Showing posts with label E-commerce Chapter 5. Show all posts
Showing posts with label E-commerce Chapter 5. Show all posts

Which of the following is not a major trend in e-commerce payments in 2016-2017?

Which of the following is not a major trend in e-commerce payments in 2016-2017?



A) Mobile retail payment volume decreases.

B) PayPal remains the most popular alternative payment method.

C) Google refocuses Google Wallet solely on sending and receiving money.

D) Payment by credit and/or debit card remains the dominant form of online payment.



Answer: A) Mobile retail payment volume decreases.

PayPal is an example of a(n):

PayPal is an example of a(n):



A) online stored value payment system.

B) digital checking system.

C) accumulating balance system.

D) digital credit card system.



Answer: A) online stored value payment system

All of the following statements about Apple Pay are true except which of the following?

All of the following statements about Apple Pay are true except which of the following?



A) Apple Pay is subject to recent regulations issued by the Bureau of Consumer Financial Protection applicable to GPR transactions.

B) Apple Pay is based on Touch ID biometric fingerprint scanning.

C) Apple Pay can be used for mobile payments at the point of sale at a physical store.

D) Apple Pay relies on NFC chip technology.



Answer: A) Apple Pay is subject to recent regulations issued by the Bureau of Consumer Financial Protection applicable to GPR transactions.

Which of the following statements is not true?

Which of the following statements is not true?



A) Most states require companies that maintain personal data on their residents to publicly disclose when a security breach affecting those residents has occurred.

B) The USA Patriot Act broadly expanded law enforcement's investigative and surveillance powers.

C) The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates.

D) The Federal Trade Commission has asserted that it has authority over corporations' data security practices.



Answer: C) The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates.

What is the first step in developing an e-commerce security plan?

What is the first step in developing an e-commerce security plan?



A) Create a security organization.

B) Develop a security policy.

C) Perform a risk assessment.

D) Perform a security audit



Answer: C) Perform a risk assessment

Which of the following statements is not true?

Which of the following statements is not true?



A) Apple's Touch ID stores a user's actual fingerprint.

B) Biometric devices reduce the opportunity for spoofing.

C) A retina scan is an example of a biometric device.

D) Biometric data stored on an iPhone is encrypted



Answer: A) Apple's Touch ID stores a user's actual fingerprint.

Which of the following statements is not true?

Which of the following statements is not true?



A) A VPN provides both confidentiality and integrity.

B) A VPN uses both authentication and encryption.

C) A VPN uses a dedicated secure line.

D) The primary use of VPNs is to establish secure communications among business partners.



Answer: C) A VPN uses a dedicated secure line.

An intrusion detection system can perform all of the following functions except:

An intrusion detection system can perform all of the following functions except:



A) examining network traffic.

B) setting off an alarm when suspicious activity is detected.

C) checking network traffic to see if it matches certain patterns or preconfigured rules.

D) blocking suspicious activity.



Answer: D) blocking suspicious activity

Proxy servers are also known as:

Proxy servers are also known as:



A) firewalls.

B) application gateways.

C) dual home systems.

D) packet filters.



Answer: C) dual home systems