电子商务导论英文版2版PPT、教师手册、试题库turban_iec3_tif__6.pdf
《电子商务导论英文版2版PPT、教师手册、试题库turban_iec3_tif__6.pdf》由会员分享,可在线阅读,更多相关《电子商务导论英文版2版PPT、教师手册、试题库turban_iec3_tif__6.pdf(13页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、 1 Introduction to Electronic Commerce,3e(Turban)Chapter 9 Electronic Commerce Security and Fraud Protection 9.1 True/False 1)According to the CSI Computer Crime and Security Survey,firewalls were the most commonly used defense technologies in 2008.Answer:FALSE Diff:1 Page Ref:332 2)According to the
2、 CSI Computer Crime Security Survey,the most frequently occurring computer attacks were from viruses in 2008.Answer:TRUE Diff:1 Page Ref:333 3)The Internet and its network protocols were never intended for use by untrustworthy people or criminals.Answer:TRUE Diff:1 Page Ref:334 4)The Internet was de
3、signed for maximum efficiency and security by providing for error checking to ensure that the message was sent and received correctly.Answer:FALSE Diff:2 Page Ref:334 5)The motives of hackers have shifted from the desire for fame and notoriety to advancing personal and political agendas.Answer:FALSE
4、 Diff:2 Page Ref:334 6)Keystroke logging captures and records user keystrokes.Answer:TRUE Diff:1 Page Ref:335 7)Information security departments with huge workloads and limited budgets optimize their EC security programs for efficiency and tend to work strategically.Answer:FALSE Diff:2 Page Ref:336
5、8)Social engineering is an example of an unintentional threat.Answer:FALSE Diff:2 Page Ref:337 2 9)Cybercrimes are intentional crimes carried out on the Internet.Answer:TRUE Diff:1 Page Ref:339 10)Authentication provides the means to reconstruct what specific actions have occurred and may help EC se
6、curity investigators identify the person or program that performed unauthorized actions.Answer:FALSE Diff:2 Page Ref:340 11)An EC security strategy requires multiple layers of defense against risks from malware,fraudsters,customers,and employees.Answer:TRUE Diff:1 Page Ref:341 12)Detection measures
7、are actions that will make criminals abandon their idea of attacking a specific system.Answer:FALSE Diff:2 Page Ref:341 13)Propagation method and payload are the two components of a virus.Answer:TRUE Diff:1 Page Ref:342 14)Worms cannot spread via instant messages.Answer:FALSE Diff:2 Page Ref:343 15)
8、Internet fraud has grown even faster than the Internet itself.Answer:TRUE Diff:2 Page Ref:348 16)Honeypots are blogs created solely for marketing purposes.Answer:FALSE Diff:2 Page Ref:351 17)Confidentiality,integrity,and awareness are the three components of the CIA security triad.Answer:FALSE Diff:
9、3 Page Ref:353 18)Access control involves authorization and authentication.Answer:TRUE Diff:2 Page Ref:355 3 19)Encryption algorithm is the mathematical formula used to encrypt plaintext into ciphertext,and vice versa.Answer:TRUE Diff:2 Page Ref:357 20)An intrusion detection system uses the public I
10、nternet to carry information but remains private by using encryption,authentication,and access control to verify the identity of anyone using the network.Answer:FALSE Diff:3 Page Ref:363 21)Strong EC security makes online shopping more convenient for customers.Answer:FALSE Diff:2 Page Ref:374 22)Sho
11、ppers can rely on fraud protection provided by credit card issuers to protect them from identity theft.Answer:FALSE Diff:2 Page Ref:374 23)Phishing is rampant because some people respond to it and make it profitable.Answer:TRUE Diff:1 Page Ref:374 24)Preventing vulnerability during the EC design and
12、 pre-implementation stage is far more expensive than mitigating problems later.Answer:FALSE Diff:2 Page Ref:374 25)Due care in EC is those actions that a company is reasonably expected to take based on the risks affecting its business and transactions.Answer:TRUE Diff:2 Page Ref:375 9.2 Multiple Cho
13、ice 1)Which of the following is the underlying reason why comprehensive EC security is necessary?A)The Internet was designed for maximum efficiency without regard for its security or users with malicious intent.B)The shift toward profit-motivated crimes C)Security costs and efforts from reacting to
14、crises and paying for damages are greater than if an EC strategy is in place.D)Many companies fail to implement basic IT security management best practices,business continuity plans,and disaster recovery plans.Answer:C Diff:3 Page Ref:336 4 2)The probability that a vulnerability will be known and us
15、ed best describes A)risk.B)security breach.C)exposure.D)access point.Answer:A Diff:2 Page Ref:337 3)The process of verifying the real identity of an individual,computer,computer program,or EC Web site best describes A)integrity.B)availability.C)authentication.D)nonrepudiation.Answer:C Diff:2 Page Re
16、f:340 4)The assurance that an online customer or trading partner cannot falsely deny their purchase or transaction is referred to as A)integrity.B)availability.C)authentication.D)nonrepudiation.Answer:D Diff:2 Page Ref:340 5)The protection of information systems against unauthorized access to or mod
17、ification of information that is stored,processed,or being sent over a network is referred to as A)information assurance.B)data integrity.C)information integrity.D)packet protection.Answer:A Diff:2 Page Ref:341 6)A botnet is A)a huge number of hijacked Internet computers that have been set up to for
18、ward traffic,including spam and viruses,to other computers on the Internet.B)a piece of software code that inserts itself into a host or operating system to launch DOS attacks.C)a piece of code in a worm that spreads rapidly and exploits some known vulnerability.D)a production system that looks like
19、 it does real work,but that acts as a decoy and is watched to study how network intrusions occur.Answer:A Diff:2 Page Ref:345 5 7)_ is the criminal,fraudulent process of attempting to acquire confidential information by masquerading as a trustworthy entity.A)Spamming B)Pretexting C)Social engineerin
20、g D)Phishing Answer:D Diff:2 Page Ref:346 8)Assurance that stored data has not been modified without authorization and a message that was sent is the same message that was received is referred to as A)integrity.B)availability.C)authentication.D)nonrepudiation.Answer:A Diff:2 Page Ref:353 9)The succe
21、ss and security of EC is measured by A)encryption,functionality,and privacy.B)quality,reliability,and speed.C)authentication,authorization,and nonrepudiation.D)confidentiality,integrity,and availability.Answer:D Diff:3 Page Ref:353 10)The mechanism that determines who can legitimately use a network
22、resource best describes A)access control.B)confidentiality.C)key encryption.D)digital envelope.Answer:A Diff:1 Page Ref:355 11)Each of the following is a true statement about access control except:A)Access control determines which persons,programs,or machines can legitimately use a network resource
23、and which resources he,she,or it can use.B)Access control lists(ACLs)define users rights,such as what they are allowed to read,view,write,print,copy,delete,execute,modify,or move.C)All resources need to be considered together to identify the rights of users or categories of users.D)After a user has
24、been identified,the user must be authenticated.Answer:C Diff:2 Page Ref:355-356 6 12)Fingerprint scanners,facial recognition systems,and voice recognition are examples of _ that recognize a person by some physical trait.A)biometric systems B)human firewalls C)intrusion detection systems D)access con
25、trol lists Answer:A Diff:2 Page Ref:356 13)Encryption components include each of the following except A)encryption algorithm.B)key value.C)ciphertext.D)internal control environment.Answer:D Diff:2 Page Ref:357 14)A scheme for securing e-payments using public key encryption and various technical comp
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 电子商务 导论 英文 PPT 教师 手册 试题库 turban_iec3_tif_6
限制150内