SEOTrance
SiteMap
ebusiness Architecture
ebusiness Concepts
ebusiness Solutions
ebusiness Technology
ecommerce Fundamentals
ecommerce Implementation
Ecommerce Security
«Prev
Next»
Ecommerce Concepts
Ecommerce Fundamentals
Define ecommerce
ecommerce Business Models
Model Basics
Commerce Technology
Compare ecommerce
ecommerce Risks
ecommerce Issues
Intellectual Property
ecommerce Advantages
Fundamentals Review
ecommerce Business Models
Creating Storefronts
Keeping Customers Satisfied
one To One Marketing
eprocurement Supplier
Filling ecommerce Orders
Payment Processing
b2c Supply Web
b2b Supply Web
ecommerce Company Conclusion
Internet Law
Electronic Publishing
Copyright Law
Trademark Issues
Patent Issues
Privacy Confidentiality
electronic Publishing Challenges
Internet Law Conclusion
Ecommerce Security
Secure Electronic Transactions
ecommerce Security Purpose
Encryption | Decryption
Encrypted Data Attacks
Fending Off Attacks
Authentication Methods
Identify Certification Methods
ecommerce Security Payoff
Digital Signature Authentication - Quiz
Each question is worth one point. Select the best answer or answers for each question.
1.
What does authentication mean in digital security?
Please select the best answer.
A.
That the merchant has an authentic physical storefront to accompany his or her Web business
B.
That someone is who he or she claims to be
C.
That the data sent over the Internet is accurate
D.
That the customer has a valid bank account to pay for his or her purchase
2.
How is authentication implemented?
Please select the best answer.
A.
By tracing email addresses of the parties involved
B.
By using a process called digital enveloping
C.
By using a process called digital signatures
D.
By using passwords to control access to Web sites
3.
For what purpose are ciphers used?
Please select the best answer.
A.
For authenticating parties in an e-commerce transaction
B.
For encrypting and decrypting plaintext messages
C.
For verifying that credit card account numbers are valid
D.
For ensuring that customers' shipping addresses are valid
4.
What is a certificate authority?
Please select all the correct answers.
A.
An organization that guarantees that an e-commerce merchant is legitimate
B.
A company that validates customers' bank balances before e-commerce transactions are completed
C.
A trusted third party that issues certificates
D.
An organization guaranteeing that a specific public key is associated with the named user
5.
In cryptography, key length affects key strength by:
Please select the best answer.
A.
Multiplying the strength by two for each bit added to the key length
B.
Exponentially increasing the encryption strength for each bit added to the key length
C.
Tripling the possible algorithms available for each bit added to the key length
D.
Increasing the secrecy of the key for each bit added to the key length
6.
What constitutes "strong encryption"?
Please select all the correct answers.
A.
The uses of data confidentiality, participant authentication, data security, and data integrity
B.
The use of public-key encryption, firewalls, passwords, and authorization codes
C.
The secrecy of the key, the length of the algorithm, and the length of the key
D.
The use of multiple types of encryption to minimize their weaknesses and maximize their strengths