All of the following experienced high prole data breaches in 2015 except 1 A

All of the following experienced high prole data

This preview shows page 4 - 7 out of 53 pages.

10) All of the following experienced high-pro±le data breaches in 2015 except : 1. A) CVS.2. B) Walgreens.3. C) Amazon.4. D) Experian.Answer: C Diff: Moderate AACSB: Application of knowledge LO: 5.2: Identify the key security threats in the e-commerce environment. 11) Bitcoins are an example of: Diff: Moderate AACSB: Information technology LO: 5.2: Identify the key security threats in the e-commerce environment. 12) The overall rate of online credit card fraud is ________ of all online card transactions. Diff: Di²cult AACSB: Information technology LO: 5.2: Identify the key security threats in the e-commerce environment. 13) Which of the following has the Internet Advertising Bureau urged advertisers to abandon?
Image of page 4
2/20/2018 Laudon - Ecommerce 2017 - Quiz Answer Chapter 5 1. A) HTML 2. B) HTML5 3. C) Adobe Flash 4. D) Adobe Acrobat Answer: C Diff: Moderate AACSB: Information technology LO: 5.2: Identify the key security threats in the e-commerce environment. 14) Accessing data without authorization on Dropbox is an example of which of the following? 1. A) social network security issue2. B) cloud security issue3. C) mobile platform security issue4. D) sni²ngAnswer: B Diff: Moderate AACSB: Information technology LO: 5.2: Identify the key security threats in the e-commerce environment. 15) All of the following are prominent hacktivist groups except : Diff: Moderate AACSB: Information technology LO: 5.2: Identify the key security threats in the e-commerce environment. 16) Con±cker is an example of a: Diff: Moderate AACSB: Information technology LO: 5.2: Identify the key security threats in the e-commerce environment. 17) Which of the following is the leading cause of data breaches?
Image of page 5
2/20/2018 Laudon - Ecommerce 2017 - Quiz Answer Chapter 5 Diff: Moderate AACSB: Information technology LO: 5.2: Identify the key security threats in the e-commerce environment.
Image of page 6
Image of page 7

You've reached the end of your free preview.

Want to read all 53 pages?

  • Fall '16
  • AACSB, Public-key cryptography, Pretty Good Privacy

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture