An intrusion detection system can perform all of the following functions except:
A) examining network traffic.
B) setting off an alarm when suspicious activity is detected.
C) checking network traffic to see if it matches certain patterns or preconfigured rules.
D) blocking suspicious activity.
Answer: D) blocking suspicious activity
Learn More :
E-commerce Chapter 5
- In 2015, online bill payment accounted for ________ of all bill payments, while paper checks accounted for ________.
- Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?
- Linden Dollars, created for use in Second Life, are an example of:
- All of the following are limitations of the existing online credit card payment system except:
- Which of the following is not a major trend in e-commerce payments in 2016-2017?
- PCI-DSS is a standard established by which of the following?
- PayPal is an example of a(n):
- All of the following statements about Apple Pay are true except which of the following?
- All of the following are examples of social/mobile peer-to-peer payment systems except:
- Which of the following statements is not true?
- To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:
- What is the first step in developing an e-commerce security plan?
- Which of the following is the most common protocol for securing a digital channel of communication?
- A fingerprint scan is an example of which of the following?
- Which of the following statements is not true?
- Which of the following statements is not true?
- Which of the following is not an example of an access control?
- All of the following are used for authentication except:
- Proxy servers are also known as:
- A ________ is a hardware or software component that acts as a filter to prevent unwanted packets from entering a network.
- All of the following are methods of securing channels of communication except:
- Which of the following dimensions of e-commerce security does not involve encryption?
- A digital certificate contains all of the following except the:
- All of the following statements about PKI are true except: