L9 Online Security

L9 Online Security

University

15 Qs

quiz-placeholder

Similar activities

QUIZ 3

QUIZ 3

University

16 Qs

Transport Layer Security

Transport Layer Security

University

20 Qs

CAEC - CH06

CAEC - CH06

University

20 Qs

Database Management system

Database Management system

University

12 Qs

Mobile IP and WAP

Mobile IP and WAP

University

10 Qs

Online scams

Online scams

University

10 Qs

Security IPSec

Security IPSec

University

10 Qs

Cryptography and Network Security Quiz 3

Cryptography and Network Security Quiz 3

University

10 Qs

L9 Online Security

L9 Online Security

Assessment

Quiz

Computers

University

Medium

Created by

Shazwani undefined

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Below are key e-commerce security EXCEPT :

Repudiation

Availability

Privacy

Confidentiality

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a key security threat in the e-commerce environment?

Malicious code

Social network security issues

Poorly designed software

All of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does a firewall contribute to e-commerce security?

By filtering communication packets

By encrypting data

By detecting phishing attempts

By preventing credit card fraud

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of an Intrusion Detection System (IDS)?

To prevent credit card fraud

To detect malicious code

To encrypt data

To filter communication packets

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of encryption technology uses a public key and a private key?

Symmetric key cryptography

Digital envelope

Public key cryptography

Digital certificates and public key infrastructure (PKI)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a digital certificate?

To encrypt data

To prevent credit card fraud

To verify the identity of a sender

To filter communication packets

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one of the key steps in developing a security plan?

Performing a risk assessment

Creating a security team

Performing periodic security audits

All of the above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?