
Week Quiz
Quiz by Mark Carroll
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
20 questions
Show answers
- Q1________ refers to the ability to ensure that e-commerce participants do not deny their online actions.NonrepudiationAvailabilityIntegrityAuthenticity60s
- Q2________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.AvailabilityIntegrityAuthenticityNonrepudiation60s
- Q3Which of the following is an example of an integrity violation of e-commerce security?A merchant uses customer information in a manner not intended by the customer.A website is not actually operated by the entity the customer believes it to be.An unauthorized person intercepts an online communication and changes its contents.A customer denies that he or she is the person who placed the order.60s
- Q4The overall rate of online credit card fraud is ________ of all online card transactions.around 15%less than 1%around 5%around 10%60s
- Q5Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:a backdoor.spyware.browser parasite.adware.60s
- Q6Malware that comes with a downloaded file requested by a user is called a:PUP.drive-by download.Trojan horse.backdoor.60s
- Q7Automatically redirecting a web link to a different address is an example of:social engineering.pharming.sniffing.DDoS attack.60s
- Q8________ typically attack governments, organizations, and sometimes individuals for political purposes.HacktivistsGrey hatsCrackersWhite hats60s
- Q9A worm does not need to be activated by a user for it to replicate itself.TrueFalse60s
- Q10Vishing attacks exploit SMS messages.FalseTrue60s
- Q11A ________ is a hardware or software component that acts as a filter to prevent unwanted packets from entering a network.proxy serverfirewallPPTPvirtual private network60s
- Q12Which of the following is the most common protocol for securing a digital channel of communication?DESVPNHTTPSSL/TLS60s
- Q13Linden Dollars, created for use in Second Life, are an example of:EBPP.peer-to-peer payment systems.virtual currency.digital cash.60s
- Q14Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?NFCtext messagingDESIM60s
- Q15There is a finite number of Bitcoins that can be created.FalseTrue60s