SEOTrance
SiteMap
ebusiness Architecture
ebusiness Concepts
ebusiness Solutions
ebusiness Technology
ecommerce Fundamentals
ecommerce Implementation
Ecommerce Security
«Prev
Next»
Ecommerce Implementation
Site Implementation
Planning Ecommerce Site
Formulate Business Design Goals
Business Model Revenue Strategies
Define Ecommerce Products Services
Customer Expectations
Story Board Development
Mapping Business Concerns
Outsourcing Ecommerce Providers
Ecommerce Fundamentals Conclusion
Site Infrastructure
Web Server Elements
Webserver Hardware Requirements
Webserver Software
Aliases Virtual Directories
Virtual Servers
DNS Servers
Default Documents Directory
Website Development SW
Support Database SW
Configure HW Increased Performance
Multi Machine Configuration
Legacy- Integration
Middleware Solutions
Web Server Conclusion
ecommerce Security
Security Risks
Ecommerces Security Measures
Operating System Security
ecommerce System Security
Application Security
Encryption Methods Types
Application Encryption Methods
Networking Security Conclusion
Security Infrastructure
Payment Methods
Credit Card Payment Methods
Digital Cash
Digital Certificates
Public Key Infrastructure
Digital Certificate Types
Public Private CA
Certificate Issues
SSL Protocol Transaction
Set Protocol
Commerce Certificates-
Security Issues Review - Quiz
Each question is worth one point. Select the best answer or answers for each question.
1.
You discover that your Database server is vulnerable to a remote attack that allows a hacker to steal classified information. What is one way you can reduce your security risk?
Please select the best answer.
A.
Employ application servers and java applets
B.
Segment the operating the system, the Web server program, and the server's files
C.
Use a different network protocol that connects the Web server to the database
D.
Install advanced virus scanners
2.
Which of the following answers describes the least costly way to ensure that your e-commerce site is properly secured?
Please select the best answer.
A.
Install a firewall
B.
Install an intrusion detection system (IDS)
C.
Install secure Web servers
D.
Disable anonymous access
3.
While taking measure to secure your server resources, you notice that your Web server has been the subject of several ping and port scans. You have also noticed that someone has attempted to log on repeatedly. This activity suggests that it may become (or maybe already has become) the target of an attack. Which of the elements below can help increase your Web server's security so that you will be informed of an attack?
Please select all the correct answers.
A.
Install intrusion detection software.
B.
Enable auditing.
C.
Create new user accounts on the server.
D.
Install SSL on the Web server.