Mobile Payment Systems Quiz
48 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What are online stored value systems based on?

  • Cryptocurrency balances held in wallets
  • Digital currencies that are automatically generated
  • Value stored in a consumer’s bank or credit account (correct)
  • Assets stored in physical payment cards
  • Which of the following is an example of a Buy Now Pay Later (BNPL) service?

  • Google Pay
  • SPayLater (correct)
  • Apple Pay
  • Venmo
  • What technology is commonly used in mobile payment systems for transactions?

  • Multi-Factor Authentication (MFA)
  • Blockchain technology
  • Augmented Reality (AR)
  • Near Field Communication (NFC) (correct)
  • Which mobile wallet app is classified as a universal proximity application?

    <p>Samsung Pay</p> Signup and view all the answers

    What type of malware is primarily targeting Android devices among mobile platforms?

    <p>Rogue apps</p> Signup and view all the answers

    In which regions is the use of mobile payment systems predominantly established?

    <p>Europe and Asia</p> Signup and view all the answers

    Which of the following is NOT one of the threats faced by mobile platforms?

    <p>DDoS attacks</p> Signup and view all the answers

    Which feature of encryption provides assurance that a message has not been altered during transit?

    <p>Message integrity</p> Signup and view all the answers

    What is a characteristic of branded store proximity wallet apps?

    <p>Exclusive to a single brand or store</p> Signup and view all the answers

    What factor is contributing to the expansion of mobile payment systems in the United States?

    <p>Growing acceptance by retailers and consumers</p> Signup and view all the answers

    What common security issue arises from sharing files that link to malicious sites?

    <p>Manual sharing scams</p> Signup and view all the answers

    Which statement is true regarding online stored value systems?

    <p>They typically utilize consumer bank accounts for stored value.</p> Signup and view all the answers

    In cloud security, what is a major concern regarding the management of data?

    <p>Responsibility for data security</p> Signup and view all the answers

    What is the primary function of a firewall?

    <p>To filter packets based on security policy</p> Signup and view all the answers

    Which of the following describes the term 'nonrepudiation' in the context of encryption?

    <p>Ensuring sender cannot deny sending the message</p> Signup and view all the answers

    Which type of attack is characterized by overwhelming a target to disrupt service?

    <p>DDoS</p> Signup and view all the answers

    Which component is responsible for handling all communications from the Internet?

    <p>Proxy server</p> Signup and view all the answers

    What aspect of e-commerce security ensures data can only be read by authorized parties?

    <p>Confidentiality</p> Signup and view all the answers

    What is NOT a typical aspect of a security plan's implementation?

    <p>Network performance monitoring</p> Signup and view all the answers

    What are the primary online payment methods used in e-commerce?

    <p>Credit and debit cards</p> Signup and view all the answers

    Which of the following poses a limitation of online credit card payments for consumers?

    <p>Social equity</p> Signup and view all the answers

    What is the primary method involved in spoofing?

    <p>Using someone else's email or IP address</p> Signup and view all the answers

    Which element is NOT part of the e-commerce security plan?

    <p>Content delivery optimization</p> Signup and view all the answers

    What roles do merchants, clearinghouses, and card-issuing banks play in an online credit card transaction?

    <p>They facilitate the transaction process between consumers and banks</p> Signup and view all the answers

    How does pharming benefit a hacker?

    <p>By redirecting a URL to a different address</p> Signup and view all the answers

    Which of the following best describes an intrusion prevention system?

    <p>A system that detects and prevents unauthorized access</p> Signup and view all the answers

    What is a common characteristic of spam websites?

    <p>They may harbor malicious code</p> Signup and view all the answers

    What distinguishes a Distributed Denial of Service (DDoS) attack from a standard Denial of Service (DoS) attack?

    <p>DDoS uses multiple computers to overwhelm the target</p> Signup and view all the answers

    Which approach can be used by sniffers to identify problems in networks?

    <p>By monitoring network traffic</p> Signup and view all the answers

    What is often the biggest financial threat to businesses from insider attacks?

    <p>Employee embezzlement</p> Signup and view all the answers

    Insider threats are more likely to stem from which factor?

    <p>Poor security procedures</p> Signup and view all the answers

    What is one of the potential uses of a DDoS attack aside from overwhelming a network?

