Which of the following is an example of an integrity violation of e-commerce security?
A) A website is not actually operated by the entity the customer believes it to be.
B) A merchant uses customer information in a manner not intended by the customer.
C) A customer denies that he or she is the person who placed the order.
D) An unauthorized person intercepts an online communication and changes its contents.
Answer: D) An unauthorized person intercepts an online communication and changes its contents.
Learn More :
E-commerce Chapter 5
- In 2015, online bill payment accounted for ________ of all bill payments, while paper checks accounted for ________.
- Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?
- Linden Dollars, created for use in Second Life, are an example of:
- All of the following are limitations of the existing online credit card payment system except:
- Which of the following is not a major trend in e-commerce payments in 2016-2017?
- PCI-DSS is a standard established by which of the following?
- PayPal is an example of a(n):
- All of the following statements about Apple Pay are true except which of the following?
- All of the following are examples of social/mobile peer-to-peer payment systems except:
- Which of the following statements is not true?
- To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:
- What is the first step in developing an e-commerce security plan?
- Which of the following is the most common protocol for securing a digital channel of communication?
- A fingerprint scan is an example of which of the following?
- Which of the following statements is not true?
- Which of the following statements is not true?
- Which of the following is not an example of an access control?
- An intrusion detection system can perform all of the following functions except:
- All of the following are used for authentication except:
- Proxy servers are also known as:
- A ________ is a hardware or software component that acts as a filter to prevent unwanted packets from entering a network.
- All of the following are methods of securing channels of communication except:
- Which of the following dimensions of e-commerce security does not involve encryption?
- A digital certificate contains all of the following except the:
- All of the following statements about PKI are true except: