E-Commerce Security

E-Commerce Security

University

20 Qs

quiz-placeholder

Similar activities

IAS CH2 QUIZ

IAS CH2 QUIZ

University

25 Qs

Threats, Issues, and Defenses - Ch 5

Threats, Issues, and Defenses - Ch 5

10th Grade - University

20 Qs

Cryptology Tools

Cryptology Tools

University

15 Qs

Designing Network Infrastructure and Network Security

Designing Network Infrastructure and Network Security

KG - University

20 Qs

Uji Kompetensi

Uji Kompetensi

7th Grade - University

19 Qs

Cryptography Basics

Cryptography Basics

University

20 Qs

Data Ecryption

Data Ecryption

University

16 Qs

IAS 101 - Week 11 and 12 - Cryptography

IAS 101 - Week 11 and 12 - Cryptography

University

20 Qs

E-Commerce Security

E-Commerce Security

Assessment

Quiz

Computers

University

Medium

Created by

Mawar Halik

Used 173+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Three key points of vulnerability can be identified as below EXCEPT

Internet communications channels

Server level

Client level

Networking level

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Below is a correct of vulnerability point with example of threat?

Internet communication- Malicious code attack, tapping and sniffing

Server-Dos attack, hacking, theft and fraud

Client - Malicious code attack, vandalism, theft and fraud

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This virus is application specific.Meaning that the virus affects only the application for which it was written, such as Microsoft Word, Excel, PDF, or PowerPoint. This refer to_______________.

Macro virus

File-infecting virus

Script virus

Trojan hourse

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The viruses are activated simply by double – clicking an infected *.vbs or *.js file. This refer to

macro virus

script virus

file infecting virus

worm

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

En Abu think he received an email from someone he know and click on what looks like a legitimate attachment. But he don't know that the email is from a cybercriminal. When En Abu execute the program, the malware can spread to other files and damage his computer. What type of malicious code that En Abu faced?

Macro virus

Trojan Horse

Worm

script virus

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____________ is typically used to call for pop – up ads to display when the user visits certain sites. It can be downloaded and sometimes included in free programs.

spyware

adwares

phising

spoofing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You receive a e-mail contain message you won a lottery but first deposit some amount in the following account a/c ______.This refer to

hacking

phising

adwares

cybervandalism

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?