E-Fashion Exam 2 Ch 4-7
refers to the ability to identify the person or entity with whom you are dealing on the internet
Authenticity
refers to the ability to ensure that an e-commerce site continues to function as intended
Availability
Which of the following is not an example of an access control?
Digital signatures
Visitors spend significantly more time on Facebook than any other social network site.
True
Which system functionality must your Web site have in order to be able to personalize or customize a product for a client?
customer on site tracking and an ad server
Which of the following are the two main components of a systems design?
logical design and physical design
In order from beginning to end, the major steps in the SDLC are
systems analysis/planning; systems design; building the system; testing; and implementation.
Malware that comes with a downloaded file that a user requests is called a:
Drive By Download
Proxy servers are also known as:
Dual home systems
Which of the following statements is not true?
Google is the leading display ad site on mobile devices
When developing an e-commerce presence, it is important to understand that the business must drive technology decisions, not the reverse.
True
The number of people exposed to pins is a measure of which of the following?
fan acquisition
Which of the following types of e-commerce presence is best suited for creating an ongoing conversation with one's customers?
social media
Which of the following is currently a small part of the online marketing universe, but is expected to triple over the next five years?
location based mobile marketing
Automatically redirecting a Web link to a different address is an example of which of the following:
Pharming
All of the following are basic information requirements for a product database except:
customer ID numbers.
Which of the following forms of online advertising is expected to grow the fastest between 2015 and 2019?
rich media
Which of the following features of e-commerce technology has reduced the cost of delivering marketing messages and receiving feedback from users?
universal standards
Which of the following is the first step in the social marketing process?
fan acquisition
The ratio of impressions to fans is a measure of:
fan acquisition.
Which of the following is the leading cause of data breaches?
hackers
In modeling online consumer behavior, the concept of "consumer skills" refers to the:
knowledge consumers have about how to conduct online transactions.
All of the following might be part of a Web site's middle-tier layer except:
legacy corporate applications
The overall rate of online credit card fraud is ________ of all online card transactions.
less than 1%
Which of the following typically includes a data flow diagram to describe the flow of information for an e-commerce site?
logical design
PayPal is an example of what type of payment system?
online stored value payment system
Which of the following details the actual hardware components to be used in a system?
physical design
Which of the following is an automated, auction-based method for matching demand and supply for online display ads?
programmatic advertising
To answer a question such as "At what time of day does our company sell the most products?" you would use ________ data mining.
query-driven
All of the following are "traditional" online marketing tools except:
social marketing.
All the following statements about symmetric key cryptography are true except:
symmetric key cryptography is computationally slower
Next generation firewalls provide all of the following except:
the ability to automatically update applications with security patches
PCI-DSS is a standard established by which of the following?
the credit card industry
If you want to determine the size of your Web site's audience, the metric you will use for the most accurate measurement will be:
unique visitors
A fingerprint scan is an example of which of the following
Biometrics
Rustock is an example of which of the following
Botnet
A ________ is a repository of customer information that records all of the contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to know the customer
CRM system
refers to the ability to ensure that messages and data are only available to those authorized to view them
Confidentiality
By 2015, spending on social marketing will be more than double the amount spent on mobile marketing.
False
Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties.
False
Facebook's AD functionality includes everyone's public posts, Likes, photos, and interests, and makes them available to all users of Facebook, even those who are not friends.
False
In 2014, spending on mobile marketing was almost three times the amount spent on local online marketing.
False
The Web server software used has a significant impact on how a Web site's Web pages look on a user's computer.
False
Traditional desktop marketing has become the smallest part of all online marketing.
False
Using prebuilt templates is typically one of the most expensive choices when building an e-commerce site.
False
Vishing attacks exploit SMS messages
False
The richness made possible by e-commerce technologies does which of the following?
It allows video, audio, and text to be integrated into a single marketing message and consuming experience.
All of the following are basic functionality provided by e-commerce merchant server software except:
Marketing software
Which of the following is not true about social marketing?
More than 50% of Twitter's ad revenues are generated by desktop users.
Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?
NFC
Which of the following is not one of the four main methods advertisers use to behaviorally target ads?
Nielsen ratings
refers to the ability to ensure that e-commerce participants do not deny their online actions
Nonrepudiation
All of the following statements about PKI are true except:
PKI guarantees that the verifying computer of the merchant is secure
Which of the following is not true about mobile marketing?
People use most of their mobile minutes while they are on the go
What is the first step in developing an e-commerce security plan?
Perform a risk assessment
Zeus is an example of which of the following:
Trojan Horse
Apache Web server software works with Linux and Unix operating systems
True
Apple Pay uses near field communication (NFC) chips.
True
Brand pages on Facebook typically attract more visitors than a brand's Web site.
True
Exploit kits are often rented or sold as a commercial product.
True
PayPal is the most popular alternative payment method in the United States.
True
Prior to the development of e-commerce, Web sites primarily delivered static HTML pages.
True
SLS/TLS cannot provide irrefutability.
True
ShellShock is an example of a software vulnerability.
True
The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.
True
There is a finite number of Bitcoins that can be created.
True
Creating multiple variations of information goods and selling these to different market segments at different prices is called:
Versioning
Which of the following involves getting customers to pass along a company's marketing message to friends, family, and colleagues?
Viral Marketing
All of the following are basic functionality provided by Web servers except:
a shopping cart.
A Web beacon is:
a tiny graphics file embedded in an e-mail or Web page
Amazon's Associates program is an example of which of the following?
affiliate marketing
Encouraging users to click a Like button is an example of which step in the social marketing process?
amplification
Which of the following dimensions of e-commerce security is not provided for by encryption?
availability
The process of comparing a Web site with that of its competitors in terms of response speed, quality of layout, and design is known as:
benchmarking.
Advantages of dynamic page generation include all of the following except:
client-side execution of programming.
Which of the following is the most important tool in establishing a relationship with the customer?
company Web site
Google's AdSense is an example of which of the following?
context advertising
Which of the following is not one of the main stages of the online purchasing process?
conversation
What are the two most important management challenges in building a successful e-commerce presence?
developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives
All of the following statements about Apple Pay are true except which of the following?
Apple Pay is available for both iPhone 5s and iPhone 6s
According to a recent National Federation of Retailers survey, what percentage of tablet users plan to purchase anything with their tablets?
Around 33%
Which of the following is an example of an integrity violation of e-commerce security?
An unauthorized person intercepts an online communication and changes its contents.
Which of the following is not true about search engine advertising?
Search engine advertising is the fastest growing type of online advertising.
FREAK is an example of which of the following
Software Vulnerability
Which of the following was designed to cripple Iranian nuclear centrifuges
Stuxnet
The annual maintenance cost for a Web site is typically much lower than its development cost.
False
A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.
Firewall