Exam One Chapter 1-5
Which of the following is not a key factor for establishing e-commerce security? data integrity technology organizational policies laws and industry standards
data integrity
All of the following either currently, or have plans to, offer Internet access via satellite except: A. Facebook B. Dish C. Microsoft D. Boeing
C. Microsoft
Which of the following is not part of the LAMP open source web development model? A. Linux B. Apache C. Microsoft IIS D. PHP
C. Microsoft IIS
________ was the first truly large-scale digitally enabled transaction system in the B2C arena. A. Telex B. The Baxter Healthcare system C. The French Minitel D. Electronic Data Interchange (EDI)
C. The French Minitel
Which of the following is a characteristic of the Consolidation phase of e-commerce? A. predominance of pure online strategies B. emphasis on revenue growth versus profits C. brand extension and strengthening becomes more important than creating new brands D. shift to a technology-driven approach
C. brand extension and strengthening becomes more important than creating new brands
All of the following are key design principles of responsive web design except: A. flexible grid-based layouts. B. media queries. C. coding by convention. D. flexible images and media.
C. coding by convention.
Most of the time required to maintain an e-commerce site is spent on: A. debugging code. B. responding to emergency situations. C. general administration and making changes and enhancements to the system. D. changes in reports, data files, and links to backend databases.
C. general administration and making changes and enhancements to the system.
Which dimension(s) of security is spoofing a threat to? A. integrity B. availability C. integrity and authenticity D. availability and integrity
C. integrity and authenticity
Which of the following is not a variation of the e-tailer business model? A. bricks-and-clicks B. virtual merchant C. market creator D. manufacturer-direct
C. market creator
Which of the following helps you engage your customers in a conversation? A. shopping cart B. product database C. on-site blog D. site tracking and reporting system
C. on-site blog
Microsoft's pilot program to provide broadband Internet access to rural areas uses which of the following technologies? A. satellites B. drones C. unused, low-powered television channels D. high altitude balloons
C. unused, low-powered television channels
________ is the ability to ensure that messages and data are only available to those authorized to view them. Confidentiality Integrity Privacy Availability
Confidentiality
PayPal is an example of what type of payment system? online stored value payment system digital checking system accumulating balance system digital credit card system
online stored value payment system
SaaS and PaaS providers can typically provide services at lower costs through scale economies. T/F
True
Slow followers are sometimes more successful than first movers. T/F
True
T1 and T3 refer to international telephone standards for digital communication. T/F
True
The Internet is a worldwide system of computer networks. T/F
True
The major hubs in the United States where the Internet backbone intersects with regional and local networks are now commonly referred to as Internet Exchange Points (IXPs). T/F
True
Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other? DES NFC IM text messaging
NFC
________ is the ability to ensure that e-commerce participants do not deny their online actions. Nonrepudiation Authenticity Availability Integrity
Nonrepudiation
The Jumpstart Our Business Startups (JOBS) Act, and issuance of enabling regulations by the Securities and Exchange Commission, allows a start-up company to use crowdfunding to solicit investors to invest in small and early-stage startups. T/F
True
The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software. T/F
True
Which of the following statements about Bitcoin is not true? The computational power required to mine Bitcoins has increased over time. Bitcoins are completely secure. Bitcoins are illegal in some countries. In 2018, Bitcoin represented just under 40% of the full market for cryptocurrencies.
Bitcoins are completely secure.
Which of the following statements is not true? A. A VPN provides both confidentiality and integrity. B. A VPN uses both authentication and encryption. C. A VPN uses a dedicated secure line. D. The primary use of VPNs is to establish secure communications among business partners.
C. A VPN uses a dedicated secure line.
Which of the following is not considered a portal? A. Yahoo B. MSN C. Amazon D. AOL
C. Amazon
The Web runs in which layer of Internet architecture? A. Network Technology Substrate layer B. Middleware Services layer C. Transport Services and Representation Standards layer D. Applications layer
D. Applications layer
All of the following are methods of securing channels of communication except: A.SSL/TLS. B. digital certificates. C. VPN. D. FTP.
D. FTP.
Which of the following is an example of the affiliate revenue model? A. Scribd B. eBay C. L.L. Bean D. MyPoints
D. MyPoints
What is the first step in developing an e-commerce security plan? Create a security organization. Develop a security policy. Perform a risk assessment. Perform a security audit.
Perform a risk assessment.
A digital certificate contains all of the following except the: subject's private key. subject's public key. digital signature of the certification authority. digital certificate serial number.
subject's private key.
________ are a kind of middleware software that provides the glue connecting traditional corporate systems to the customer as well as all the functionality needed to conduct e-commerce. A. Application servers B. Web page servers C. Database servers D. Content management servers
A. Application servers
Which of the following protocols is used to send mail to a server? A. SMTP B. FTP C.HTTP D. SSL
A. SMTP
In the ________ business model, a web-based business builds a digital environment in which buyers and sellers can meet, display products, search for products and establish prices. A. market creator B. community provider C. e-tailer D. portal
A. market creator
In general, the key to becoming a successful content provider is to: A. own the content being provided. B. own the technology by which content is created, presented, and distributed. C. provide online content for free. D. provide other services as well as online content.
A. own the content being provided.
Which of the following monitors and controls access to a main web server, and implements firewall protection? A. proxy server B. list server C. groupware server D. mail server
A. proxy server
Which of the following are specialized computers that transmit message parcels along available Internet communication paths and on to their destinations? A. routers B. Web servers C. IP servers D. packet servers
A. routers
Which of the following gives a business model the most credibility with outside investors? A. the firm's management team B. the firm's value proposition C. the firm's market opportunity D. the firm's market strategy
A. the firm's management team
Which of the following is not a primary activity in a firm value chain? A. outbound logistics B. finance/accounting C. operations D. after-sales service
B. finance/accounting
Which of the following may offer its customers value chain management software? A. e-distributors B. e-procurement companies C. exchanges D. community providers
B. e-procurement companies
Which of the following is an example of an integrity violation of e-commerce security? A website is not actually operated by the entity the customer believes it to be. A merchant uses customer information in a manner not intended by the customer. A customer denies that he is the person who placed the order. An unauthorized person intercepts an online communication and changes its contents.
An unauthorized person intercepts an online communication and changes its contents.
In 2018, the overall retail market in the United States was estimated to be about: A. $53 trillion. B. $5.3 trillion. C. $530 billion. D. $53 billion.
B. $5.3 trillion.
Which of the following is a server-side technique that detects the attributes of the device making the request, and using predefined templates, loads a version of a site optimized for the device? A. LAMP B. AWD C. mobile first design D. RoR
B. AWD
Which of the following uses a subscription revenue model for books? A. Spotify B. Amazon Kindle Unlimited C. Rhapsody D. Pandora
B. Amazon Kindle Unlimited
Which of the following protocols enables the exchange of routing information among different autonomous systems on the Internet? A. HTTP B. BGP C. FTP D. SMTP
B. BGP
Ruby on Rails is based on which of the following philosophies? A. SLDC B. CoC C. LAMP D. Ajax
B. CoC
Which of the following is not an advantage of client/server computing over centralized mainframe computing? A. It is easy to expand capacity by adding servers and clients. B. Each client added to the network increases the network's overall capacity and transmission speeds. C. Client/server networks are less vulnerable, in part because the processing load is balanced over many powerful smaller computers rather than concentrated in a single huge computer. D. There is less risk that a system will completely malfunction because backup or mirror servers can pick up the slack if one server goes down.
B. Each client added to the network increases the network's overall capacity and transmission speeds.
Which of the following organizations monitor Internet policies and practices? A. IETF B. ISOC C. W3C D. ICANN
B. ISOC
Applications for Android operating system-based smartphones are typically written in which of the following? A. Swift B. Java C. ActiveX D. ColdFusion
B. Java
Which of the following is an example of a company using the content provider model? A. Priceline B. Netflix C. Dell D. eBay
B. Netflix
Django is based on which of the following? A. PHP B. Python C. Perl D. Ruby on Rails
B. Python
The backbone of the Internet is formed by: A. Internet Exchange Points (IXPs). B. Tier 1 ISPs. C. Network Access Points (NAPs). D. Metropolitan Area Exchanges (MAEs).
B. Tier 1 ISPs.
Which of the following verifies that the business objectives of the system are in fact working? A. system testing B. acceptance testing C. unit testing D. implementation testing
B. acceptance testing
A wealthy individual who invests personal funds in a startup in exchange for an equity share in the business is referred to as a(n): A. incubator. B. angel investor. C. venture capital investor. D. crowdfunder.
B. angel investor.
Where does TLS operate within TCP/IP? A. between the Internet Layer and the Transport Layer B. between the Transport Layer and the Application Layer C. between the Network Interface Layer and the Transport Layer D. between the Internet Layer and the Application Layer
B. between the Transport Layer and the Application Layer
Which of the following basic system functionalities is used to display goods on a website? A. product database B. digital catalog C. shopping cart system D. customer database system
B. digital catalog
Which of the following typically includes a data flow diagram (DFD) to describe the flow of information for an e-commerce site? A. physical design B. logical design C. testing plan D. co-location plan
B. logical design
All of the following are simple steps for optimizing web page content except: A. reducing unnecessary HTML comments. B. segmenting computer servers to perform dedicated functions. C. using more efficient graphics. D. avoiding unnecessary links to other pages on the site.
B. segmenting computer servers to perform dedicated functions.
The term stateless refers to the fact that: A. no one government entity controls the Internet. B. the server does not have to maintain an ongoing dedicated interaction with the client computer. C. system performance degrades as more simultaneous users require service. D. web servers may maintain multiple instances of server software to handle requests.
B. the server does not have to maintain an ongoing dedicated interaction with the client computer.
First movers often fail because: A. their competitive advantage is unfair. B. they lack complementary resources needed to sustain their advantages. C. they are operating in a perfect market. D. they fail to leverage their competitive assets.
