Chapter 9 Questions.docx

上传人:b****8 文档编号:11127261 上传时间:2023-02-25 格式:DOCX 页数:10 大小:17.12KB
下载 相关 举报
Chapter 9 Questions.docx_第1页
第1页 / 共10页
Chapter 9 Questions.docx_第2页
第2页 / 共10页
Chapter 9 Questions.docx_第3页
第3页 / 共10页
Chapter 9 Questions.docx_第4页
第4页 / 共10页
Chapter 9 Questions.docx_第5页
第5页 / 共10页
点击查看更多>>
下载资源
资源描述

Chapter 9 Questions.docx

《Chapter 9 Questions.docx》由会员分享,可在线阅读,更多相关《Chapter 9 Questions.docx(10页珍藏版)》请在冰豆网上搜索。

Chapter 9 Questions.docx

Chapter9Questions

IntroductiontoElectronicCommerce,3e(Turban)

Chapter9ElectronicCommerceSecurityandFraudProtection

9.1True/False–13Q

1)AccordingtotheCSIComputerCrimeandSecuritySurvey,firewallswerethemostcommonlyuseddefensetechnologiesin2008.

 

Answer:

FALSE

Diff:

1PageRef:

332

 

2)AccordingtotheCSIComputerCrimeSecuritySurvey,themostfrequentlyoccurringcomputerattackswerefromvirusesin2008.

 

Answer:

TRUE

Diff:

1PageRef:

333

 

3)TheInternetanditsnetworkprotocolswereneverintendedforusebyuntrustworthypeopleorcriminals.

 

Answer:

TRUE

Diff:

1PageRef:

334

 

6)Keystrokeloggingcapturesandrecordsuserkeystrokes.

 

Answer:

TRUE

Diff:

1PageRef:

335

9)CybercrimesareintentionalcrimescarriedoutontheInternet.

 

Answer:

TRUE

Diff:

1PageRef:

339

11)AnECsecuritystrategyrequiresmultiplelayersofdefenseagainstrisksfrommalware,fraudsters,customers,andemployees.

 

Answer:

TRUE

Diff:

1PageRef:

341

 

12)Detectionmeasuresareactionsthatwillmakecriminalsabandontheirideaofattackingaspecificsystem.

 

Answer:

FALSE

Diff:

2PageRef:

341

 

15)InternetfraudhasgrownevenfasterthantheInternetitself.

 

Answer:

TRUE

Diff:

2PageRef:

348

 

17)Confidentiality,integrity,andawarenessarethethreecomponentsoftheCIAsecuritytriad.

 

Answer:

FALSE

Diff:

3PageRef:

353

 

19)Encryptionalgorithmisthemathematicalformulausedtoencryptplaintextintociphertext,andviceversa.

 

Answer:

TRUE

Diff:

2PageRef:

357

21)StrongECsecuritymakesonlineshoppingmoreconvenientforcustomers.

 

Answer:

FALSE

Diff:

2PageRef:

374

22)Shopperscanrelyonfraudprotectionprovidedbycreditcardissuerstoprotectthemfromidentitytheft.

 

Answer:

FALSE

Diff:

2PageRef:

374

 

23)Phishingisrampantbecausesomepeoplerespondtoitandmakeitprofitable.

 

Answer:

TRUE

Diff:

1PageRef:

374

 

9.2MultipleChoice–8Q

1)WhichofthefollowingistheunderlyingreasonwhycomprehensiveECsecurityisnecessary?

A)TheInternetwasdesignedformaximumefficiencywithoutregardforitssecurityoruserswithmaliciousintent.

B)Theshifttowardprofit-motivatedcrimes

C)SecuritycostsandeffortsfromreactingtoonlineattacksandpayingfordamagesaregreaterthanifanECsecuritystrategyisinplace.

D)ManycompaniesfailtoimplementbasicITsecuritymanagementbestpractices,businesscontinuityplans,anddisasterrecoveryplans.

 

Answer:

C

Diff:

3PageRef:

336

 

3)Theprocessofverifyingtherealidentityofanindividual,computer,computerprogram,orECWebsitebestdescribes

A)integrity.

B)availability.

C)authentication.

D)nonrepudiation.

 

Answer:

C

Diff:

2PageRef:

340

 

4)Theassurancethatanonlinecustomerortradingpartnercannotfalselydenytheirpurchaseortransactionisreferredtoas

A)integrity.

B)availability.

C)authentication.

D)nonrepudiation.

 

Answer:

D

Diff:

2PageRef:

340

 

7)________isthecriminal,fraudulentprocessofattemptingtoacquireconfidentialinformationbymasqueradingasatrustworthyentity.

A)Spamming

B)Pretexting

C)Socialengineering

D)Phishing

 

Answer:

D

Diff:

2PageRef:

346

8)Assurancethatstoreddatahasnotbeenmodifiedwithoutauthorizationandamessagethatwassentisthesamemessagethatwasreceivedisreferredtoas

A)integrity.

B)availability.

C)authentication.

D)nonrepudiation.

 

Answer:

A

Diff:

2PageRef:

353

 

9)ThesuccessandsecurityofECismeasuredby

A)encryption,functionality,andprivacy.

B)quality,reliability,andspeed.

C)authentication,authorization,andnonrepudiation.

D)confidentiality,integrity,andavailability.

 

Answer:

D

Diff:

3PageRef:

353

 

12)Fingerprintscanners,facialrecognitionsystems,andvoicerecognitionareexamplesof________thatrecognizeapersonbysomephysicaltrait.

