected Answer:  

credit card

Correct Answer:  

credit card

  • Question 17

0.5 out of 0.5 points

The process of determining whether a card is active and whether the customer has sufficient funds for the purchase is called
Selected Answer:  

authorization.

Correct Answer:  

authorization.

  • Question 18

0.5 out of 0.5 points

Each of the following is a payment card type except
Selected Answer:  

video card.

Correct Answer:  

video card.

  • Question 19

0.5 out of 0.5 points

An advantage of e-checks is that they
Selected Answer:  

fit current business practices, and so require little process reengineering.

Correct Answer:  

fit current business practices, and so require little process reengineering.

  • Question 20

0.5 out of 0.5 points

The micropayment model where payments from a single consumer are batched together and processed only after a certain time period has expired or a certain monetary threshold is reached describes
Selected Answer:  

aggregation.

Correct Answer:  

aggregation.