Question 1 2..5 points
Which of the following statements about public key encryption is true?
Question options:
Public key encryption uses three mathematically related digital keys.
Public key encryption ensures message integrity.
Public key encryption is based on the idea of irreversible mathematical functions.
Public key encryption ensures authentication of the sender.
Question 2 2..5 points
Which of the following is an example of an integrity violation of e-commerce security?
Question options:
An unauthorized person intercepts an online communication and changes its
contents.
A website is not actually operated by the entity the customer believes it to be.
A customer denies that they are the person who placed the order.
A merchant uses customer information in a manner not intended by the customer.
Question 3 2..5 points
Which of the following is a botnet typically used for?
Question options:
Installing PUPs
DDoS attacks
Phishing attacks
Delivering a "payload"
, Question 4 .5 points
Proxy servers are also known as
Question options:
firewalls.
application gateways.
dual home systems.
packet filters.
Question 5 2..5 points
A digital certificate contains all the following, except the
Question options:
digital signature of the certification authority.
subject's public key.
digital certificate serial number.
subject's private key.
Question 6 2..5 points
PayPal is an example of a(n) _______ system.
Question options:
online stored value payment
accumulating balance
digital checking
digital credit card
Question 7 2..5 points
Which of the following is an example of malicious code?