E-Fashion Final
Which of the following is an example of an integrity violation of e-commerce security?
An unauthorized person intercepts an online communication and changes its contents.
All of the following statements about Apple Pay are true except which of the following?
Apple Pay is available for both iPhone 5s and iPhone 6s
_______commerce includes the following business processes: customer relationship management, demand management, order fulfillment, manufacturing management, procurement, product development, returns, logistics/transportation, and inventory managemen
B2B
All of the following are forms of collaboration among businesses except:
RFQs
________ refers to differentiating a firm's products or prices on the basis of superior supply chain management
Supply Chain Management
Which of the following statements about EDI systems is true?
They typically serve vertical markets
Which of the following was the first step in the development of B2B e-commerce?
automated order entry systems
Which of the following dimensions of e-commerce security is not provided for by encryption?
availability
A fingerprint scan is an example of which of the following
biometrics
Rustock is an example of which of the following
botnet
The majority of inter-firm trade involves:
contract purchasing of direct goods
All of the following are examples of direct goods in the auto industry except:
desktop computers.
Which of the following is not an example of an access control?
digital signatures
Direct goods
direct goods are not involved directly in production process.
A private industrial network is an independently owned online marketplace that connects many suppliers and buyers (t/f)
false
Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties. (t/f)
false
There is a finite number of Bitcoins that can be created? (t/f)
false
Which of the following is the leading cause of data breaches?
hackers
Worms
it's a type of malware that has the capability to copy itself on different computers.
The overall rate of online credit card fraud is ________ of all online card transactions.
less than 1%
An ________ serves businesses that primarily buy direct goods on a contract purchasing basis.
net marketplace
PayPal is an example of what type of payment system?
online stored value payment system
Automatically redirecting a Web link to a different address is an example of which of the following:
pharming
FREAK is an example of which of the following:
software vulnerability
Which of the following was designed to cripple Iranian nuclear centrifuges:
stuxnet
Next generation firewalls provide all of the following except:
the ability to automatically update applications with security patches
PCI-DSS is a standard established by which of the following?
the credit card industry
Availability
the process of making sure e-commerce websites function as they should
Authenticity
· the process of being able to see the person or what entity you're interacting with
Bid rigging
Bid Rigging is the process of limiting bids or submitting false bids in order to raise prices.
The essential characteristic of ________ is that they bring hundreds to thousands of suppliers into a single Internet-based environment to conduct trade.
Net marketplaces
· What are the four technology solutions for protecting a computer and it's communications?
Protect Internet communications with cryptography/encryption Protect clients and servers with different types of security such as OS security and anti-virus software Secure communication channels such as SSL, VPNs, TLS, and Wi-Fi Protect networks with firewalls, proxy servers, IPS, and IDS
practice networks
The second type of online community is practice networks, an example of this is LinkedIn. They offer discussion boards and offer help and knowledge to specific practices.
internet based network
The third type of online community is interest-based networks. An example of this is Fashion Tap. They offer the chance to discuss and interact with others over a specific area of interest.
Proxy servers are also known as:
dual home systems
All of the following are potential benefits of B2B e-commerce except:
lower transaction costs
All the following statements about symmetric key cryptography are true except:
symmetric key cryptography is computationally slower
Confidentiality
the process of making sure data and messages are available to only people that are allowed to see it
Nonrepudiation
the process of making sure e-commerce participants don't deny their actions they perform online
The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software. (t/f)
true
Walmart is the largest purchaser of consumer goods in the world (t/f)
true
All of the following statements about PKI are true except:
PKI guarantees that the verifying computer of the merchant is secure
· What are the various steps in developing an e-commerce security plan to protect a server?
Risk assessment, security policy, implementation plan, create a security organization, and security audit
· What are the steps in the procurement process?
Search, qualifty, negotiate, purchase order, invoicing, shipping, and remittance payment.
