Chapter 4/5

Ace your homework & exams now with Quizwiz!

Which of the following basic system functionalities is used to display goods on a website?

digital catalog

Bluetooth is the primary enabling technology for mobile wallets.

false

Exploit kits can be purchased by users to protect their computers from malware.

false

The web server software used has a significant impact on how a website's web pages look on a user's computer.

false

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

firewall

Which of the following are the two main components of a systems design?

logical design and physical design

Beginning the e-commerce development process with a mobile presence rather than a desktop website is referred to as which of the following?

mobile first design

Building which of the following is the least expensive path to creating a mobile presence?

mobile website

Which of the following helps you engage your customers in a conversation?

on-site blog

All of the following are used for authentication except:

packet filters.

Automatically redirecting a web link to a different address is an example of which of the following?

pharming

Which of the following details the actual hardware components to be used in a system?

physical design

Which of the following would you use to verify that links on web pages are valid?

site management tools

Which of the following is not an example of malicious code?

sniffer

Which of the following types of attacks enabled hackers to take control of the Twitter accounts of dozens of America's most prominent political, entertainment and technology leaders?

social engineering

Which of the following types of e-commerce presence is best suited for creating an ongoing conversation with one's customers?

social media

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

spyware

What is the most frequent cause of stolen credit cards and card information today?

the hacking and looting of corporate servers storing credit card information

A Trojan horse appears to be benign, but then does something other than expected.

true

Native web apps need to be developed for different mobile platforms.

true

Spoofing is the attempt to hide a hacker's true identity by using someone else's e-mail or IP address.

true

Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.

true

In February of 2018 an attack was launched against GitHub to shut down their online platform. This was done by flooding their website with requests from numerous launch points. This is referred to as a(n)?

DDoS

________ typically attack governments, organizations, and sometimes individuals for political purposes.

Hacktivists

One of the latest innovations in malicious code distribution is to embed it in the online advertising chain. This is referred to as:

Malvertising

Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?

NFC

________ is the ability to ensure that e-commerce participants do not deny their online actions.

Nonrepudiation

A drive-by download is malware that comes with a downloaded file that a user intentionally or unintentionally requests.

True

Which of the following is the most popular open source content management system?

WordPress.

The primary way a website is able to personalize the content presented to a visitor is through the use of:

cookies

The cost of hardware, software, and telecommunications services needed to build a website have ________ over the last decade.

decreased dramatically

Which of the following is one of the leading web server software options?

Apache

________ is the ability to identify the person or entity with whom you are dealing on the Internet.

Authenticity

________ is the ability to ensure that an e-commerce site continues to function as intended.

Availability

A test in which users are shown two versions of a web page is referred to as what?

A/B testing

Which of the following is the most common protocol for securing a digital channel of communication?

SSL/TLS

Which of the following is a simple but powerful method for strategizing about a business?

SWOT analysis

A ________ is an eavesdropping program that monitors information traveling across a network. It can be used for good or bad.

Sniffer

If a person poses as a friend or colleague in order to steal sensitive data or information, they are engaged in ____________.

Social Engineering

________ are the types of information systems capabilities needed to meet business objectives.

System functionalities


Related study sets

Marine Science B (Unit 1- Unit 5)

View Set

What is the longest word you know

View Set

Med Surge Exam 1 Review Questions

View Set

Physiology of Health and Aging: Exam 1

View Set