ch15 - Chapter 15 Security on the E-Commerce Site h Test...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 15 Security on the E-Commerce Site h Test Bank 1. The Internet was originally designed without a very high concern about data security and was primarily intended A. as a channel for public information. B. for sharing information. C. for defense contract information only. D. for sharing documents. E. both b and d. Answer: E Page: 329 2. In order to provide security and privacy in Internet transmissions, the science of crytography is used to produce ______________________. A. firewalls B. Internet locks C. cryptosystems D. WWW codes E. Hypertext Secure Code Language (HSCL) Answer: C Page: 329 3. The two types of cryptosystems currently in use for e-commerce transactions are A. modern and post-modern. B. public key and centroid. C. encryption and decryption. D. linear and asymptopic. E. symmetric and asymmetric. Answer: E Page: 329 4. Both public and private keys can be used to encrypt information. A. True B. False Answer: A Page: 329 5. A public key algorithm that involves the product of large prime numbers is called A. prime time security. B. pretty good keys. C. RSA. D. WWWSecure. E. prime technology. Answer: C Page: 330
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
248    Electronic Marketing 6. Symmetric cryptosystems are easier to implement than asymmetric cryptosystems because there is only one key involved. A. True B. False Answer: A Page: 330 7. The one key used in symmetric cryptosystems must be usually be delivered by A. private keys. B. RSA algorithms. C. trusted couriers. D. key-agreement algorithms. E. parcel post. Answer: C Page: 331 8. ________________________is the process of verifying that people or entities are who they claim to be. A.
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 01/31/2011 for the course MKTG 370 taught by Professor N/a during the Spring '10 term at Mountain State.

Page1 / 6

ch15 - Chapter 15 Security on the E-Commerce Site h Test...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online