Search Header Logo

E-Commerce Security

Authored by Mawar Halik

Computers

University

Used 173+ times

E-Commerce Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Three key points of vulnerability can be identified as below EXCEPT

Internet communications channels

Server level

Client level

Networking level

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Below is a correct of vulnerability point with example of threat?

Internet communication- Malicious code attack, tapping and sniffing

Server-Dos attack, hacking, theft and fraud

Client - Malicious code attack, vandalism, theft and fraud

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This virus is application specific.Meaning that the virus affects only the application for which it was written, such as Microsoft Word, Excel, PDF, or PowerPoint. This refer to_______________.

Macro virus

File-infecting virus

Script virus

Trojan hourse

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The viruses are activated simply by double – clicking an infected *.vbs or *.js file. This refer to

macro virus

script virus

file infecting virus

worm

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

En Abu think he received an email from someone he know and click on what looks like a legitimate attachment. But he don't know that the email is from a cybercriminal. When En Abu execute the program, the malware can spread to other files and damage his computer. What type of malicious code that En Abu faced?

Macro virus

Trojan Horse

Worm

script virus

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____________ is typically used to call for pop – up ads to display when the user visits certain sites. It can be downloaded and sometimes included in free programs.

spyware

adwares

phising

spoofing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You receive a e-mail contain message you won a lottery but first deposit some amount in the following account a/c ______.This refer to

hacking

phising

adwares

cybervandalism

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers