E-commerce Security and Payment Systems (EC 2023 Week-5.3)

E-commerce Security and Payment Systems (EC 2023 Week-5.3)

3rd Grade

17 Qs

quiz-placeholder

Similar activities

Crypto

Crypto

KG - 5th Grade

18 Qs

WKQIZ5

WKQIZ5

1st Grade - University

20 Qs

USAR Knowledge

USAR Knowledge

KG - University

13 Qs

Quiz Keamanan Informasi

Quiz Keamanan Informasi

1st - 5th Grade

22 Qs

KEAMANAN KOMPUTER

KEAMANAN KOMPUTER

3rd Grade

20 Qs

Cybersecurityawareness2024

Cybersecurityawareness2024

1st - 5th Grade

20 Qs

Database

Database

2nd Grade - University

15 Qs

Rumbo al examen

Rumbo al examen

1st - 3rd Grade

18 Qs

E-commerce Security and Payment Systems (EC 2023 Week-5.3)

E-commerce Security and Payment Systems (EC 2023 Week-5.3)

Assessment

Quiz

Computers

3rd Grade

Medium

Created by

Sas Pratama

Used 6+ times

FREE Resource

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Confidentiality is sometimes confused with:

privacy

authenticity

integrity

nonrepudiation

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

________ is the ability to ensure that e-commerce participants do not deny their online actions.

Nonrepudiation

Authenticity

Availability

Integrity

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of an integrity violation of e-commerce security?

A website is not actually operated by the entity the customer believes it to be.

A merchant uses customer information in a manner not intended by the customer.

A customer denies that he is the person who placed the order.

An unauthorized person intercepts an online communication and changes its contents.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of an online privacy violation?

your e-mail being read by a hacker

your online purchasing history being sold to other merchants without your consent

your computer being used as part of a botnet

your e-mail being altered by a hacker

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

________ is the ability to ensure that messages and data are only available to those authorized to view them.

Confidentiality

Integrity

Privacy

Availability

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is not a key factor for establishing e-commerce security?

data integrity

technology

organizational policies

laws and industry standards

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

spyware

a backdoor

browser parasite

adware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?