Chapter 4/5
Which of the following basic system functionalities is used to display goods on a website?
digital catalog
Bluetooth is the primary enabling technology for mobile wallets.
false
Exploit kits can be purchased by users to protect their computers from malware.
false
The web server software used has a significant impact on how a website's web pages look on a user's computer.
false
A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.
firewall
Which of the following are the two main components of a systems design?
logical design and physical design
Beginning the e-commerce development process with a mobile presence rather than a desktop website is referred to as which of the following?
mobile first design
Building which of the following is the least expensive path to creating a mobile presence?
mobile website
Which of the following helps you engage your customers in a conversation?
on-site blog
All of the following are used for authentication except:
packet filters.
Automatically redirecting a web link to a different address is an example of which of the following?
pharming
Which of the following details the actual hardware components to be used in a system?
physical design
Which of the following would you use to verify that links on web pages are valid?
site management tools
Which of the following is not an example of malicious code?
sniffer
Which of the following types of attacks enabled hackers to take control of the Twitter accounts of dozens of America's most prominent political, entertainment and technology leaders?
social engineering
Which of the following types of e-commerce presence is best suited for creating an ongoing conversation with one's customers?
social media
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:
spyware
What is the most frequent cause of stolen credit cards and card information today?
the hacking and looting of corporate servers storing credit card information
A Trojan horse appears to be benign, but then does something other than expected.
true
Native web apps need to be developed for different mobile platforms.
true
Spoofing is the attempt to hide a hacker's true identity by using someone else's e-mail or IP address.
true
Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.
true
In February of 2018 an attack was launched against GitHub to shut down their online platform. This was done by flooding their website with requests from numerous launch points. This is referred to as a(n)?
DDoS
________ typically attack governments, organizations, and sometimes individuals for political purposes.
Hacktivists
One of the latest innovations in malicious code distribution is to embed it in the online advertising chain. This is referred to as:
Malvertising
Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?
NFC
________ is the ability to ensure that e-commerce participants do not deny their online actions.
Nonrepudiation
A drive-by download is malware that comes with a downloaded file that a user intentionally or unintentionally requests.
True
Which of the following is the most popular open source content management system?
WordPress.
The primary way a website is able to personalize the content presented to a visitor is through the use of:
cookies
The cost of hardware, software, and telecommunications services needed to build a website have ________ over the last decade.
decreased dramatically
Which of the following is one of the leading web server software options?
Apache
________ is the ability to identify the person or entity with whom you are dealing on the Internet.
Authenticity
________ is the ability to ensure that an e-commerce site continues to function as intended.
Availability
A test in which users are shown two versions of a web page is referred to as what?
A/B testing
Which of the following is the most common protocol for securing a digital channel of communication?
SSL/TLS
Which of the following is a simple but powerful method for strategizing about a business?
SWOT analysis
A ________ is an eavesdropping program that monitors information traveling across a network. It can be used for good or bad.
Sniffer
If a person poses as a friend or colleague in order to steal sensitive data or information, they are engaged in ____________.
Social Engineering
________ are the types of information systems capabilities needed to meet business objectives.
System functionalities