    <p>To insert malware or steal data</p> Signup and view all the answers

    How many keys are used in symmetric key cryptography?

    <p>A unique key for each transaction</p> Signup and view all the answers

    What is the main characteristic of public key cryptography regarding key usage?

    <p>Two mathematically related keys are used</p> Signup and view all the answers

    What does the sender use to ensure the authenticity of a message in public key cryptography?

    <p>Sender's private key to create a digital signature</p> Signup and view all the answers

    Which method cannot be used to decrypt a message that has been encrypted with a public key?

    <p>Sender's private key</p> Signup and view all the answers

    What is the purpose of using a hash function in public key cryptography?

    <p>To verify message integrity</p> Signup and view all the answers

    What is a characteristic of the keys used in public key cryptography?

    <p>One key is secret and one is public</p> Signup and view all the answers

    In which method is the encryption performed by the sender using the recipient's key?

    <p>Asymmetric key cryptography</p> Signup and view all the answers

    What aspect of symmetric key cryptography influences its encryption strength?

    <p>Length of the binary key</p> Signup and view all the answers

    What is the primary purpose of phishing tactics?

    <p>To obtain confidential information for financial gain</p> Signup and view all the answers

    Which of the following is NOT a tactic related to phishing?

    <p>Malware distribution</p> Signup and view all the answers

    What are the key goals associated with hacking?

    <p>Cybervandalism and data breaches</p> Signup and view all the answers

    What was the leading cause of data breaches in 2021?

    <p>Malicious code and human errors</p> Signup and view all the answers

    Which method is commonly used to establish customer identity for preventing credit card fraud?

    <p>E-signatures and multi-factor authentication</p> Signup and view all the answers

    Identity fraud primarily involves unauthorized use of which type of data?

    <p>Personal data for illegal financial benefit</p> Signup and view all the answers

    Which statement correctly describes cybervandalism?

    <p>It involves disrupting or destroying websites.</p> Signup and view all the answers

    What percentage increase in data breaches was noted in 2021 compared to 2020?

    <p>68%</p> Signup and view all the answers

    Study Notes

    E-commerce Security and Payment Systems

    • E-commerce security involves multiple layers, considering technology, policies, and regulations.
    • Key security issues in e-commerce include client, server, and communication pipeline vulnerabilities.
    • Malicious code, including exploits, drive-by downloads, and malware, poses significant threats.
    • Phishing, hacking, cybervandalism, and hacktivism are common e-commerce crimes.
    • Data breaches, often caused by malicious code or human error, are major security concerns.
    • Credit card fraud and theft remain serious issues.
    • Identity theft involves unauthorized use of personal data for financial gain.
    • Spoofing, pharming, and spam tactics target websites.
    • Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks overwhelm systems.
    • Insider attacks pose a significant threat due to privileged insider access.
    • Social networks, mobile platforms, and cloud environments present unique security challenges.
    • Security is not only about technology but also encompasses organizational policies and procedures.
    • Encryption techniques, like symmetric and public key cryptography, play crucial roles in securing data.
    • Digital certificates and public key infrastructure are components of secure communication systems.
    • Firewalls and proxy servers protect networks.
    • Essential security policies for businesses include risk assessment, security policies, implementation strategies, security organizations, access controls, and security policies.

    Good E-commerce Security

    • Implementing new technologies, organizational policies, industry standards, and government regulations are crucial for high security.
    • The cost of security should be balanced against potential losses.
    • Security often fails at the weakest link in the system.

    The Tension Between Security and Other Values

    • Security is not the only consideration; it must be balanced with ease of use and profitability.
    • Adding more security measures can negatively impact usability and slow down systems.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on mobile payment systems and online stored value systems. This quiz covers various topics such as Buy Now Pay Later services, mobile wallet apps, and security concerns related to mobile platforms. Challenge yourself with these questions and learn more about the evolving landscape of digital payments.

    More Like This

    Philippine Financial System Quiz
    5 questions
    Modern Forms of Money Quiz
    9 questions

    Modern Forms of Money Quiz

    MiraculousJaguar8471 avatar
    MiraculousJaguar8471
    Use Quizgecko on...
    Browser
    Browser