placeholder image to represent content

Week Quiz

Quiz by Mark Carroll

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
20 questions
Show answers
  • Q1
    ________ refers to the ability to ensure that e-commerce participants do not deny their online actions.
    Nonrepudiation
    Availability
    Integrity
    Authenticity
    60s
  • Q2
    ________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.
    Availability
    Integrity
    Authenticity
    Nonrepudiation
    60s
  • Q3
    Which of the following is an example of an integrity violation of e-commerce security?
    A merchant uses customer information in a manner not intended by the customer.
    A website is not actually operated by the entity the customer believes it to be.
    An unauthorized person intercepts an online communication and changes its contents.
    A customer denies that he or she is the person who placed the order.
    60s
  • Q4
    The overall rate of online credit card fraud is ________ of all online card transactions.
    around 15%
    less than 1%
    around 5%
    around 10%
    60s
  • Q5
    Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:
    a backdoor.
    spyware.
    browser parasite.
    adware.
    60s
  • Q6
    Malware that comes with a downloaded file requested by a user is called a:
    PUP.
    drive-by download.
    Trojan horse.
    backdoor.
    60s
  • Q7
    Automatically redirecting a web link to a different address is an example of:
    social engineering.
    pharming.
    sniffing.
    DDoS attack.
    60s
  • Q8
    ________ typically attack governments, organizations, and sometimes individuals for political purposes.
    Hacktivists
    Grey hats
    Crackers
    White hats
    60s
  • Q9
    A worm does not need to be activated by a user for it to replicate itself.
    True
    False
    60s
  • Q10
    Vishing attacks exploit SMS messages.
    False
    True
    60s
  • Q11
    A ________ is a hardware or software component that acts as a filter to prevent unwanted packets from entering a network.
    proxy server
    firewall
    PPTP
    virtual private network
    60s
  • Q12
    Which of the following is the most common protocol for securing a digital channel of communication?
    DES
    VPN
    HTTP
    SSL/TLS
    60s
  • Q13
    Linden Dollars, created for use in Second Life, are an example of:
    EBPP.
    peer-to-peer payment systems.
    virtual currency.
    digital cash.
    60s
  • Q14
    Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?
    NFC
    text messaging
    DES
    IM
    60s
  • Q15
    There is a finite number of Bitcoins that can be created.
    False
    True
    60s

Teachers give this quiz to your class