CIS 450 Exam 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

All of the following experienced high-profile data breaches in 2015 except:

Amazon

The leading web server software is:

Apache.

All of the following are basic functionality provided by web servers except:

A shopping cart

The primary way a website personalizes the content presented to a visitor is through the use of:

Cookies

Django follows the ________ programming principle.

DRY

Which of the following features of e-commerce technology allows fine-grained, highly detailed information on consumers' real-time behavior to be gathered and analyzed?

Information density

Conversion rate is a measure of the:

Percentage of visitors who become customers.

_ are the types of information systems capabilities needed to meet business objectives.

System functionalities

Which of the following is an example of a CMS?

WordPress

Amazon's Associates program is an example of which of the following?

affiliate marketing

Building which of the following is the most expensive path to creating a mobile presence?

native app

________ help you engage your customers in a conversation

on-site blogs

Which of the following details the actual hardware components to be used in a system?

physical design

All of the following are simple steps for optimizing web page content that can reduce response times except:

segmenting computer servers to perform dedicated functions.

Which of the following would you use to verify that links on web pages are valid?

site management tools

Which of the following types of e-commerce presence is best suited for creating an ongoing conversation with one's customers?

social media

Shellshock is an example of which of the following?

software vulnerability

A digital certificate contains all of the following except the:

subject's private key.

All the following statements about symmetric key cryptography are true except:

symmetric key cryptography is computationally slower.

In order from beginning to end, the major steps in the SDLC are:

systems analysis/planning; systems design; building the system; testing; and implementation.

All of the following are online communications that are used to support the evaluation of alternatives stage of the consumer decision process except:

targeted banner ads.

Next generation firewalls provide all of the following except:

the ability to automatically update applications with security patches

PCI-DSS is a standard established by which of the following?

the credit card industry

The term stateless refers to the fact that:

the server does not have to maintain an ongoing dedicated interaction with the client computer.

Which of the following types of sites typically needs a high percentage of secure pages?

trading

Which of the following involves getting customers to pass along a company's marketing message to friends, family, and colleagues?

viral marketing

Conficker is an example of a:

worm.

Which of the following is an example of an online privacy violation?

your online purchasing history being sold to other merchants without your consent

Which of the following measures the percentage of emails that could not be delivered?

Bounce-back rate

A ________ is a hardware or software component that acts as a filter to prevent unwanted packets from entering a network.

Firewall

Which of the following statements about mobile websites is not true?

Generally, mobile websites operate more quickly than traditional websites viewed on a desktop computer connected to a broadband office network.

Which dimensions of security is spoofing a threat to?

Integrity and authenticity

All of the following are steps one can take to the right-size a website's hardware platform and meet demands for service except:

Replacing static pages with dynamically generated pages.

Which of the following industries accounts for the highest percentage of spending on online advertising?

Retail

________ is an industry-standard database query and manipulation language.

SQL

Recency refers to the:

Time elapsed since the last visit made by a customer.

A Trojan horse appears to be benign, but then does something other than expected.

True

Apple Pay uses near field communication (NFC) chips.

True

Exploit kits are often rented or sold as a commercial product.

True

In the early years of e-commerce, prior to 2000, single, white, young college-educated males with high income dominated the Internet in terms of percentage of Internet usage.

True

Lead generation marketing firms specialize in inbound marketing.

True

Mobile web apps are typically built using HTML5 and Java.

True

Accessing data without authorization on Dropbox is an example of which of the following?

cloud security issue

Ad blockers operate in a manner similar to which of the following?

firewalls

Which of the following is the leading cause of data breaches?

hackers

Which of the following is the minimum system architecture requirement for an e-commerce website that processes orders?

two-tier architecture

When using multivariate testing, if you wish to test two different versions of an image, a button, and a piece of text, how many combinations will you need to test?

8

Which of the following statements is not true?

A VPN uses a dedicated secure line

A web beacon is:

A tiny graphics file embedded in an e-mail or web page.

Which of the following verifies that the business objectives of the system as originally conceived are in fact working

Acceptance testing

All of the following are important factors in search engine optimization except:

Adhering to privacy policies

Which of the following has the Internet Advertising Bureau urged advertisers to abandon?

Adobe Flash

Which of the following is an example of an integrity violation of e-commerce security?

An unauthorized person intercepts an online communication and changes its contents.

The attack on Dyn, Twitter, Amazon, and other major organizations in October 2016, is an example of which of the following?

DDoS attack

Which of the following online advertising formats involved the least amount of spending in 2016?

