E-Commerce Test 2 Chapter 4 And 5

8 September 2022
4.7 (114 reviews)
55 test answers

Unlock all answers in this set

Unlock answers (51)
question
Advantages of dynamic page generation include all of the following except:
answer
client-side execution of programming
question
What are the phases, activities, and milestones for developing an e-commerce presence for a typical start-up Web site over a one-year period?
answer
planning, development, and implementation
question
Apache Web server software works with Linux and Unix operating systems, T/F?
answer
True
question
Which system functionality must your Web site have in order to be able to personalize or customize a product for a client?
answer
customer on-site tracking
question
All of the following are basic functionality provided by Web servers except: site management tools. data capture tools. security services. a shopping cart
answer
a shopping cart
question
All of the following are basic functionality provided by e-commerce merchant server software except: a product catalog. marketing software. a shopping cart. credit card processing.
answer
marketing software
question
Explain the main functionalities included in e-commerce merchant server software
answer
online catalog, order taking capabilities using an online shopping cart, and online credit card processing
question
Which of the following are the two main components of a systems design?
answer
logical design and physical design
question
All of the following might be part of a Web site's middle-tier layer except: a database server. an ad server. legacy corporate applications. a mail server.
answer
legacy corporate applications.
question
Which of the following types of e-commerce presence is best suited for creating an ongoing conversation with one's customers?
answer
social media
question
Using prebuilt templates is typically one of the most expensive choices when building an e-commerce site, T/F?
answer
False
question
Which of the following details the actual hardware components to be used in a system?
answer
physical design
question
Which of the following typically includes a data flow diagram to describe the flow of information for an e-commerce site?
answer
logical design
question
In order from beginning to end, the major steps in the SDLC are:
answer
systems analysis/planning; systems design; building the system; testing; and implementation.
question
The Web server software used has a significant impact on how a Web site's Web pages look on a user's computer. T/F?
answer
False
question
The process of comparing a Web site with that of its competitors in terms of response speed, quality of layout, and design is known as:
answer
benchmarking
question
The annual maintenance cost for a Web site is typically much lower than its development cost. T/F?
answer
False
question
When developing an e-commerce presence, it is important to understand that the business must drive technology decisions, not the reverse. T/F?
answer
True
question
What are the two most important management challenges in building a successful e-commerce presence?
answer
developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives
question
Prior to the development of e-commerce, Web sites primarily delivered static HTML pages. T/F?
answer
True
question
All of the following are basic information requirements for a product database except: customer ID numbers. product descriptions. stock numbers. customer ID numbers. inventory levels.
answer
customer ID numbers.
question
________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.
answer
Authenticity
question
________ refers to the ability to ensure that e-commerce participants do not deny their online actions
answer
Nonrepudiation
question
________ refers to the ability to ensure that messages and data are only available to those authorized to view them.
answer
Confidentiality
question
________ refers to the ability to ensure that an e-commerce site continues to function as intended.
answer
Availability
question
Which of the following is an example of an integrity violation of e-commerce security?
answer
An unauthorized person intercepts an online communication and changes its contents.
question
The overall rate of online credit card fraud is ________ of all online card transactions.
answer
less than 1%
question
Which of the following is the leading cause of data breaches?
answer
hackers
question
Zeus is an example of which of the following:
answer
Trojan horse
question
Rustock is an example of which of the following
answer
Botnet
question
Malware that comes with a downloaded file that a user requests is called a:
answer
drive-by download
question
Automatically redirecting a Web link to a different address is an example of which of the following:
answer
Pharming
question
FREAK is an example of which of the following:
answer
Software vulnerability
question
Which of the following was designed to cripple Iranian nuclear centrifuges:
answer
Stuxnet
question
Exploit kits are often rented or sold as a commercial product. T/F?
answer
True
question
Vishing attacks exploit SMS messages. T/F?
answer
False
question
ShellShock is an example of a software vulnerability. T/F?
answer
True
question
Next generation firewalls provide all of the following except:
answer
the ability to automatically update applications with security patches
question
All the following statements about symmetric key cryptography are true except: in symmetric key cryptography, both the sender and the receiver use the same key to encrypt and decrypt a message the Data Encryption Standard is a symmetric key encryption system symmetric key cryptography is computationally slower symmetric key cryptography is a key element in digital envelopes
answer
symmetric key cryptography is computationally slower
question
All of the following statements about PKI are true except:
answer
The acronym PKI stands for public key infrastructure.
question
Which of the following dimensions of e-commerce security is not provided for by encryption?
answer
availability
question
Proxy servers are also known as:
answer
Dual home systems
question
A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.
answer
Firewall
question
Which of the following is not an example of an access control?
answer
Digital signatures
question
A fingerprint scan is an example of which of the following
answer
Biometrics
question
The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software. T/F?
answer
True
question
SLS/TLS cannot provide irrefutability. T/F?
answer
True
question
What is the first step in developing an e-commerce security plan?
answer
Perform a risk assessment
question
All of the following statements about Apple Pay are true except which of the following?
answer
Apple Pay is available for both iPhone 5s and iPhone 6s
question
PayPal is an example of what type of payment system?
answer
online stored value payment system
question
PCI-DSS is a standard established by which of the following?
answer
credit card industry
question
Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?
answer
NFC
question
ayPal is the most popular alternative payment method in the United States. T/F?
answer
True
question
Apple Pay uses near field communication (NFC) chips. T/F?
answer
True
question
There is a finite number of Bitcoins that can be created. T/F?
answer
True