Systems and Internet Test #2
Which of the following statements is not true?
A VPN uses a dedicated secure line.
Which of the following items will Google (and other search engines) not read on your website for SEO?
A jpg of your logo A video discussing your new product A podcast by your CEO
A basic SEO Performance Report in Google Analytics would NOT have:
Bounce rate
________ is the ability to ensure that messages and data are only available to those authorized to view them.
Confidentiality
If a user came to your website by typing the url or by using a bookmark/favorite, it would be what kind of traffic source?
Direct
Google Analytics will not work on a website that is just a promotional website.
False
A basic Audience Snapshot report in Google Analytics would NOT include:
Gender Breakdown
Which of the following statements about mobile websites is not true?
Generally, mobile websites operate more quickly than traditional websites viewed on a desktop computer connected to a broadband office network.
____________ is a web analytics service offered by Google that tracks and reports website traffic
Google Analytics
Building which of the following is the least expensive path to creating a mobile presence?
Native app
What company owns CashApp?
Square
T/F A drive-by download is malware that comes with a downloaded file that a user intentionally or unintentionally requests.
True
T/F Upgrading a server from a single processor to multiple processors is an example of scaling a site vertically.
True
T/F Using prebuilt templates is typically one of the most inexpensive options when building an e-commerce site.
True
T/F Zelle is an example of a P2P mobile payment app.
True
Which of the following verifies that the business objectives of the system are in fact working?
acceptance testing
In order from beginning to end, the major steps in the SDLC are:
systems analysis/planning; systems design; building the system; testing; and implementation.
Which of the following types of sites typically require a high percentage of secure pages?
trading
Today, online bill payment accounts for ________ of all bill payments, while paper checks account for ________.
more than 55%; less than 20%
All of the following are used for authentication except:
packet filters.
Beebone is an example of which of the following?
hacktivism
The overall rate of online credit card fraud is ________ of all online card transactions.
less than 1%
The process of comparing a website with that of its competitors in terms of response speed, quality of layout, and design is known as:
benchmarking.
An intrusion detection system can perform all of the following functions except:
blocking suspicious activity.
Advantages of dynamic page generation include all of the following except:
client-side execution of programming.
A basic Device report from Google Analytics breaks down the report by:
desktop, mobile and tablet
What are the two most important management challenges in building a successful e-commerce presence?
developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives