E-commerce Security and Payment Systems (EC 2023 Week-5.3)

E-commerce Security and Payment Systems (EC 2023 Week-5.3)

3rd Grade

17 Qs

quiz-placeholder

Similar activities

TIRH + ADM

TIRH + ADM

1st - 10th Grade

20 Qs

quizizz asj

quizizz asj

1st - 12th Grade

15 Qs

POWERPOINT 10/11

POWERPOINT 10/11

KG - University

21 Qs

quiz9

quiz9

1st - 3rd Grade

20 Qs

Linux-2 Quiz 2 -- LAMP

Linux-2 Quiz 2 -- LAMP

1st - 12th Grade

15 Qs

Workshop - Introduce Of a Wireshark

Workshop - Introduce Of a Wireshark

1st Grade - University

12 Qs

1st Monthly Examination in Computer Programming 3

1st Monthly Examination in Computer Programming 3

KG - 12th Grade

17 Qs

Module 3

Module 3

3rd Grade

15 Qs

E-commerce Security and Payment Systems (EC 2023 Week-5.3)

E-commerce Security and Payment Systems (EC 2023 Week-5.3)

Assessment

Quiz

Computers

3rd Grade

Medium

Created by

Sas Pratama

Used 6+ times

FREE Resource

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Confidentiality is sometimes confused with:

privacy

authenticity

integrity

nonrepudiation

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

________ is the ability to ensure that e-commerce participants do not deny their online actions.

Nonrepudiation

Authenticity

Availability

Integrity

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of an integrity violation of e-commerce security?

A website is not actually operated by the entity the customer believes it to be.

A merchant uses customer information in a manner not intended by the customer.

A customer denies that he is the person who placed the order.

An unauthorized person intercepts an online communication and changes its contents.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of an online privacy violation?

your e-mail being read by a hacker

your online purchasing history being sold to other merchants without your consent

your computer being used as part of a botnet

your e-mail being altered by a hacker

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

________ is the ability to ensure that messages and data are only available to those authorized to view them.

Confidentiality

Integrity

Privacy

Availability

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is not a key factor for establishing e-commerce security?

data integrity

technology

organizational policies

laws and industry standards

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

spyware

a backdoor

browser parasite

adware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?