B. they lack complementary resources needed to sustain their advantages.
Which of the following was the original purpose of the Internet? A. to provide a network that would allow businesses to connect with consumers B. to link large mainframe computers on different college campuses C. to develop a military communications system that could withstand nuclear war D. to enable government agencies to track civilian communications
B. to link large mainframe computers on different college campuses
Which of the following is the minimum system architecture requirement for an e-commerce website that processes orders? A. single-tier architecture B. two-tier architecture C. three-tier architecture D. multi-tier architecture
B. two-tier architecture
Which of the following statements about data breaches in 2017 is not true? A. According to the Identity Theft Resource Center, the number of breaches in 2017 increased by almost 45% from 2016. B. According to the Identity Theft Resource Center, over 50% of data breaches involved social security numbers. C. According to the Identity Theft Resource Center, employee error was the leading cause of data breaches. D. According to the Identity Theft Resource Center, data breaches involving the business sector represented over 55% of all breaches.
C. According to the Identity Theft Resource Center, employee error was the leading cause of data breaches.
Which of the following was the most popular web browser as of August 2018? A. Internet Explorer B. Safari C. Chrome D. Firefox
C. Chrome
Django follows the ________ programming principle. A. CoC B. WYSIWYG C. DRY D. LAMP
C. DRY
An IPv4 address is expressed as a: A. 32-bit number that appears as a series of four separate numbers separated by semicolons. B. 64-bit number that appears as a series of four separate numbers separated by semicolons. C. 64-bit number that appears as a series of four separate numbers separated by periods. D. 32-bit number that appears as a series of four separate numbers separated by periods.
D. 32-bit number that appears as a series of four separate numbers separated by periods.
Which of the following is a programming language introduced by Apple specifically for developing iOS applications? A. Objective-C B. C C. C++ D. Swift
D. Swift
All of the following use an advertising revenue model except: A. Facebook. B. Yahoo. C. Google. D. Walmart.
D. Walmart.
You could expect to find all of the following services in a web server software package except: A. security services. B. FTP. C. search engine. D. an RSS aggregator.
D. an RSS aggregator.
All of the following were visions of e-commerce expressed during the early years of e-commerce except: A. a nearly perfect information marketspace. B. friction-free commerce. C. disintermediation. D. fast follower advantage.
D. fast follower advantage.
A ________ specifically details how you plan to find customers and to sell your product. A. sales analysis B. business plan C. competitive strategy D. market strategy
D. market strategy
All of the following are website design features that annoy customers except: A. slow-loading pages. B. pop-under ads. C. splash pages. D. multi-browser functionality.
D. multi-browser functionality.
Which of the following details the actual hardware components to be used in a system? A. architecture plan B. system functionalities plan C. logical design D. physical design
D. physical design
Which of the following is not an example of malicious code? a. scareware b. Trojan horse c. bot d. sniffer
D. sniffer
Which type of investor typically becomes interested in a startup company after it has begun generating revenue? A. incubators B. angel investors C. crowdfunders D. venture capital investors
D. venture capital investors
A multi-tier architecture typically includes only a web server and a database server. T/F
False
A private cloud is operated for the benefit of multiple firms. T/F
False
A security hole known as Shellshock enabled hackers to target JavaScript running on Apache web servers. T/F
False
Amazon Web Services is an example of a private cloud. T/F
False
DHMTL is used to generate dynamic web pages. T/F
False
IMAP is the Internet protocol used by a browser to transfer web pages. T/F
False
On-demand service companies are characterized by the free sharing of resources between the company and consumers. T/F
False
Phishing attacks rely on browser parasites. T/F
False
Social technologies change industry structure by weakening powerful sales channels and shifts bargaining power to consumers. T/F
False
The web server software used has a significant impact on how a website's web pages look on a user's computer. T/F
False
WLAN-based Internet access derives from the same technological foundations as telephone-based wireless Internet access. T/F
False
All of the following statements about PKI are true except: the term PKI refers to the certification authorities and digital certificate procedures that are accepted by all parties. PKI is not effective against insiders who have a legitimate access to corporate systems including customer information. PKI guarantees that the verifying computer of the merchant is secure. the acronym PKI stands for public key infrastructure.
PKI guarantees that the verifying computer of the merchant is secure.
Which of the following statements is not true? A majority of states require companies that maintain personal data on their residents to publicly disclose when a security breach affecting those residents has occurred. The USA Patriot Act broadly expanded law enforcement's investigative and surveillance powers. The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates. The Federal Trade Commission has asserted that it has authority over corporations' data security practices.
The Cybersecurity Information Sharing Act was strongly supported by most large technology companies and privacy advocates.
A Trojan horse appears to be benign, but then does something other than expected. T/F
True
Dynamic page generation enables price discrimination. T/F
True
E-commerce has increased price competition in many markets. T/F
True
FREAK is an example of a software vulnerability. T/F
True
Information asymmetries enable some firms to have an edge over others. T/F
True
Which of the following is not an example of a potentially unwanted program (PUP)? adware browser parasite drive-by download spyware
drive-by download
Malware that comes with a downloaded file that a user requests is called a: Trojan horse. backdoor. drive-by download. PUP.
drive-by download.
The overall rate of online credit card fraud is ________ of all online card transactions. less than 1% around 5% around 10% around 15%
less than 1%