Finalquiz Logo

Q&A Hero

  • Home
  • Plans
  • Login
  • Register
Finalquiz Logo
  • Home
  • Plans
  • Login
  • Register

Home » Management » Page 221

Management

Q: In the early years of e-commerce, prior to 2000, single, white, young college-educated males with high income dominated the Internet in terms of percentage of Internet usage.

Q: In modeling online consumer behavior, the concept of "consumer skills" refers to the: A) education level of the consumer. B) communication skills of the consumer. C) knowledge consumers have about how to conduct online transactions. D) product evaluation skills of the consumer.

Q: Online buyers constitute approximately ________ % of the online Internet audience. A) 65 B) 75 C) 85 D) 95

Q: All of the following are online communications that are used to support the evaluation of alternatives stage of the consumer decision process except: A) search engines. B) online catalogs. C) social networks. D) targeted banner ads.

Q: In 2015, what was the approximate Internet penetration rate for individuals that have attained less than a high-school education? A) 25% B) 33% C) 66% D) 75%

Q: Which of the following is not one of the main stages of the online purchasing process? A) post-purchase service and loyalty B) awareness C) engagement D) conversation

Q: Which of the following online advertising formats attracted the least amount of spending in 2015? A) search B) classifieds C) rich media D) e-mail

Q: Around ________ % of households in the United States have broadband access to the Internet. A) 45 B) 55 C) 75 D) 85

Q: Define and explain how EBPP systems work. Describe each of the main EBPP business models.

Q: In 2014, online bill payment accounted for ________ of all bill payments, while paper checks accounted for ________. A) less than 10%; less than 25% B) about 25%; about 10% C) more than 50%; less than 25% D) 100%; 0%

Q: Explain how an online credit card transaction works, identifying the parties involved and describing how SSL/TLS is involved. What are the limitations of online credit card payment systems?

Q: There is a finite number of Bitcoins that can be created.

Q: Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties.

Q: Apple Pay uses near field communication (NFC) chips.

Q: PayPal is the most popular alternative payment method in the United States.

Q: Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other? A) DES B) NFC C) IM D) text messaging

Q: Linden Dollars, created for use in Second Life, are an example of: A) digital cash. B) virtual currency. C) EBPP. D) peer-to-peer payment systems.

Q: All of the following are limitations of the existing online credit card payment system except: A) poor security. B) cost to consumers. C) cost to merchant. D) social equity.

Q: Which of the following is not a major trend in e-commerce payments in 2015-2016? A) Mobile retail payment volume decreases. B) PayPal remains the most popular alternative payment method. C) Apple introduces Apple Pay. D) Payment by credit and/or debit card remains the dominant form of online payment.

Q: PCI-DSS is a standard established by which of the following? A) the banking industry B) the credit card industry C) the federal government D) the retail industry

Q: PayPal is an example of what type of payment system? A) online stored value payment system B) digital checking system C) accumulating balance system D) digital credit card system

Q: All of the following statements about Apple Pay are true except which of the following? A) Apple Pay is available for both iPhone 5s and iPhone 6s. B) Apple Pay is based on Touch ID biometric fingerprint scanning. C) Apple Pay can be used for mobile payments at the point of sale at a physical store. D) Apple Pay relies on NFC chip technology.

Q: All of the following are examples of social/mobile peer-to-peer payment systems except: A) Venmo. B) Bill Me Later. C) Square Cash. D) Google Wallet.

Q: Which of the following statements is not true? A) A majority of states require companies that maintain personal data on their residents to publicly disclose when a security breach affecting those residents has occurred. B) The USA Patriot Act broadly expanded law enforcement's investigative and surveillance powers. C) The Cybersecurity Information Sharing Act is strongly supported by most large technology companies and privacy advocates. D) The Federal Trade Commission has asserted that it has authority over corporations' data security practices.

Q: To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use: A) access controls. B) an authorization management system. C) security tokens. D) an authorization policy.

Q: What is the first step in developing an e-commerce security plan? A) Create a security organization. B) Develop a security policy. C) Perform a risk assessment. D) Perform a security audit.

Q: Discuss the security of communications channels. Include definitions and explanations for the terms Secure Sockets Layer/Transport Layer Security (SSL/TLS), secure negotiated session, session key, and VPN.

Q: What dimensions do digital signatures and hash digests add to public key cryptography and how do they work?

Q: Explain the difference between symmetric key cryptography and public key cryptography. Which dimensions of e-commerce security does encryption address?

Q: The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.

Q: SLS/TLS cannot provide irrefutability.

Q: Which of the following is the most common protocol for securing a digital channel of communication? A) DES B) SSL/TLS C) VPN D) HTTP

Q: A fingerprint scan is an example of which of the following? A) biometrics B) encryption C) IDS D) firewall

Q: Which of the following statements is not true? A) Apple's Touch ID stores a user's actual fingerprint. B) Biometric devices reduce the opportunity for spoofing. C) A retina scan is an example of a biometric device. D) Biometric data stored on an iPhone is encrypted.

Q: Which of the following statements is not true? A) A VPN provides both confidentiality and integrity. B) A VPN uses both authentication and encryption. C) A VPN uses a dedicated secure line. D) The primary use of VPNs is to establish secure communications among business partners.

Q: Which of the following is not an example of an access control? A) firewalls B) proxy servers C) digital signatures D) login passwords

Q: An intrusion detection system can perform all of the following functions except: A) examining network traffic. B) setting off an alarm when suspicious activity is detected. C) checking network traffic to see if it matches certain patterns or preconfigured rules. D) blocking suspicious activity.

Q: All of the following are used for authentication except: A) digital signatures. B) certificates of authority. C) biometric devices. D) packet filters.

Q: Proxy servers are also known as: A) firewalls. B) application gateways. C) dual home systems. D) packet filters.

Q: A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network. A) firewall B) virtual private network C) proxy server D) PPTP

Q: All of the following are methods of securing channels of communication except: A) SSL/TLS. B) certificates. C) VPN. D) FTP.

Q: Which of the following dimensions of e-commerce security is not provided for by encryption? A) confidentiality B) availability C) message integrity D) nonrepudiation

Q: A digital certificate contains all of the following except the: A) subject's private key. B) subject's public key. C) digital signature of the certification authority. D) digital certificate serial number.

Q: All of the following statements about PKI are true except: A) The term PKI refers to the certification authorities and digital certificate procedures that are accepted by all parties. B) PKI is not effective against insiders who have a legitimate access to corporate systems including customer information. C) PKI guarantees that the verifying computer of the merchant is secure. D) The acronym PKI stands for public key infrastructure.

Q: Which of the following is the current standard used to protect Wi-Fi networks? A) WEP B) TLS C) WPA2 D) WPA3

Q: All of the following statements about public key cryptography are true except: A) public key cryptography uses two mathematically related digital keys. B) public key cryptography ensures authentication of the sender. C) public key cryptography does not ensure message integrity. D) public key cryptography is based on the idea of irreversible mathematical functions.

Q: The Data Encryption Standard uses a(n) ________-bit key. A) 8 B) 56 C) 256 D) 512

Q: All the following statements about symmetric key cryptography are true except: A) in symmetric key cryptography, both the sender and the receiver use the same key to encrypt and decrypt a message. B) the Data Encryption Standard is a symmetric key encryption system. C) symmetric key cryptography is computationally slower. D) symmetric key cryptography is a key element in digital envelopes.

Q: Symmetric key cryptography is also known as: A) public key cryptography. B) secret key cryptography. C) PGP. D) PKI.

Q: Next generation firewalls provide all of the following except: A) an application-centric approach to firewall control. B) the ability to identify applications regardless of the port, protocol, or security evasion tools used. C) the ability to automatically update applications with security patches. D) the ability to identify users regardless of the device or IP address.

Q: Discuss and explain the various types of malicious code and how they work. Include the different types of viruses.

Q: What is a sniffing attack and how does it differ from a MitM attack?

