SEC 573 Week 1 Quiz | Devry University
- Devry University / SEC 573
- 17 Dec 2021
- Price: $5
- Computer Science Assignment Help / Networking Assignment Help
SEC 573 Week 1 Quiz | Devry University
Question 1
E-commerce or e-business is just another name for online shopping.
· True
· False
Question 2
Which of the following is a potential legitimate issue of e-commerce or e-business?
· Credit card fraud
· Identity theft
· Copyright infringement
· All of these answers are correct
Question 3
Which of the following is not a benefit of e-commence from a consumer’s perspective?
· 24-hour access
· Virtual offers
· Reduced inventories and overhead
· Competitive discounts
Question 4
Which of the following best describes the general concern of an e-commerce or e-business?
· All of these answers are correct
· Engagement without human interaction
· Internet availability
· Data security
Question 5
The security quality of an e-business or e-commerce centers on the assurance of authentication, authorization, ________, and integrity.
· flexibility
· confidentiality
· usability
· predictivity
Question 6
The e-commerce security structure includes components that are used to secure electronic transactions as well as protocols these components use to communicate with each other.
· True
· False
Question 7
Which of the following could be a detractor in building trust between consumers and an e-commerce entity?
· Quick response to customer complaints
· Free and fast shipping
· Compliance to data security standards
· A sophisticated and complex website
Question 8
Among the four stages of a security solution life cycle, which one focuses on identifying the best course of action to address identified vulnerabilities?
· Monitoring
· Planning
· Assessment
· Implementation
Question 9
Among the four stages of a security solution life cycle, which one is an ongoing process that never officially ends?
· Monitoring
· Assessment
· Planning
· Implementation
Question 10
Which of the following is an e-commerce security threat?
· Authentication attacks
· Denial-of-service attacks
· All of these options are correct
· Malware attacks