An Internet-based crime is referred to as a(n) ____ crime.
What is cyber?
100
____ permissions provide registered users with access to the files they need, while restricting access to private resources.
What is user?
100
In a distributed denial-of-service (DDoS) attack, the services of a(n) ____ can be halted.
What is internet server?
100
In the _____ form of e-commerce, transactions between businesses across private networks, the Internet, and the Web are supported.
What is B2B?
100
An online B2B transaction uses a(n) _____ network to exchange information on the Web.
What is EDI?
200
Businesses prefer to use technology known as ____ to create an exact copy of their files for backup.
What is RAID?
200
In a Wi-Fi network, ____ can be configured to help protect your security.
What is access points?
200
The ____ was established to secure and monitor security risks to U.S. networks and the Internet.
What is US-CERT?
200
A(n) _____ provides software and a network that connects businesses within an industry.
What is electronic exchange?
200
Electronic data interchange uses private network services called _____ networks.
What is value-added?
300
An individual who illegally downloads copyright-protected software is referred to as a ____.
What is a pirate?
300
The job of the ____ administrator is to control who has access to various network resources such as files and folders.
What is network?
300
You can protect yourself from identity theft by using ____ when transmitting information over network connections.
What is encryption?
300
Downloading apps, games, and media to your smart phone is an example of _____
What is m-commerce?
300
E-commerce hosting companies offer _____ that provide all the necessary software tools to deliver e-commerce applications.
What is servers?
400
Information security is implemented at the individual machine level, the computer network level, and the ____ level.
What is the internet?
400
Businesses are working to control information ____ by not allowing employees to store important data on their laptop computers.
What is theft?
400
Sites such as eBay are a popular target for ____.
What is internet fraud?
400
A proximity payment system delivers m-commerce services to small devices through the use of _____-range wireless data communications.
What is short?
400
The best-known e-cash provider is _____.
What is PayPal?
500
A common form of authentication is a ____.
What is a password?
500
When starting a new job, you may need to sign a(n) ____ that defines acceptable and unacceptable uses of computer and network resources.
What is network usage policy?
500
A(n) ____ certificate confirms your credentials when conducting business or other transactions on the Web.
What is SSL?
500
The popularity of _____ e-commerce is a good example of how customers can successfully implement their own sales strategy on the Web.
What is C2C?
500
Hosting companies provide all the necessary software tools to deliver e-commerce applications EXCEPT _____.
a. an online catalog
b. transaction processing
c. a shopping cart
d. shipping