Q: Discuss the Great Cannon. Who developed it, how has it been used, and how does it differ from the Great Firewall?

Q: What is the Internet of Things (IoT) and what security issues and challenges does it raise?

Q: ShellShock is an example of a software vulnerability.

Q: Vishing attacks exploit SMS messages.

Q: Exploit kits are often rented or sold as a commercial product.

Q: Spoofing a Web site is a threat to the integrity of the Web site.

Q: CryptoLocker is an example of ransomware.

Q: Phishing attacks rely on browser parasites.

Q: A Trojan horse appears to be benign, but then does something other than expected.

Q: A worm does not need to be activated by a user in order for it to replicate itself.

Q: ________ typically attack governments, organizations, and sometimes individuals for political purposes. A) Crackers B) White hats C) Grey hats D) Hacktivists

Q: According to Ponemon Institute's 2015 survey, which of the following was not among the causes of the most costly cybercrimes? A) malicious insiders B) malicious code C) denial of service D) botnets

Q: FREAK is an example of which of the following? A) mobile malware B) software vulnerability C) botnet D) Trojan horse

Q: Automatically redirecting a Web link to a different address is an example of which of the following? A) sniffing B) social engineering C) pharming D) DDoS attack

Q: Which of the following was designed to cripple Iranian nuclear centrifuges? A) Stuxnet B) Flame C) Snake D) Storm

Q: Which of the following is not an example of a PUP? A) adware B) browser parasite C) drive-by download D) spyware

Q: Malware that comes with a downloaded file that a user requests is called a: A) Trojan horse. B) backdoor. C) drive-by download. D) PUP.

Q: Rustock is an example of which of the following? A) worm B) botnet C) phishing D) hacktivism

Q: Zeus is an example of which of the following? A) SQL injection attack B) browser parasite C) DDoS attack D) Trojan horse/botnet

Q: Which of the following is not an example of malicious code? A) scareware B) Trojan horse C) bot D) sniffer

Q: Which dimension(s) of security is spoofing a threat to? A) integrity B) availability C) integrity and authenticity D) availability and integrity

Q: What is the most frequent cause of stolen credit cards and card information today? A) lost cards B) the hacking and looting of corporate servers storing credit card information C) sniffing programs D) phishing attacks

Q: In 2014, Sony experienced which of the following? A) a high-profile data breach B) a DDoS attack that shut down its Web site C) a hacktivist attack to protest its employment policies D) a browser parasite

Q: Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as: A) spyware. B) a backdoor. C) browser parasite. D) adware.

Q: Which of the following is the leading cause of data breaches? A) theft of a computer B) accidental disclosures C) hackers D) DDoS attacks

Q: Slammer is an example of which of the following? A) virus B) worm C) Trojan horse D) botnet

Q: All of the following are prominent hacktivist groups except: A) Anonymous. B) LulzSec. C) Impact Team. D) Avid Life.

Q: Accessing data without authorization on Dropbox is an example of which of the following? A) social network security issue B) cloud security issue C) mobile platform security issue D) sniffing

1 2 3 … 1,015 Next »

Subjects

Accounting Anthropology Archaeology Art History Banking Biology & Life Science Business Business Communication Business Development Business Ethics Business Law Chemistry Communication Computer Science Counseling Criminal Law Curriculum & Instruction Design Earth Science Economic Education Engineering Finance History & Theory Humanities Human Resource International Business Investments & Securities Journalism Law Management Marketing Medicine Medicine & Health Science Nursing Philosophy Physic Psychology Real Estate Science Social Science Sociology Special Education Speech Visual Arts
Links
  • Contact Us
  • Privacy
  • Term of Service
  • Copyright Inquiry
  • Sitemap
Business
  • Finance
  • Accounting
  • Marketing
  • Human Resource
  • Marketing
Education
  • Mathematic
  • Engineering
  • Nursing
  • Nursing
  • Tax Law
Social Science
  • Criminal Law
  • Philosophy
  • Psychology
  • Humanities
  • Speech

Copyright 2025 FinalQuiz.com. All Rights Reserved