E-Commerce Test 2 Chapter 4 and 5
Proxy servers are also known as:
Dual home systems
The Web server software used has a significant impact on how a Web site's Web pages look on a user's computer. T/F?
False
All of the following are basic functionality provided by Web servers except: site management tools. data capture tools. security services. a shopping cart
a shopping cart
Which of the following are the two main components of a systems design?
logical design and physical design
________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.
Authenticity
________ refers to the ability to ensure that an e-commerce site continues to function as intended.
Availability
Which of the following is not an example of an access control?
Digital signatures
________ refers to the ability to ensure that e-commerce participants do not deny their online actions
Nonrepudiation
What is the first step in developing an e-commerce security plan?
Perform a risk assessment
Automatically redirecting a Web link to a different address is an example of which of the following:
Pharming
Zeus is an example of which of the following:
Trojan horse
Apple Pay uses near field communication (NFC) chips. T/F?
True
Exploit kits are often rented or sold as a commercial product. T/F?
True
Prior to the development of e-commerce, Web sites primarily delivered static HTML pages. T/F?
True
SLS/TLS cannot provide irrefutability. T/F?
True
ShellShock is an example of a software vulnerability. T/F?
True
The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software. T/F?
True
There is a finite number of Bitcoins that can be created. T/F?
True
When developing an e-commerce presence, it is important to understand that the business must drive technology decisions, not the reverse. T/F?
True
All of the following are basic information requirements for a product database except: customer ID numbers. product descriptions. stock numbers. customer ID numbers. inventory levels.
customer ID numbers.
Which system functionality must your Web site have in order to be able to personalize or customize a product for a client?
customer on-site tracking
What are the two most important management challenges in building a successful e-commerce presence?
developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives
Malware that comes with a downloaded file that a user requests is called a:
drive-by download
Which of the following typically includes a data flow diagram to describe the flow of information for an e-commerce site?
logical design
Explain the main functionalities included in e-commerce merchant server software
online catalog, order taking capabilities using an online shopping cart, and online credit card processing
All the following statements about symmetric key cryptography are true except: in symmetric key cryptography, both the sender and the receiver use the same key to encrypt and decrypt a message the Data Encryption Standard is a symmetric key encryption system symmetric key cryptography is computationally slower symmetric key cryptography is a key element in digital envelopes
symmetric key cryptography is computationally slower
Which of the following is the leading cause of data breaches?
hackers
All of the following might be part of a Web site's middle-tier layer except: a database server. an ad server. legacy corporate applications. a mail server.
legacy corporate applications.
The overall rate of online credit card fraud is ________ of all online card transactions.
less than 1%
All of the following are basic functionality provided by e-commerce merchant server software except: a product catalog. marketing software. a shopping cart. credit card processing.
marketing software
PayPal is an example of what type of payment system?
online stored value payment system
Which of the following details the actual hardware components to be used in a system?
physical design
What are the phases, activities, and milestones for developing an e-commerce presence for a typical start-up Web site over a one-year period?
planning, development, and implementation
Which of the following types of e-commerce presence is best suited for creating an ongoing conversation with one's customers?
social media
In order from beginning to end, the major steps in the SDLC are:
systems analysis/planning; systems design; building the system; testing; and implementation.
Next generation firewalls provide all of the following except:
the ability to automatically update applications with security patches
The annual maintenance cost for a Web site is typically much lower than its development cost. T/F?
False
Using prebuilt templates is typically one of the most expensive choices when building an e-commerce site, T/F?
False
Vishing attacks exploit SMS messages. T/F?
False
A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.
Firewall
Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?
NFC
Apache Web server software works with Linux and Unix operating systems, T/F?
True
ayPal is the most popular alternative payment method in the United States. T/F?
True
Which of the following dimensions of e-commerce security is not provided for by encryption?
availability
The process of comparing a Web site with that of its competitors in terms of response speed, quality of layout, and design is known as:
benchmarking
Advantages of dynamic page generation include all of the following except:
client-side execution of programming
PCI-DSS is a standard established by which of the following?
credit card industry
All of the following statements about Apple Pay are true except which of the following?
Apple Pay is available for both iPhone 5s and iPhone 6s
Which of the following is an example of an integrity violation of e-commerce security?
An unauthorized person intercepts an online communication and changes its contents.
FREAK is an example of which of the following:
Software vulnerability
Which of the following was designed to cripple Iranian nuclear centrifuges:
Stuxnet
A fingerprint scan is an example of which of the following
Biometrics
Rustock is an example of which of the following
Botnet
________ refers to the ability to ensure that messages and data are only available to those authorized to view them.
Confidentiality
All of the following statements about PKI are true except:
The acronym PKI stands for public key infrastructure.