Refers to the ability to identify the person or entity with whom you are dealing on the internet

About Us

McqMate.com is an educational platform, Which is developed BY STUDENTS, FOR STUDENTS, The only objective of our platform is to assist fellow students in preparing for exams and in their Studies throughout their Academic career.

what we offer ?

» We provide you study material i.e. PDF's for offline use.
» We take free online Practice/Mock test for exam preparation.
» Each MCQ is open for further discussion on discussion page.
» All the services offered by McqMate are free.

24.__________ refers to the ability to ensure that e-commerce participants do not deny theironline actions.a.Nonrepudiationb.Authenticityc.Availabilityd.IntegrityAnswer:aPage Reference:263Difficulty:Moderate

AACSB:Reflective Thinking25.Which of the following is an example of an integrity violation of e-commerce security?Page Reference:263Difficulty:Moderate

Get answer to your question and much more

AACSB:Reflective Thinking26._____ refers to the ability to identify the person or entity with whom you are dealing on theInternet.Page Reference:263Difficulty:Moderate

Get answer to your question and much more

AACSB:Reflective Thinking

We have textbook solutions for you!

The document you are viewing contains questions related to this textbook.

Discovering Computers, Essentials ©2018: Digital Technology, Data, and Devices

Sebok/Vermaat

Expert Verified

6Online Security and Payment Systems27.____ refers to the ability to ensure that an e-commerce site continues to function as intended.Page Reference:264Difficulty:Moderate

Get answer to your question and much more

AACSB:Reflective Thinking28.Which of the following isnota key point of vulnerability when dealing with e-commerce?a.The client computera.The servera.The communications pipelinea.The credit card companiesAnswer:dPage Reference:266Difficulty:Moderate

AACSB:Reflective Thinking29.All of the following are file types most likely to be infected by a file-infecting virusexcept:Page Reference:268Difficulty:Hard

Get answer to your question and much more

AACSB:Reflective Thinking30.All of the following are file types likely to be infected by a macro virusexcept:Page Reference:268Difficulty:Hard

Get answer to your question and much more

AACSB:Reflective Thinking

Chapter 5E-commerce: Business.Technology.Society, 4th ed.731.The Slammer worm targeted a known vulnerability in:Page Reference:268Difficulty:Hard

Get answer to your question and much more

AACSB:Reflective Thinking32.Botnets are used for all of the following except:a.DDoS attacks.b.Phishing attacks.c.Sending spam.d.Storing network traffic for later analysis.Answer:bPage Reference:269Difficulty:Moderate

AACSB:Reflective Thinking

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 22 pages?

Upload your study docs or become a

Course Hero member to access this document

Tags

Credit card, AACSB, Public key cryptography, Page Reference, Reflective thinking

We have textbook solutions for you!

The document you are viewing contains questions related to this textbook.

The document you are viewing contains questions related to this textbook.

Discovering Computers, Essentials ©2018: Digital Technology, Data, and Devices

Sebok/Vermaat

Expert Verified

What refers to the ability to identify the person or entity with whom you are dealing on the Internet?

Internet identity [IID], also online identity or internet persona, is a social identity that an Internet user establishes in online communities and websites.

What is the ability to ensure that e

test like questions from ecommerce 2012 8/e.

What is integrity in e

Integrity Integrity is another crucial concept of eCommerce Security. It means ensuring that any information that customers have shared online remains unaltered. The principle states that the online business is utilizing the customers' information as given, without changing anything.

Is collected data that can be used to identify and locate an individual?

Personal Identifying Information [PII] is any type of data that can be used to identify someone, from their name and address to their phone number, passport information, and social security numbers.

Chủ Đề