A)biometricsystems

B)humanfirewalls

C)intrusiondetectionsystems

D)accesscontrollists

 

Answer:

A

Diff:

2PageRef:

356

28)AccordingtoanInformationWeeksurvey,themajorityofsecuritychallengesforcorporationsinclude

A)managingthecomplexityofsecurity.

B)preventingdatabreachesfromoutsideattackers.

C)enforcingsecuritypolicies.

D)alloftheabove.

 

Answer:

D

Diff:

1PageRef:

372

 

9.3FillintheBlank–10Q

 

3)________istheestimatedcost,loss,ordamagethatcanresultifathreatexploitsavulnerability.

 

Answer:

Exposure

Diff:

1PageRef:

337

4)Anybusinessactivitythatusesdeceitfulpracticesordevicestodepriveanotherofpropertyorotherrightsisknownas________.

 

Answer:

fraud

Diff:

1PageRef:

337

 

5)________isacrimewaretechniquetostealtheidentityofatargetcompanytogettheidentitiesofitscustomers.

 

Answer:

Phishing

Diff:

2PageRef:

337

 

10)________isaprocesstoverifytherealidentityofanentity,whichcouldbeanindividual,computer,computerprogram,orECWebsite.

 

Answer:

Authentication

Diff:

2PageRef:

340

 

11)________istheprocessofdeterminingwhattheauthenticatedentityisallowedtoaccessandwhatoperationsitisallowedtoperform.

 

Answer:

Authorization

Diff:

2PageRef:

340

 

12)________istheassurancethatonlinecustomersortradingpartnerscannotfalselydenytheirpurchaseortransaction.

 

Answer:

Nonrepudiation

Diff:

3PageRef:

340

17)________istheassurancethatdataareaccurateorthatamessagehasnotbeenaltered.

 

Answer:

Integrity

Diff:

2PageRef:

353

 

18)________istheassuranceofdataprivacy.

 

Answer:

Confidentiality

Diff:

2PageRef:

 

20)________istheprocessofscramblingamessageinsuchawaythatitisdifficult,expensive,ortime-consumingforanunauthorizedpersontounscrambleit.

 

Answer:

Encryption

Diff:

2PageRef:

357

 

22)________arebarriersbetweenatrustednetworkorPCandtheuntrustworthyInternet.

 

Answer:

Firewalls

Diff:

1PageRef:

361

 

END

 

9.4Essay

1)Comparecurrentmotivesofhackerstothoseofthepast.

Answer:

IntheearlydaysofEC,manyhackerssimplywantedtogainfameornotorietybydefacingWebsitesorgainingroot,whichmeansgainingunrestrictedaccesstoanetwork.Criminalsandcriminalgangsarenowprofitoriented,andtheirtacticsarenotlimitedtotheonlineworld.

Diff:

1PageRef:

334

2)ListandbrieflydescribethethreecomponentsoftheCIAsecuritytriad.

Answer:

TheCIAtriadincludesconfidentiality,integrity,andavailability.Confidentialityistheassuranceofdataprivacy.Thedataortransmittedmessageisencryptedsothatitisreadableonlybythepersonforwhomitisintended.Theconfidentialityfunctionpreventsunauthorizeddisclosureofinformation.Integrityistheassurancethatdataareaccurateorthatamessagehasnotbeenaltered.Itmeansthatstoreddatahasnotbeenmodifiedwithoutauthorization;amessagethatwassentisthesamemessagethatwasreceived.Availabilityistheassurancethataccesstodata,theWebsite,orotherECdataserviceistimely,available,reliable,andrestrictedtoauthorizedusers.

Diff:

2PageRef:

352-353

3)ListthesixmajorobjectivesofECdefensestrategies.

Answer:

Preventionanddeterrence,detection,containment,recovery,correction,andawarenessandcompliancearethesixobjectives.

Diff:

2PageRef:

354-355

4)Brieflydiscussthefiveencryptioncomponents.

Answer:

Thefivecomponentsareplaintext,encryptionalgorithm,keyorkeyvalue,keyspace,andciphertext.Plaintextistheoriginalmessageordocumentthatiscreatedbytheuserandisinhuman-readableform.Theencryptionalgorithmisthesetofproceduresormathematicalfunctionsusedtoencryptordecryptamessage.Thekeyorkeyvalueisthesecretvalueusedwiththealgorithmtotransformthemessage.Keyspacereferstothelargenumberofpossiblekeyvaluescreatedbythealgorithmtousewhentransformingthemessage.Ciphertextisthemessageordocumentthathasbeenencryptedintounreadableform.

Diff:

2PageRef:

357

5)Brieflydescribefourmajorcomponentsforprotectinginternalinformationflowinsideanorganization.

Answer:

Firewall,virtualprivatenetwork,intrusiondetectionsystem,andhoneynetandhoneypotarefourcomponents.Afirewallisasinglepointbetweentwoormorenetworkswherealltrafficmustpass;thedeviceauthenticates,controls,andlogsalltraffic.AvirtualprivatenetworkisanetworkthatusesthepublicInternettocarryinformationbutremainsprivatebyusingencryptiontoscramblethecommunications,authenticationtoensurethatinformationhasnotbeentamperedwith,andaccesscontroltoverifytheidentityofanyoneusingthenetwork.Intrusiondetectionsystemsareaspecialcategoryofsoftwarethatmonitoractivityacrossanetworkoronahostcomputer,watchforsuspiciousactivity,andtakeautomatedactionbasedonwhatitsees.Ahoneynetisanetworkofhoneypots,andhoneypotsactasdecoysandarewatchedtostudyhownetworkintrusionsoccur.

Diff:

3PageRef:

361-363

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > PPT模板 > 其它模板

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1