________ purchasing involves the purchase of goods based on immediate needs in larger marketplaces that involve many suppliers
Spot
general communities
The first type of online community is general communities and examples of this are Facebook and Twitter. They give users the chance to interact with others. You can advertise by buying online ad space on videos and pages.
sponsor based
The fourth type of community is a sponsored community. An example of this is Etsy. They are created by the government, non-profit, or for-profit organizations. They are used to pursue organizational goals such as making your own store through Etsy and making money off of it.
The Seam is an example of an ________.
industry consortium
e-procurement
it is an independently owned intermediary that connects lots of online suppliers that offer millions of maintenance and repair parts to business firms who have to pay fees in order to join the market.
Which of the following is not a typical barrier to the implementation of a private industrial network?
it requires large networks owners to give up some of its independence
e-distributor
provides an online catalog that represents products from multiple manufacturers
Trojan Horses
it's a type of code/software that has the ability to control a computer. It can damage, steal information, disrupt, and destroy your network and data.
A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.
firewall
Private industrial networks
re internet-based networks that manage interactions between different companies in all areas of the business
Which of the following statements about cloud-based B2B systems is not true?
Much of the expense of the system is shifted from the B2B network provider to the firm
Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?
NFC
_______ are Internet-based communication environments that extend far beyond procurement to encompass truly collaborative commerce.
Private industrial network
Analysts predict that B2B e-commerce in the United States will grow by 2019 to approximately:
$8.6 billion
Contract purchasing
Contract purchasing is a long-term written agreement to buy specific products
All of the following are weaknesses of EDI except:
EDI lacks universal standards
· What are the different types of online auction sites?
English Auction, Dutch Internet Auction, Penny Auction, and Name Your Own Price
Office supplies are an example of:
Indirect goods
Indirect goods
Indirect goods are involved in production process
Industrial Consortiums
Industrial Consortiums - it is an industry owned vertical market that enables buyers to purchase direct goods and services from a limited set of invited participants
Six security dimensions
Integrity, confidentiality, privacy, availability, nonrepudiation, and
· What is a private industrial network?
It is an internet-based environments that manage interactions between companies in all processes, such as supply chain management.
All of the following are current major trends in B2B e-commerce, except;
Move to implement highly centralized supply chains to reduce risk
Affinity community
The fifth type of community is an affinity community. An example of this is women.com. They give people to interact with others of the same interest and demographic
Botnets
this is a type of trojan virus that organizes and infects all machines in the network.
Malware
this is the overall term to describe different threats to your computer such as trojans and spyware
Apple Pay uses near field communication (NFC) chips (t/f)
true
Exploit kits are often rented or sold as a commercial product. (t/f)
true
MRO goods are also known as indirect goods (t/f)
true
PayPal is the most popular alternative payment method in the United States. (t/f)
true
Purchasing managers are the key players in the procurement process. (t/f)
true
SLS/TLS cannot provide irrefutability. (t/f)
true
ShellShock is an example of a software vulnerability. (t/f)
true
· What are the THREE MAIN types of online auction sites?
B2C auctions, C2C auctions, and specialized auctions
Malware that comes with a downloaded file that a user requests is called a:
drive by download
An ________ provides electronic catalogs that represent the products of thousands of direct manufacturers.
e-distributor
An ________ primarily serves businesses that primarily buy indirect goods on a contract purchasing basis
e-procurement
Price matching
Price Matching is the process of agreeing to set floor prices on items up for auction below where sellers will not sell them in open markets
What is the first step in developing an e-commerce security plan?
Perform a risk assessment
· What are the various trends in supply chain management?
Just-in-time and lean production, supply chain simplifications, adaptive supply chains, accountable supply chains, sustainable supply chains, electronic data interchange, mobile business to business, and cloud based business to business systems
Vishing attacks exploit SMS messages (t/f)
false
Spot purchasing
Spot purchasing is the process of buying goods because there are immediate needs in large marketplaces involving multiple suppliers.
Zeus is an example of which of the following:
Trojan horse