E-commerce 2015, 11e (Laudon/Traver) Chapter 5 E-commerce Security and Payment Systems 1) Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use. Answer: TRUE Page Ref: 258-259 Difficulty: Moderate AACSB: Information technology 2) A worm needs to be activated by a user in order for it to replicate itself. Answer: FALSE Page Ref: 262 Difficulty: Moderate AACSB: Information technology 3) A Trojan horse appears to be benign, but then does something other than expected. Answer: TRUE Page Ref: 263 Difficulty: Moderate AACSB: Information technology 4) Phishing attacks rely on browser parasites. Answer: FALSE Page Ref: 264, 266 Difficulty: Moderate AACSB: Information technology 5) CryptoLocker is an example of ransomware. Answer: TRUE Page Ref: 263 Difficulty: Moderate AACSB: Information technology 6) Spoofing involves attempting to hide a true identity by using someone else's e-mail or IP address. Answer: TRUE Page Ref: 272 Difficulty: Difficult AACSB: Information technology 7) The Java Runtime Environment is a frequent target of exploit kits. Answer: TRUE Page Ref: 261 Difficulty: Moderate AACSB: Information technology 1 Copyright Š 2015 Pearson Education, Inc.