Email

All of the following are methods of securing channels of communication except:

FTP

An ad is considered viewable if half of the ad can be viewed for at least five consecutive seconds.

False

Consumers choose online channels (e.g., e-mail) primarily due to social media influence.

False

Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties.

False

Phishing attacks rely on browser parasites.

False

Storing HTML pages in RAM rather than on a server's hard drive is an expensive way to fine-tune the processing architecture of a website.

False

The annual maintenance cost for a website is typically much lower than its development cost.

False

The concept of "customer satisfaction" is broader than the concept of "customer experience".

False

The concept of "customer satisfaction" is broader than the concept of "customer experience."

False

The highest amount of online advertising spending is for online video ads.

False

The majority of online shoppers find vendors by clicking on display ads.

False

The web server software used has a significant impact on how a website's web pages look on a user's computer.

False

Upgrading a server from a single processor to multiple processors is an example of scaling a site horizontally.

False

Using prebuilt templates is typically one of the most expensive choices when building an e-commerce site.

False

Vishing attacks exploit SMS messages.

False

Which of the following is not a main factor in determining the overall demand on an e-commerce site?

File sizes of web pages being served

Which of the following would you use as a framework for working with your company's big data sets?

Hadoop

Which of the following search engine algorithm updates enables Google's search engine to evaluate an entire sentence rather than just a keyword?

Hummingbird

The richness made possible by e-commerce technologies does which of the following?

It allows video, audio, and text to be integrated into a single marketing message and consuming experience.

________ is a programming language invented by Netscape used to control the objects on an HTML page and handle interactions with the browser.

JavaScript

The overall rate of online credit card fraud is ________ of all online card transactions.

Less than 1%

The incremental cost of building the next unit of a good is called the:

Marginal cost

Which of the following is not a major trend in e-commerce payments in 2016-2017?

Mobile retail payment volume decreases

Which of the following statements about native advertising is not true?

Native advertising is a new form of advertising found only online.

Which form of testing compares a control page with one that is very different?

New concept test

Which of the following is not one of the four main methods advertisers use to behaviorally target ads?

Nielsen ratings

Hits are a measure of the:

Number of HTTP requests

Impressions are a measure of the:

Number of times an ad is served.

Which of the following is a standard that makes it possible to access data from any application regardless of the database and operating system software being used?

ODBC

All of the following are among those most frequently affected by ad-blocking except:

Online retailers

MySQL is which of the following?

Open source database software

All of the following statements about PKI are true except:

PKI guarantees that the verifying computer of the merchant is secure.

All of the following are used for authentication except:

Packet filters

Google introduced ________ to its search algorithm to weed out low-quality sites from search results.

Panda

Acquisition rate is a measure of the:

Percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages

Automatically redirecting a web link to a different address is an example of:

Pharming

Confidentiality is sometimes confused with:

Privacy

Which of the following types of application server monitors and controls access to a main web server and implements firewall protection

Proxy server

All of the following statements about public key cryptography are true except:

Public key cryptography ensures authentication of the sender

Django is based on which of the following?

Python

Which of the following statements about responsive web design (RWD) is not true?

RWD works best for sites that have complex functionality

Which of the following forms of online advertising is expected to grow the fastest between 2016 and 2020?

Rich media

Which of the following is the most common protocol for securing a digital channel of communication?

SSL/TLS

Symmetric key cryptography is also known as:

Secret key cryptography

All of the following are "traditional" online marketing tools except:

Social marketing

Software that is used to obtain private user information such as a user's keystrokes or copies of email is referred to as:

Spyware

Which of the following measures the average length of stay at a website?

Stickiness

Which of the following statements about the internet's impact on marketing is not true?

The internet has decreased the impact of brands.

A list server can be used to manage email marketing campaigns.

True

A native app is one designed to specifically operate using a mobile device's hardware and operating system.

True

A worm does not need to be activated by a user for it to replicate itself.

True

Bundling is the process of selling two or more products together for a price that is less than the sum of the two product's individual prices.

True

Consumers tend to look at native ads more frequently than display ads.

True

CryptoLocker is an example of ransomware.

True

Evidence suggests real-time customer chat increases the dollar value of transactions.

True

PayPal is the most popular alternative payment method in the United States.

True

Prior to the development of e-commerce, websites primarily delivered static HTML pages.

True

Research has found that most ad impressions served across display advertising platforms are not viewable.

True

Research shows that the two most important factors shaping the decision to purchase online are utility and trust.

True

SLS/TLS cannot provide irrefutability.

True

The SDLC methodology that can be used to create an e-commerce website has five major steps.

