One of the greatest fallacies of e-commerce security is depending on which of the following?
a. risk-assessment
b. security through obscurity
c. digital signature
d. biometrics
b
FEEDBACK: a. Incorrect.
b. Correct. Security through obscurity is the tactic of keeping security holes, encryption algorithms, and processes secret in an effort to confuse attackers.
c. Incorrect.
d. Incorrect.
You might also like to view...
Which of the following statements is true concerning external users of financial information?
a. External users need detailed records of the business to make informed decisions. b. External users are primarily responsible for the preparation of financial statements. c. External users rely on the financial statements to help make informed decisions. d. External users rely on management to tell them whether the company is a good investment
Auditors must employ independent geologists to evaluate management's estimate of the reserves contained in a new discovery of natural resources
a. True b. False Indicate whether the statement is true or false
This is the result of the ongoing shadow negotiation and regards how the negotiation will proceed, who has influence and power, and what the boundaries of the negotiation are.
A. incentives B. hard tactics C. shadow technique D. social contract
A small increase or decrease in consumer demand can produce a much larger change in demand for the facilities and equipment needed to make the consumer product. This is known as _____
a. the multiplier effect b. reciprocity c. the conversion rate d. frequency