E-Commerce Test 2 Chapter 4 and 5

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Proxy servers are also known as:

Dual home systems

The Web server software used has a significant impact on how a Web site's Web pages look on a user's computer. T/F?

False

All of the following are basic functionality provided by Web servers except: site management tools. data capture tools. security services. a shopping cart

a shopping cart

Which of the following are the two main components of a systems design?

logical design and physical design

________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.

Authenticity

________ refers to the ability to ensure that an e-commerce site continues to function as intended.

Availability

Which of the following is not an example of an access control?

Digital signatures

________ refers to the ability to ensure that e-commerce participants do not deny their online actions

Nonrepudiation

What is the first step in developing an e-commerce security plan?

Perform a risk assessment

Automatically redirecting a Web link to a different address is an example of which of the following:

Pharming

Zeus is an example of which of the following:

Trojan horse

Apple Pay uses near field communication (NFC) chips. T/F?

True

Exploit kits are often rented or sold as a commercial product. T/F?

True

Prior to the development of e-commerce, Web sites primarily delivered static HTML pages. T/F?

True

SLS/TLS cannot provide irrefutability. T/F?

True

ShellShock is an example of a software vulnerability. T/F?

True

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software. T/F?

True

There is a finite number of Bitcoins that can be created. T/F?

True

When developing an e-commerce presence, it is important to understand that the business must drive technology decisions, not the reverse. T/F?

True

All of the following are basic information requirements for a product database except: customer ID numbers. product descriptions. stock numbers. customer ID numbers. inventory levels.

customer ID numbers.

Which system functionality must your Web site have in order to be able to personalize or customize a product for a client?

customer on-site tracking

What are the two most important management challenges in building a successful e-commerce presence?

developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives

Malware that comes with a downloaded file that a user requests is called a:

drive-by download

Which of the following typically includes a data flow diagram to describe the flow of information for an e-commerce site?

logical design

Explain the main functionalities included in e-commerce merchant server software

online catalog, order taking capabilities using an online shopping cart, and online credit card processing

All the following statements about symmetric key cryptography are true except: in symmetric key cryptography, both the sender and the receiver use the same key to encrypt and decrypt a message the Data Encryption Standard is a symmetric key encryption system symmetric key cryptography is computationally slower symmetric key cryptography is a key element in digital envelopes

symmetric key cryptography is computationally slower

Which of the following is the leading cause of data breaches?

hackers

All of the following might be part of a Web site's middle-tier layer except: a database server. an ad server. legacy corporate applications. a mail server.

legacy corporate applications.

The overall rate of online credit card fraud is ________ of all online card transactions.

less than 1%

All of the following are basic functionality provided by e-commerce merchant server software except: a product catalog. marketing software. a shopping cart. credit card processing.

marketing software

PayPal is an example of what type of payment system?

online stored value payment system

Which of the following details the actual hardware components to be used in a system?

physical design

What are the phases, activities, and milestones for developing an e-commerce presence for a typical start-up Web site over a one-year period?

planning, development, and implementation

Which of the following types of e-commerce presence is best suited for creating an ongoing conversation with one's customers?

social media

In order from beginning to end, the major steps in the SDLC are:

systems analysis/planning; systems design; building the system; testing; and implementation.

Next generation firewalls provide all of the following except:

the ability to automatically update applications with security patches

The annual maintenance cost for a Web site is typically much lower than its development cost. T/F?

False

Using prebuilt templates is typically one of the most expensive choices when building an e-commerce site, T/F?

False

Vishing attacks exploit SMS messages. T/F?

False

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

Firewall

Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?

NFC

Apache Web server software works with Linux and Unix operating systems, T/F?

True

ayPal is the most popular alternative payment method in the United States. T/F?

True

Which of the following dimensions of e-commerce security is not provided for by encryption?

availability

The process of comparing a Web site with that of its competitors in terms of response speed, quality of layout, and design is known as:

benchmarking

Advantages of dynamic page generation include all of the following except:

client-side execution of programming

PCI-DSS is a standard established by which of the following?

credit card industry

All of the following statements about Apple Pay are true except which of the following?

Apple Pay is available for both iPhone 5s and iPhone 6s

Which of the following is an example of an integrity violation of e-commerce security?

An unauthorized person intercepts an online communication and changes its contents.

FREAK is an example of which of the following:

Software vulnerability

Which of the following was designed to cripple Iranian nuclear centrifuges:

Stuxnet

A fingerprint scan is an example of which of the following

Biometrics

Rustock is an example of which of the following

Botnet

________ refers to the ability to ensure that messages and data are only available to those authorized to view them.

Confidentiality

All of the following statements about PKI are true except:

The acronym PKI stands for public key infrastructure.


Ensembles d'études connexes

Chapter 1-6 Test Behavior Management

View Set

What Does it Mean to be an Entrepreneur?

View Set

System Of Equations Review / Project

View Set

3rd semester: 1st test practice questions

View Set

Cell Bio Lecture 14: Membrane Proteins

View Set