Quiz Chap 5

pdf

School

Ashworth College *

*We aren’t endorsed by this school

Course

1000

Subject

Information Systems

Date

Apr 3, 2024

Type

pdf

Pages

1

Uploaded by lucian758

Report
MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) Confidentiality is sometimes confused with: A) authenticity. B) integrity. C) nonrepudiation. D) privacy. 2) ________ is the ability to ensure that e-commerce participants do not deny their online actions. A) Availability B) Integrity C) Nonrepudiation D) Authenticity 3) ________ is the ability to identify the person or entity with whom you are dealing on the Internet. A) Integrity B) Availability C) Nonrepudiation D) Authenticity 4) Which of the following is an example of an integrity violation of e-commerce security? A) A website is not actually operated by the entity the customer believes it to be. B) A customer denies that he is the person who placed the order. C) An unauthorized person intercepts an online communication and changes its contents. D) A merchant uses customer information in a manner not intended by the customer. 5) ________ is the ability to ensure that an e-commerce site continues to function as intended. A) Availability B) Integrity C) Nonrepudiation D) Authenticity 6) Which of the following is an example of an online privacy violation? A) your e-mail being altered by a hacker B) your online purchasing history being sold to other merchants without your consent C) your e-mail being read by a hacker D) your computer being used as part of a botnet 7) Which of the following statements about data breaches in 2017 is not true? A) According to the Identity Theft Resource Center, employee error was the leading cause of data breaches. B) According to the Identity Theft Resource Center, over 50% of data breaches involved social security numbers. C) According to the Identity Theft Resource Center, data breaches involving the business sector represented over 55% of all breaches. D) According to the Identity Theft Resource Center, the number of breaches in 2017 increased by almost 45% from 2016. 8) Which of the following is the leading cause of data breaches? A) hackers B) theft of a computer C) accidental disclosures D) DDoS attacks 9) Which of the following did the Internet Advertising Bureau urge advertisers to abandon? A) Adobe Flash B) HTML C) HTML5 D) Adobe Acrobat 10) ________ is the ability to ensure that messages and data are only available to those authorized to view them. A) Availability B) Privacy C) Integrity D) Confidentiality 1
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help