Search Header Logo

e-commerce security and payment systems

Authored by Anh Xuân

Social Studies

University

Used 1+ times

e-commerce security and payment systems
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What are the threats in e-commerce?

Hacking

Malware

Payment fraud and DoS

All are correct

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What does e-commerce thrive on depend in?

Market

Customer

Trust

Consumer

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What protects sensitive information

Firewalls

Authentication

Encryption

Secure coding practices

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What are the benefits of e-commerce?

Convenience

Global reach

Cost-effective

All of the above

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which technology is commonly used for secure online transactions?

Blockchain

SSL

RFID

IoT

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The passage mentions there's a balance to be struck between security and other factors. Can you elaborate on what specific privacy concerns might arise in trying to improve e-commerce security?

Collecting more customer data for stronger security measures might raise concerns about user profiles and targeted advertising.

Encryption can make it difficult for law enforcement to track illegal activity.

Firewalls can slow down website loading times.

Implementing secure coding practices requires more time and resources.

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The passage talks about various security threats. But how can an e-commerce business identify if it's under attack, especially from things like malware or man-in-the-middle attacks?

User complaints about slow website loading times always indicate a DoS attack.

Unusual spikes in traffic or login attempts can be a sign of an attack.

Intrusion Detection/Prevention Systems (IDS/IPS) can monitor network activity for suspicious behavior and alert administrators

Regular security audits are a good practice but may not detect ongoing attacks.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?