True

There is a finite number of Bitcoins that can be created.

True

Transaction logs are built into web server software.

True

Two-tier architecture typically includes a web server and a database server.

True

Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.

True

When developing an e-commerce presence, it is important to understand that the business must drive technology decisions, not reverse.

True

Which of the following features of e-commerce technology has reduced the cost of delivering marketing messages and receiving feedback from users?

Universal standards

Creating multiple variations of information goods and selling these the different market segments at different prices is called:

Versioning

Linden Dollars, created for use in Second Life, are an example of:

Virtual currency

All of the following are major players in hosting/co-location/cloud services except:

WordPress

In 2016, Yahoo revealed that it had experienced which of the following?

a high-profile data breach

Which of the following dimensions of e-commerce security does not involve encryption?

availability

According to Ponemon Institute's 2015 survey, which of the following was not among the causes of the costliest cybercrimes?

botnets

Which of the following measures the ratio of items purchased to product views?

browse-to-buy ratio

What are the two most important management challenges in building a successful e-commerce presence?

developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives

Which of the following is not an example of a PUP?

drive-by download

Which dimension(s) of security is spoofing a threat to?

integrity and authenticity

In modeling online consumer behavior, the concept of "consumer skills" refers to the:

knowledge consumers have about how to conduct online transactions.

All of the following are website design features that annoy customers except:

multi-browser functionality.

Which of the following is not a primary source of ad fraud?

native advertising that is displayed on a social media site

Purchasing an online ad on a CPA basis means that the advertiser:

pays only for those users who perform a specific action, such as registering, purchasing, etc.

Which of the following is not a practice that degrades the results and usefulness of search engines?

social search

View-through rate measures the ________ response rate to an ad.

30-day

For a website that has 1 million visitors a month, and where, on average, a visitor makes five page requests per visit, there will be ________ entries in the transaction log each month.

5 million

The percentage of all email that is spam averaged around ____% in 2016.

53

The Data Encryption Standard uses a(n) ________-bit key.

56

Around ______% of households in the United State have broadband access to the internet.

75

Online buyers constitute approximately _____% of the online internet audience.

77

________ is not an example of malicious code.

A sniffer

All of the following offer website building tools except:

Apache

All of the following statements about Apple Pay are true except which of the following?

Apple Pay is subject to recent regulations issued by the Bureau of Consumer Financial Protection applicable to FRP transactions.

Which of the following measures the percentage of customers who purchase once, but never return within a year?

Attrition rate

________ refers to the ability to ensure that an e-commerce site continues to function as intended.

Availability

All of the following are prominent hacktivist groups except:

Avid Life

Dynamic page generation increases menu costs.

False

Which of the following statements is not true?

The Cybersecurity information sharing act was strongly supported by most large technology companies and privacy advocates.

Which of the following is based on the idea of complete price transparency in a perfect information marketplace?

The Law of One Price

All of the following statements about cookies are true except:

The data typically stored in cookies includes a unique ID and email address

Which of the following statements about a free pricing strategy is false?

The free pricing strategy was born in the early days of the Web.

Offline media is typically used for all of the following marketing activities except:

Conversation

Which of the following is not one of the main stages of the online purchasing process?

Conversation

All of the following are limitations of the existing online credit card payment system except:

Cost to consumers

The process of comparing a websites with that of its competitors in terms of response speed, quality of layout, and design is known as:

Benchmarking

All of the following are examples of social/mobile peer-to-peer payment systems except:

Bill Me Later

A fingerprint scan is an example of which of the following?

Biometrics

An intrusion detection system can perform all of the following functions except:

Blocking suspicious activity

Which of the following statements about CAN-SPAM is not true?

CAN-SPAM prohibits unsolicited e-mail (spam).

Which of the following technologies is used to separate the design and presentation of content from the content creation process?

CMS

A _____ is a repository of customer information that records all of the contracts a customer has with a firm, and generates a customer profile that is available to appropriate individuals in the firm.

CRM system

Advantages of dynamic page generation include all of the following except:

Client-side execution of programming

Ruby on Rails is based on which of the following philosophies?

CoC

Which of the following is the most important tool in establishing a relationship with the customer?

Company website

Which of the following is the most meaningful metric for video ads?

Completion rate

Google's AdSense is an example of which of the following?

Context advertising


संबंधित स्टडी सेट्स

Unit 1 Test Review- Growing Pains

View Set

NCLEX book CHAPTER 37- Gastrointestinal Disorders

View Set

Fluid & Electrolyte Imbalance Practice Questions

View Set