L9 Online Security

L9 Online Security

University

15 Qs

quiz-placeholder

Similar activities

 Chapter 9: Securing Your System: Protecting Your Digital Data a

Chapter 9: Securing Your System: Protecting Your Digital Data a

University

13 Qs

Ecommerce ERP Quiz 4

Ecommerce ERP Quiz 4

University

20 Qs

DBMS

DBMS

University

15 Qs

Data Security

Data Security

University

15 Qs

Business Intelligence Quiz

Business Intelligence Quiz

University

20 Qs

Multi Factor Authentication

Multi Factor Authentication

University

20 Qs

Database Architecture

Database Architecture

University

20 Qs

Quiz

Quiz

University

20 Qs

L9 Online Security

L9 Online Security

Assessment

Quiz

Computers

University

Medium

Created by

Shazwani undefined

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Below are key e-commerce security EXCEPT :

Repudiation

Availability

Privacy

Confidentiality

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a key security threat in the e-commerce environment?

Malicious code

Social network security issues

Poorly designed software

All of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does a firewall contribute to e-commerce security?

By filtering communication packets

By encrypting data

By detecting phishing attempts

By preventing credit card fraud

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of an Intrusion Detection System (IDS)?

To prevent credit card fraud

To detect malicious code

To encrypt data

To filter communication packets

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of encryption technology uses a public key and a private key?

Symmetric key cryptography

Digital envelope

Public key cryptography

Digital certificates and public key infrastructure (PKI)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a digital certificate?

To encrypt data

To prevent credit card fraud

To verify the identity of a sender

To filter communication packets

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one of the key steps in developing a security plan?

Performing a risk assessment

Creating a security team

Performing periodic security audits

All of the above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?