PDF Download
FREE AND STUDY GAMES ABOUT BIS 3 EXAM QUESTIONS
Actual Qs and Ans Expert-Verified Explanation
This Exam contains:
-Guarantee passing score -104 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation Question 1: An electronic means to conduct financial transactions is referred to as
Answer:
electronic funds transfer Question 2: Everyone has to be concerned not only about their own information privacy, but also about the information privacy of which of the following?
Answer:
all of the above
Question 3: What type of information can be stored in cookies?
Answer:
all of the above Question 4: ____ refers to having some level of control over potential secondary uses of one's personal information
Answer:
information privacy
Question 5: With regards to PAPA, what reflects the confidentiality of the data collected?
Answer:
privacy
Question 6: Amazon.com is an example of what type of B2C e-business model?
Answer:
online retailing
Question 7: Which of the following is not a B2C e-business enabler?
Answer:
a competitive marketplace Question 8: You have received an email for your university IT department stressing that the IT department will never ask you for your username and password to your email account. What type of scheme is the university most likely to protect you from?
Answer:
Phishing Question 9: What is the term for when e-business interactions take place between a consumer and a business?
Answer:
B2C Question 10: _____ refers to hackers that try to find information that, if revealed, will advance human causes
Answer:
hactivism Question 11: An important B2C enable that allows for users that use a wide variety of platforms to access businesses that use different platforms is
Answer:
interoperability
Question 12: An online email account that you have prompts you to verify that your personal information is correct. This organization is practicing with aspect of PAPA?
Answer:
accuracy
Question 13: _____ involves making sure that data are consistent and complete
Answer:
integrity Question 14: What government privacy act regulates the use of private information by financial institutions?
Answer:
GLBA Question 15: A Web merchant wants to ensure that people cannot deny that they entered into a transaction, so they starting using digital signatures and encryption as part of their transaction processing. This is an example of what?
Answer:
non-repuidation Question 16: A faculty member receives a phone call from the parent of a student. The parent inquires about the grade of the student on the last exam. If the instructor discloses any information, that instructor would violate what privacy act?
Answer:
FERPA Question 17: If a virus is embedded in a legitimate file, they are often called a
Answer:
Trojan horse Question 18: ____ is the addition of intermediaries in an industry or e-business?
Answer:
E-channel expansion
Question 19: Which of the following is not a cost of privacy breaches upon an organization?
Answer:
loss of goodwill Question 20: What type of electronic business represents traditional organizations with a physical location and no online business?
Answer:
bricks and mortar
Question 21: Who usually perpetrates unauthorized access?
Answer:
organization insiders Question 22: When installing the latest version of Internet Explorer a dialogue box pops up with a box checked telling u that Bing will be ur automatic search provider. U have the opportunity to change this selection before continuing. Checkbox allows u to do what?
Answer:
Opt-out Question 23: A privacy policy on a website is more about the _____ than the technology
Answer:
content Question 24: ____ refers to data being used for other functions beyond those purposes for which they were collected
Answer:
function creep Question 25: What is a common tactic hackers use to allow themselves re-access to a system?
Answer:
backdoor Question 26: What are the two types of cryptography systems used in encryption today?
Answer:
asymmetric, symmetric