E-Commerce 5.01-5.02

E-Commerce 5.01-5.02

10th - 12th Grade

27 Qs

quiz-placeholder

Similar activities

j2771.6 Legal Moral Ethical Environmental

j2771.6 Legal Moral Ethical Environmental

9th - 11th Grade

22 Qs

Jaringan Komputer dan Internet_1

Jaringan Komputer dan Internet_1

10th Grade

25 Qs

Networks and the Internet

Networks and the Internet

9th - 12th Grade

25 Qs

Empowerment Technology Unit 2 Practice Quiz

Empowerment Technology Unit 2 Practice Quiz

11th Grade

30 Qs

GSEB 12 Comp Chap 4

GSEB 12 Comp Chap 4

12th Grade

25 Qs

Latihan soal Bab 4 Informatika 8

Latihan soal Bab 4 Informatika 8

12th Grade

25 Qs

Multimedia 1

Multimedia 1

9th - 12th Grade

25 Qs

Peranan TIK dalam kehidupan (MTsN)

Peranan TIK dalam kehidupan (MTsN)

9th - 12th Grade

25 Qs

E-Commerce 5.01-5.02

E-Commerce 5.01-5.02

Assessment

Quiz

Computers

10th - 12th Grade

Hard

Created by

Lisa Campbell

Used 8+ times

FREE Resource

27 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Elaine hired Trey to investigate security issues for her e-business. After Trey identified specific security threats,which method did he identify for protecting Elaine's e-business?
Bug
Cookie
Cybersquatting
Firewall

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Janika has accessed a company's website using Internet Explorer. What type of risk has been introduced to the company? 
Data loss
Liability
Security
Technical

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Xenex Corporation wants to protect their critical business data from outside hackers. What can Xenex use to accomplish this? 
Access codes
Firewall technology
Intranet barriers
Multiple domain names

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Central High School administrators want to protect students from accessing uncensored information via the Internet. What should the school use? 
Access codes
Filtering software
Firewall technology
Intranet barriers

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which website is required to be Section 508 compliant?
www.redcross.org
www.walmart.com
www.fafsa.gov
www.learnnc.org

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Security attacks take many forms. If Sahir cannot access a legitimate website, what might have occurred? 
Contamination-of-service
Data alteration attack
Denial-of-service-attack
Misappropriation attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Bianca is concerned that a user outside her e-business could access the private information of her customers through her website. What could Bianca use to prevent this? 
Data blocking
Firewall technology
Interceptor technology
Intranet security

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?