All of the following statements about Apple Pay are true except which of the following?
A) Apple Pay is subject to recent regulations issued by the Bureau of Consumer Financial Protection applicable to GPR transactions.
B) Apple Pay is based on Touch ID biometric fingerprint scanning.
C) Apple Pay can be used for mobile payments at the point of sale at a physical store.
D) Apple Pay relies on NFC chip technology.
Answer: A) Apple Pay is subject to recent regulations issued by the Bureau of Consumer Financial Protection applicable to GPR transactions.
Learn More :
E-commerce Chapter 5
- In 2015, online bill payment accounted for ________ of all bill payments, while paper checks accounted for ________.
- Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?
- Linden Dollars, created for use in Second Life, are an example of:
- All of the following are limitations of the existing online credit card payment system except:
- Which of the following is not a major trend in e-commerce payments in 2016-2017?
- PCI-DSS is a standard established by which of the following?
- PayPal is an example of a(n):
- All of the following are examples of social/mobile peer-to-peer payment systems except:
- Which of the following statements is not true?
- To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:
- What is the first step in developing an e-commerce security plan?
- Which of the following is the most common protocol for securing a digital channel of communication?
- A fingerprint scan is an example of which of the following?
- Which of the following statements is not true?
- Which of the following statements is not true?
- Which of the following is not an example of an access control?
- An intrusion detection system can perform all of the following functions except:
- All of the following are used for authentication except:
- Proxy servers are also known as:
- A ________ is a hardware or software component that acts as a filter to prevent unwanted packets from entering a network.
- All of the following are methods of securing channels of communication except:
- Which of the following dimensions of e-commerce security does not involve encryption?
- A digital certificate contains all of the following except the:
- All of the following statements about PKI are true except: