Assignment 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

________ refers to the ability to ensure that messages and data are only available to those authorized to view them.

Confidentiality

________ refers to the ability to ensure that e-commerce participants do not deny their online actions.

Nonrepudiation

Which of the following examples illustrates the "Long Tail" phenomenon?

Over 50% of Netflix's 100,000 titles are rented at least once a day by someone.

Smishing attacks exploit SMS messages.

TRUE

The cost of sending 10,000 e-mails in an advertising campaign is about the same as sending 5,000

TRUE

Which of the following is the most important tool in establishing a relationship with the customer?

company Wen site

Conversion rate is a measure of the:

percentage of visitors who become customers.

Acquisition rate is a measure of the:

percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

spyware

Which of the following would you implement to collect and analyze your company's big data?

Hadoop

An intrusion detection system can perform all of the following functions except:

blocking suspicious activity

Most of the world's spam is delivered via which of the following?

botnets

Which of the following measures the ratio of items purchased to product views?

browse-to-buy ratio

Which of the following is not one of the main stages of the online purchasing process?

browsing

Which of the following countries has been found to have engaged in cyberespionage against Google?

china

Which of the following is not an example of a PUP?

drive-by download

Proxy servers are also known as:

dual home system

Which of the following online advertising formats attracted the least amount of spending in 2013?

e-mail

Approximately ________ of annual offline retail sales is influenced by online browsing.

one-third

All of the following are used for authentication except:

packet filters

Purchasing an online ad on a CPA basis means that the advertiser:

pays only for those users who perform a specific action, such as registering, purchasing, etc.

Botnets are typically used for all of the following except:

phishing attacks

A digital certificate contains all of the following except the:

subjects private key

Which of the following is not a key point of vulnerability when dealing with e-commerce?

the credit card companies

All of the following statements about cookies are true except:

the data typically stored in cookies includes a unique ID and e=mail address

What is the most frequent cause of stolen credit cards and card information today?

the hacking and looting of corporate servers storing credit card information

All of the following are factors in contributing to the increase in cybercrime except:

the internet's similarity to telephone networks

Which of the following online advertising formats is the most effective?

video ads

All of the following are fixed price strategies except:

yield management

Which of the following left the WikiLeaks Web site effectively inoperable in August 2012?

DDoS attack

In modeling online consumer behavior, the concept of "consumer skills" refers to the:

Knowledge consumers have about how to conduct online transactions

Reventon is an example of:

Ransomware

________ is an industry-standard database query and manipulation language.

SQL

Which of the following is not true about search engine advertising?

Search engine advertising is the fastest growing type of online advertising

A Trojan horse appears to be benign, but then does something other than expected.

TRUE

A worm does not need to be activated by a user in order for it to replicate itself.

TRUE

Bundling is the process of selling two or more products together for a price that is less than the sum of the two product's individual prices.

TRUE

Cookies, when combined with Web beacons, can be used to create cross-site profiles.

TRUE

Drive-by downloads are now the most common method of infecting computers.

TRUE

E-commerce is a major conduit and generator of offline commerce.

TRUE

Evidence suggests that real-time customer chat increases sales.

TRUE

In order to accept payments by credit card, online merchants typically must have a merchant account established with a bank or financial institution.

TRUE

Which of the following statements about the Internet's impact on marketing is not true?

The Internet has decreased the impact of brands.

Which of the following features of e-commerce technology has reduced the cost of delivering marketing messages and receiving feedback from users?

Universal standards

Creating multiple variations of information goods and selling these to different market segments at different prices is called:

Versioning

Which of the following is the current standard used to protect Wi-Fi networks?

WPA2

An example of a privacy violation of e-commerce security is:

Your online purchasing history being sold to other merchants without your consent

A Web beacon is:

a tiny graphics file embedded in an e-mail or Web page.

Which of the following is not a feature that is driving the growth of social marketing and advertising?

affiliate programs

To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use:

an authorization management system.

Which of the following dimensions of e-commerce security is not provided for by encryption?

availability

________ refers to the ability to ensure that an e-commerce site continues to function as intended.

availability

The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and:

confidentiality

All of the following are limitations of the existing online credit card payment system except:

cost to consumers

In the United States, the primary form of online payment is:

credit cards

The Nike iD program is an example of which of the following marketing techniques?

customer co-production

Bitcoins are an example of:

digital cash

Which of the following is not an example of an access control?

digital signatures

Malware that comes with a downloaded file that a user requests is called a:

drive-by download

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

firewall

The marketing technique known as ________ involves merchants offering products or services for a very low price for a short period of time.

flash marketing

All of the following statements about PKI are true except:

guarantees that the verifying computer of the merchant is secure.

Which of the following features of e-commerce technology allows fine-grained, highly detailed information on consumers' real-time behavior to be gathered and analyzed?

information density

Which dimension(s) of security is spoofing a threat to?

integrity and authenticity

Which of the following is the top concern of Internet users about purchasing online?

lack of trust in the purchase process

The overall rate of online credit card fraud is ________ % of all online card transactions.

less than 1

Which of the following is not one of the main elements of a comprehensive multi-channel marketing plan?

local marketing

The incremental cost of building the next unit of a good is called the:

marginal cost

Hits are a measure of the:

number of http requests.

Impressions are a measure of the:

number of times an ad is served.

All of the following statements about public key encryption are true except:

public key encryption ensures authentication of the sender.

Symmetric key encryption is also known as:

secret key encryption

All of the following are examples of malicious code except:

sniffers

All of the following are traditional online marketing tools except:

social marketing

Which of the following is not a practice that degrades the results and usefulness of search engines?

social search

A Crayola arts-and-crafts column on a parenting Web site is an example of what form of advertising?

sponsorship

Which of the following measures the average length of stay at a Web site?

stickiness

P2P payment systems are a variation on what type of payment system?

stored value payment system

None of the following payment systems offers immediate monetary value except:

stored value/debit card.

All the following statements about symmetric key encryption are true except:

symmetric key encryption is computationally slower

All of the following are online communications that are used to support the evaluation of alternatives stage of the consumer decision process except:

targeted banner ads

Studies of the effects of social "connectedness" on Internet purchases indicate that the more "connected" an individual:

the less that individual is influenced by friends' purchases

Recency refers to the:

time elapsed since the last action taken by a customer.

Which of the following did Dropbox implement after a series of security snafus in 2011 and 2012?

two-factor authentication

Which of the following forms of online advertising is growing the fastest?

video

Linden Dollars, created for use in Second Life, are an example of:

virtual currency

Which of the following is an example of an integrity violation of e-commerce security?

An unauthorized person intercepts an online communication and changes its contents.

Which of the following is a prominent hacktivist group?

Anonymous

________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.

Authenticity

Rustock is an example of which of the following?Selected Answer:

Botnet

A ________ is a repository of customer information that records all of the contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to know the customer.

CRM system

Which of the following statements about CAN-SPAM is not true?

CAN-SPAM prohibits unsolicited e-mail(spam)

Online bill payments are believed to cost ________ to process compared to ________ for paper bills.

20 to 30 cents, $3 to $7

View-through rate measures the ________ response rate to an ad.

30-day

A typical response rate for an e-mail campaign would be ________ %.

5

For a Web site that has 5 million visitors a month, and where on average, a visitor makes 10 page requests per visit, there will be ________ entries in the transaction log each month.

50 million

Online bill payment now accounts for ________ of all bill payments.

50%

The Data Encryption Standard uses a(n) ________-bit key.

56

In 2013, what was the approximate Internet penetration rate for individuals that have attained less than a high-school education?

60%

On a typical day, approximately ________ % of adult users in the United States logs on to the Internet.

80

"Shoppers" constitute approximately ________ % of the online Internet audience.

90

An interstitial ad is typically contained in a pop-up window that the user must close in order to continue.

FALSE

Credit cards are the dominant form of online payment throughout the world.

FALSE

Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties.

FALSE

Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other?

NFC

Which of the following is not one of the four main methods advertisers use to behaviorally target ads?

Nielsen ratings

which of the following statements about a free pricing strategy is false?

The free pricing strategy was born in the early days of the Web.

Search engine advertising and marketing expenditures in 2013 were approximately:

$19.5 billion

The research firm Cybersource estimated that online credit card fraud in the United States amounted to about ________ in 2012.

$3.5 billion

In 2013, mobile marketing grew at nearly the same rate as traditional online marketing.

FALSE

In the United States today, single, white, young college-educated males with high income dominate the Internet in terms of percentage of Internet usage.

FALSE

Online shoppers tend to browse for available products rather than search for specific products they have determined in advance.

FALSE

Phishing attacks rely on browser parasites

FALSE

Price is more important than convenience as a factor in online purchase decisions.

FALSE

Research has found that of all the standard formats of display ads, wide skyscraper ads are the most effective at holding a user's attention.

FALSE

TLS does not guarantee server-side authentication.

FALSE

The concept of "customer satisfaction" is broader than the concept of "customer experience."

FALSE

All of the following are methods of securing channels of communication except:

FTP

What is the first step in developing an e-commerce security plan?

Perform a risk assessment.

Insiders present a greater security threat to e-commerce sites than outsiders.

TRUE

PayPal requires the recipient of a payment to have a PayPal account to receive funds.

TRUE

Research shows that the two most important factors shaping the decision to purchase online are utility and trust.

TRUE

Spoofing involves attempting to hide a true identity by using someone else's e-mail or IP address.

TRUE

The U.S. federal government has historically not been in favor of the development and export of strong encryption systems.

TRUE

The digital divide still persists along age, income, ethnic, and education dimensions.

TRUE

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.

TRUE

Transaction logs are built into Web server software.

TRUE

Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.

TRUE

If you want to determine the size of your Web site's audience, the metric you will use for the most accurate measurement will be:

unique visitors


Ensembles d'études connexes

Principles of Marketing Chapter 6

View Set

CH. 2 Mycology, Virology, and Parasitology

View Set