E-Fashion Final

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following is an example of an integrity violation of e-commerce security?

An unauthorized person intercepts an online communication and changes its contents.

All of the following statements about Apple Pay are true except which of the following?

Apple Pay is available for both iPhone 5s and iPhone 6s

_______commerce includes the following business processes: customer relationship management, demand management, order fulfillment, manufacturing management, procurement, product development, returns, logistics/transportation, and inventory managemen

B2B

All of the following are forms of collaboration among businesses except:

RFQs

________ refers to differentiating a firm's products or prices on the basis of superior supply chain management

Supply Chain Management

Which of the following statements about EDI systems is true?

They typically serve vertical markets

Which of the following was the first step in the development of B2B e-commerce?

automated order entry systems

Which of the following dimensions of e-commerce security is not provided for by encryption?

availability

A fingerprint scan is an example of which of the following

biometrics

Rustock is an example of which of the following

botnet

The majority of inter-firm trade involves:

contract purchasing of direct goods

All of the following are examples of direct goods in the auto industry except:

desktop computers.

Which of the following is not an example of an access control?

digital signatures

Direct goods

direct goods are not involved directly in production process.

A private industrial network is an independently owned online marketplace that connects many suppliers and buyers (t/f)

false

Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties. (t/f)

false

There is a finite number of Bitcoins that can be created? (t/f)

false

Which of the following is the leading cause of data breaches?

hackers

Worms

it's a type of malware that has the capability to copy itself on different computers.

The overall rate of online credit card fraud is ________ of all online card transactions.

less than 1%

An ________ serves businesses that primarily buy direct goods on a contract purchasing basis.

net marketplace

PayPal is an example of what type of payment system?

online stored value payment system

Automatically redirecting a Web link to a different address is an example of which of the following:

pharming

FREAK is an example of which of the following:

software vulnerability

Which of the following was designed to cripple Iranian nuclear centrifuges:

stuxnet

Next generation firewalls provide all of the following except:

the ability to automatically update applications with security patches

PCI-DSS is a standard established by which of the following?

the credit card industry

Availability

the process of making sure e-commerce websites function as they should

Authenticity

· the process of being able to see the person or what entity you're interacting with

Bid rigging

Bid Rigging is the process of limiting bids or submitting false bids in order to raise prices.

The essential characteristic of ________ is that they bring hundreds to thousands of suppliers into a single Internet-based environment to conduct trade.

Net marketplaces

· What are the four technology solutions for protecting a computer and it's communications?

Protect Internet communications with cryptography/encryption Protect clients and servers with different types of security such as OS security and anti-virus software Secure communication channels such as SSL, VPNs, TLS, and Wi-Fi Protect networks with firewalls, proxy servers, IPS, and IDS

practice networks

The second type of online community is practice networks, an example of this is LinkedIn. They offer discussion boards and offer help and knowledge to specific practices.

internet based network

The third type of online community is interest-based networks. An example of this is Fashion Tap. They offer the chance to discuss and interact with others over a specific area of interest.

Proxy servers are also known as:

dual home systems

All of the following are potential benefits of B2B e-commerce except:

lower transaction costs

All the following statements about symmetric key cryptography are true except:

symmetric key cryptography is computationally slower

Confidentiality

the process of making sure data and messages are available to only people that are allowed to see it

Nonrepudiation

the process of making sure e-commerce participants don't deny their actions they perform online

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software. (t/f)

true

Walmart is the largest purchaser of consumer goods in the world (t/f)

true

All of the following statements about PKI are true except:

PKI guarantees that the verifying computer of the merchant is secure

· What are the various steps in developing an e-commerce security plan to protect a server?

Risk assessment, security policy, implementation plan, create a security organization, and security audit

· What are the steps in the procurement process?

Search, qualifty, negotiate, purchase order, invoicing, shipping, and remittance payment.

________ purchasing involves the purchase of goods based on immediate needs in larger marketplaces that involve many suppliers

Spot

general communities

The first type of online community is general communities and examples of this are Facebook and Twitter. They give users the chance to interact with others. You can advertise by buying online ad space on videos and pages.

sponsor based

The fourth type of community is a sponsored community. An example of this is Etsy. They are created by the government, non-profit, or for-profit organizations. They are used to pursue organizational goals such as making your own store through Etsy and making money off of it.

The Seam is an example of an ________.

industry consortium

e-procurement

it is an independently owned intermediary that connects lots of online suppliers that offer millions of maintenance and repair parts to business firms who have to pay fees in order to join the market.

Which of the following is not a typical barrier to the implementation of a private industrial network?

it requires large networks owners to give up some of its independence

e-distributor

provides an online catalog that represents products from multiple manufacturers

Trojan Horses

it's a type of code/software that has the ability to control a computer. It can damage, steal information, disrupt, and destroy your network and data.

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

firewall

Private industrial networks

re internet-based networks that manage interactions between different companies in all areas of the business

Which of the following statements about cloud-based B2B systems is not true?

Much of the expense of the system is shifted from the B2B network provider to the firm

Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?

NFC

_______ are Internet-based communication environments that extend far beyond procurement to encompass truly collaborative commerce.

Private industrial network

Analysts predict that B2B e-commerce in the United States will grow by 2019 to approximately:

$8.6 billion

Contract purchasing

Contract purchasing is a long-term written agreement to buy specific products

All of the following are weaknesses of EDI except:

EDI lacks universal standards

· What are the different types of online auction sites?

English Auction, Dutch Internet Auction, Penny Auction, and Name Your Own Price

Office supplies are an example of:

Indirect goods

Indirect goods

Indirect goods are involved in production process

Industrial Consortiums

Industrial Consortiums - it is an industry owned vertical market that enables buyers to purchase direct goods and services from a limited set of invited participants

Six security dimensions

Integrity, confidentiality, privacy, availability, nonrepudiation, and

· What is a private industrial network?

It is an internet-based environments that manage interactions between companies in all processes, such as supply chain management.

All of the following are current major trends in B2B e-commerce, except;

Move to implement highly centralized supply chains to reduce risk

Affinity community

The fifth type of community is an affinity community. An example of this is women.com. They give people to interact with others of the same interest and demographic

Botnets

this is a type of trojan virus that organizes and infects all machines in the network.

Malware

this is the overall term to describe different threats to your computer such as trojans and spyware

Apple Pay uses near field communication (NFC) chips (t/f)

true

Exploit kits are often rented or sold as a commercial product. (t/f)

true

MRO goods are also known as indirect goods (t/f)

true

PayPal is the most popular alternative payment method in the United States. (t/f)

true

Purchasing managers are the key players in the procurement process. (t/f)

true

SLS/TLS cannot provide irrefutability. (t/f)

true

ShellShock is an example of a software vulnerability. (t/f)

true

· What are the THREE MAIN types of online auction sites?

B2C auctions, C2C auctions, and specialized auctions

Malware that comes with a downloaded file that a user requests is called a:

drive by download

An ________ provides electronic catalogs that represent the products of thousands of direct manufacturers.

e-distributor

An ________ primarily serves businesses that primarily buy indirect goods on a contract purchasing basis

e-procurement

Price matching

Price Matching is the process of agreeing to set floor prices on items up for auction below where sellers will not sell them in open markets

What is the first step in developing an e-commerce security plan?

Perform a risk assessment

· What are the various trends in supply chain management?

Just-in-time and lean production, supply chain simplifications, adaptive supply chains, accountable supply chains, sustainable supply chains, electronic data interchange, mobile business to business, and cloud based business to business systems

Vishing attacks exploit SMS messages (t/f)

false

Spot purchasing

Spot purchasing is the process of buying goods because there are immediate needs in large marketplaces involving multiple suppliers.

Zeus is an example of which of the following:

Trojan horse


Kaugnay na mga set ng pag-aaral

Evolve Adaptive Quiz: Med-Surg, Respiratory

View Set

Week Seven - Chapter 5: Booting Linux and Editing Files

View Set

Chapter 11 Employ Evidence-Based Practice

View Set

REPRODUCTION AND CONTINUITY OF LIFE

View Set

Comparison of Pedagogy to Andragogy

View Set

Phlebotomy worktext and procedure manual

View Set