Chapter 10 - E-Commerce Security Flashcards

1
Q

Originally, the term _____ was used to describe a dedicated programmer who enjoyed writing complex codes that tested the limits of technology.

A

Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

______ refers to preventing data delays or denials.

A

Necessity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

______ refers to programs that are embedded transparently in Web pages and that cause action to occur.

A

Active content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A(n) is a small application program.

A

Applet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Java is a programming language developed by ______.

A

Sun Microsystems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A(n) ______ allows anyone with knowledge of its existence to cause damage by observing transactions, deleting data or stealing data.

A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A(n) ____ is software that attaches itself to another program and can cause damage when the host program is activated.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

________ is the electronic defacing of an existing Web site’s page.

A

Cybervandalism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_____ is pretending to be someone you are not or representing a Web site as an original when it is really a fake.

A

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_____ encryption encodes a message with an algorithm that uses a single numeric key, such as 7373737, to encode and decode data.

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly