Deck 2: CIW E-Commerce Designer

Full screen (f)
exit full mode
Question
What step would be appropriate before launching an e-commerce site with a newly installed payment gateway?

A) Contact the issuing bank to verify connections.
B) Contact the acquiring bank to verify connections.
C) Register the gateway with accepted credit card issuers.
D) Test the system using various payment methods.
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following is true of high-level offline storefronts?

A) They use only proprietary encryption and data-formatting standards.
B) They are not designed to support business-to-business (B2B) needs.
C) They require the site to be taken offline whenever a change is made.
D) They require the greatest amount of expertise to use properly.
Question
According to the X.509 (ITU) standard, which of the following is a non-standard certificate field that can contain additional information such as date of birth?

A) Fingerprint
B) Subject (User) Name
C) Subject Public-Key Information
D) Extensions (v3)
Question
You want to configure a second Web site on a server. Which of the following most efficiently ensures that requests are properly processed by this second Web server for customers around the world?

A) Secure Sockets Layer (SSL)
B) The server's hosts file
C) The hosts file on user systems
D) A host header value
Question
Nain is a front-desk receptionist at a large corporation. After a recent payday for the employees, Nain received a phone call from someone claiming to be an employee who was out-of-state on an assignment. This person asked Nain whether his check had been deposited, and to verify that the check was written to a specific account name and bank routing number. This occurrence may be a type of attack known as a:

A) denial-of-service attack.
B) social-engineering attack.
C) pharming attack.
D) phishing attack.
Question
You are logged on to a Linux system. You suspect a problem with the system's MySQL database server. Which of the following files will contain relevant information pertaining to the failure?

A) ~root/.error
B) /var/run/lock/mysql
C) ~root/.database_error
D) /var/log/messages
Question
Which organization is responsible for regulating the process of importing and exporting goods?

A) Port Authority
B) Exchange
C) World Bank
D) Customs
Question
Which of the following is submitted to identify each person who handles evidence after a site infiltration?

A) Authentication record
B) Proof of delivery
C) Chain of custody
D) Server status report
Question
The daily number of visitors to Cathy's site has increased by 600 percent and the current server configuration is beginning to drop requests. Cathy has decided to scale out the Web site by adding servers that will function as a server farm to host the company site. Adding servers in this way is known as:

A) fail-over.
B) clustering.
C) cloning.
D) scaling up.
Question
The details of an e-commerce site order can be kept in memory, stored on the visitor's computer or stored on the Web server. This ability to remember the details of an order is known as:

A) filling the shopping cart.
B) persisting an order.
C) tracking an order.
D) profiling an order.
Question
Which of the following is most essential when setting a marketing goal for an e-commerce site?

A) The site must support efforts to improve customer service.
B) The site must conform to the latest technical standards.
C) The site must complement the company's direction.
D) The site must conform to the latest accessibility standards.
Question
You are transitioning from a traditional "brick-and-mortar storefront that accepts credit cards to a new e-commerce storefront. Which payment method would be most appropriate during the transition?

A) Open Buying on the Internet (OBI)
B) Advance payment using check or money order
C) Cash on delivery (c.o.d.)
D) Credit card with offline processing
Question
Tom has encountered a problem with the Apache server installation on his company's server. Because he does not have an immediate solution to the problem, he should contact:

A) the Apache user online forum.
B) the Apache Help desk.
C) the Apache service staff.
D) the Apache live Help service.
Question
What is the first step in improving your Web server's performance?

A) Determine the efficiency of the CGI applications.
B) Upgrade the server's RAM.
C) Upgrade the server's CPU.
D) Monitor performance and create a baseline.
Question
An e-commerce site administrator believes that her site's security has been compromised. The most important participants of her recovery plan are the Web team, law enforcement and the:

A) marketing department.
B) certificate authority (CA).
C) Internet Service Provider (ISP).
D) server software publisher.
Question
Carly has requested a digital certificate for her Web site. Instructions for downloading and installing the new certificate will be:

A) sent to Carly's e-mail address.
B) sent to Carly by postal service.
C) provided only on Carly's request.
D) remotely installed on Carly's Web server.
Question
Before you can conduct usability testing, you should:

A) publish your site to a production server.
B) identify your potential customers.
C) identify browser compatibility issues.
D) identify the most-traveled path of your site.
Question
What is the term for using a single secret key to both encrypt and decrypt your data?

A) Asymmetric-key encryption
B) Hash encryption
C) Symmetric-key encryption
D) Binary-key encryption
Question
Tom has encountered a problem with the Apache server installation on his company's server. Because he does not have an immediate solution to the problem, he should contact:

A) the Apache live Help service.
B) the Apache user online forum.
C) the Apache service staff.
D) the Apache Help desk.
Question
You are considering payment methods for a business-to-business (B2B) e-commerce site. Which payment method would be most appropriate for your needs?

A) Cash on delivery (c.o.d.)
B) Purchase order and post-purchase billing
C) Advance payment using check or money order
D) Purchase request and pre-purchase billing
Question
An online instant storefront can build community by:

A) granting quantity discounts.
B) creating an e-mail newsletter.
C) using banner exchange programs.
D) providing a public listing of customer e-mail addresses.
Question
Alcazar wants to host three Web sites on the same computer, and to use SSL for transactions on each site. Which of the following methods for hosting multiple Web sites would be most suitable?

A) Use server virtualization software to run multiple operating systems.
B) Use three separate ports.
C) Use three separate host header names.
D) Bind three IP addresses to the server.
Question
You have posted your e-commerce site on a staging server. Which of the following most effectively ensures that your site will provide a satisfying experience for users?

A) Implementing Web site stress-testing software
B) Engaging in role playing in order to test the site
C) Using design techniques to ensure symmetrical balance
D) Using design techniques to ensure asymmetrical balance
Question
What is the result of an e-commerce HTTP server that processes the input queue at a rate equal to or greater than that of incoming requests?

A) A bottleneck occurs.
B) Network bandwidth decreases.
C) The server performs adequately.
D) The site visitor experiences a delay.
Question
Which of the following is a primary concern when configuring a shopping-cart system?

A) Compatibility with ODBC and ASP
B) Payment gateway support of SSL/TLS
C) The initial connection cost
D) Compatibility with the payment gateway
Question
Placing an institutional banner ad on a site that targets a specific market can result in:

A) a higher clickthrough rate.
B) increased banner exchange.
C) better banner ad positioning on the site.
D) higher search-engine ranking.
Question
Which of the following steps are necessary for installing a payment gateway?

A) Determine payment methods and configure the gateway to work with the e-commerce solution.
B) Contact credit card organizations and link the gateway to the customer database.
C) Choose an e-commerce solution and establish shipping and taxation options.
D) Set up an Automated Clearing House account and obtain a shopping-cart system.
Question
Jennifer placed a special product advertisement on the home page of her e-commerce site. After one week, she reviewed her server logs to see how many visitors clicked the ad, completed the registration page and then entered credit card information to purchase the product. Jennifer's site path analysis is a review of:

A) live usability testing and role playing.
B) controlled-navigation click patterns.
C) customer satisfaction surveys.
D) good e-commerce advertising.
Question
Maggie is developing a site that allows purchases to be made online. What technology should she use to enable security measures on this site?

A) SSL
B) S-HTTP
C) HTTP
D) SET
Question
The goals for effective usability in an e-commerce site are to get customers to:

A) visit, learn and return.
B) find, learn and review.
C) find, compare and revisit.
D) visit, learn and purchase.
Question
Which of the following is a disadvantage of an online storefront?

A) Specialized hardware requirements
B) High software costs
C) Difficulty of administration
D) Lack of control over security
Question
You are planning to install a database server in a mission-critical environment. What is the best way to ensure continuous data availability and reliability?

A) Provide fail-over clustering.
B) Install a multiprocessor server.
C) Establish a strict security policy.
D) Install multiple hot-swappable hard disk drives.
Question
Which of the following describes a targeted marketing program?

A) A program that targets a specific group of interested people
B) A program that selects the largest array of products and markets them to those most likely to purchase products online
C) A program that selects the smallest array of products and markets them to those most likely to purchase products online
D) A program that targets the broadest group of people in the most countries around the world
Question
Which of the following demonstrates the importance of manual transaction processing?

A) It enables vendors to receive multiple orders of different items.
B) It enables vendors to complete a customer return request by telephone.
C) It enables customers to send an item to an alternative address.
D) It enables customers to use a dial-up connection to perform a transaction.
Question
Which of the following requires you to provide redundant Internet connections to ensure site availability?

A) Instant storefront
B) Mid-level offline storefront
C) In-house storefront
D) High-level offline storefront
Question
You have just obtained a signed digital certificate from a certificate authority. What is the next step you should take?

A) Install the certificate.
B) Sign the certificate.
C) Export the certificate.
D) Publish the certificate.
Question
What aspect of e-commerce marketing most significantly differentiates the use of a niche marketing strategy from that of a global marketing strategy?

A) Common customer interests
B) Advertising media choices
C) Products and/or services offered
D) Geographic distribution of the customers
Question
What security protocol typically allows Web-based applications to pass data securely by providing an encrypted channel?

A) SSH
B) SSL
C) SET
D) HTTP
Question
Which of the following is the most effective strategy for conducting an opt-in e-mail marketing campaign?

A) Create an executable ActiveX application as an e-mail attachment that describes the company.
B) Send e-mail messages once a day to initial contacts for the first two weeks.
C) Create an executable Java application as an e-mail attachment that describes the company.
D) Send e-mail messages once every two weeks to follow up on an initial contact.
Question
Which of the following describes a Sharable Content Object Reference Model (SCORM) manifest?

A) An XML document that describes a Sharable Content Object (SCO)
B) A style sheet that gives structure to the page containing a Sharable Content Object (SCO)
C) An XHTML document that is SCORM-conformant
D) A relational database that contains Sharable Content Object (SCO) information
Question
Which of the following best describes an e-commerce transaction system?

A) It operates like an atomic reaction: One event sets off a series of events that quickly result in an explosion of activity.
B) It operates like the open-source community: Individuals will not use propriety solutions.
C) It operates like a chain: One broken link causes problems for the entire system.
D) It operates like a retail sales transaction: Personal interaction influences buying decisions.
Question
Denying that a payment transaction took place is known as:

A) nonrepudiation.
B) negative authentication.
C) poor data integrity.
D) repudiation.
Question
You are reviewing the requirements for an order entry system. The system will need to work with your accounting system and your customer database. Which of the following is the most important consideration?

A) Secure transaction processing
B) Ease of use
C) Backup ability
D) Database compatibility
Question
The goals for effective usability in an e-commerce site are to get customers to:

A) visit, learn and return.
B) visit, learn and purchase.
C) find, learn and review.
D) find, compare and revisit.
Question
Mason runs an e-commerce site selling products from his business in Texas, which has a local sales tax of 7.5 percent. What would the tax rate be for a customer in Egypt?

A) 7 percent
B) 0 percent
C) 6.5 percent
D) 7.5 percent
Question
Customers use your company's software to receive real-time weather reports. One of the company's software developers has proposed creating a second application that installs at the same time as the weather software, but operates in the background and reports user preferences and other information to your company. What is the name for this type of application?

A) Spyware
B) Freeware
C) Daemon
D) Value-add
Question
Under Secure Electronic Transactions (SET), which three parties involved in a transaction are required to use the SET protocol?

A) The broker, the merchant, the customer
B) The customer, the credit card company, the bank
C) The merchant, the bank, the customer
D) The wholesaler, the merchant, the bank
Question
Which of the following is often used in place of photo identification and a signature whenever a credit card is used in an e-commerce transaction?

A) Cookies deposited by the site's shopping cart
B) Information verified by a Public Key Infrastructure (PKI) company
C) Billing address verification
D) The purchaser's public key
Question
An attack has affected a commercial server providing customized Web content services to Michael's e-commerce site. The attack is most likely an example of:

A) Application Service Provider (ASP) infiltration.
B) registrar database tampering.
C) Secure Electronic Transactions (SET) corruption.
D) certificate authority (CA) infiltration.
Question
Many items can be included in the e-mail order confirmation sent to a customer after an order is completed. What should these items include at a minimum?

A) The customer name, the credit card number used and the total credit card charge
B) The date, an order summary and a shipping tracking number
C) Links to more products, product promotions and coupons for future purchases
D) A shipping address, an order summary and company contact information
Question
Increasing the ability of a Web server to support a greater workload by increasing the resources on the server (for example, memory, processor speed, number of processors) is known as:

A) sizing up.
B) scaling out.
C) clustering.
D) scaling up.
Question
A customer has placed an online order. The order has been written to a database for processing and the customer's credit card has been charged. What is the last interaction with the customer during the order process?

A) Update the customer profile.
B) Send a confirmation e-mail message to the customer.
C) Redirect the customer to the home page.
D) Send a shipping notification via e-mail to the customer.
Question
Which of the following segments first used blogs as an Internet marketing tool?

A) Mainstream advertisers
B) Large corporations
C) Small businesses
D) Government agencies
Question
Which of the following is a common cause of a buffer overflow?

A) Unnecessary services running in the buffer
B) Unchecked data entered into the buffer
C) Repeated attempts to guess a password stored in the buffer
D) Unexpected SQL statements causing database information to be revealed in the buffer
Question
The certificate authority (CA) cryptographically signs a certificate file with its private key. Anyone can verify the certificate signature with the public key. This is known as:

A) asymmetric-key encryption.
B) symmetric-key encryption.
C) binary-key encryption.
D) hash encryption.
Question
Which of the following is the most effective way to build community with your online storefront?

A) Accept several different payment options.
B) Provide a quantity discount.
C) Create an incentive-based program.
D) Generate an automatic order confirmation.
Question
Which of the following describes a referrer program?

A) One site pays another site for the traffic it sends; traffic is directed in one direction.
B) A third party verifies referrals from one site to another site as traffic flows from one to the other.
C) One site pays several sites for traffic it sends; traffic is generated in multiple directions.
D) Referrals occur only after a company pays a commission for them; traffic is directed in one direction.
Question
Which of the following segments first used blogs as an Internet marketing tool?

A) Large corporations
B) Small businesses
C) Government agencies
D) Mainstream advertisers
Question
User-tracking services can provide data about site visitors. Which of the following types of data are collected by tracking services?

A) Operating system, demographic information, domain
B) Operating system, browser type, third-party cookies
C) Operating system, browser type, domain
D) Operating system, third-party cookies, passwords
Question
Yvonne has received reports that the Web server she administers has been responding slowly to page requests, and often responds so slowly that requested pages are never received. After reviewing the server logs, Yvonne determines that the Web server has received more than 1 billion requests sent to a nonexistent port. The Web server is the target of:

A) denial-of-service attacks.
B) database tampering.
C) pharming attacks.
D) buffer overflow attacks.
Question
Which of the following statements about PayPal is accurate?

A) Your customers will be directed away from your site for payment processing.
B) PayPal does not offer currency conversion for international customers.
C) PayPal does not allow your customers to use major credit cards for purchases.
D) Payment processing uses weak encryption standards and is vulnerable to fraud.
Question
Winnie has collected the physical evidence of an attack on her company's Web site, including the Web server, hard disk drives, site traffic and firewall logs. Which less tangible evidence could be lost?

A) User authentication data
B) System data stored in RAM
C) IP address traceroute data
D) ISP router records
Question
What is the name for a tax on goods that are shipped internationally?

A) Sales tax
B) Value-added tax (VAT)
C) Tariff
D) Tax barrier
Question
Blogads are:

A) ads placed in a Web log.
B) ads viewed by younger, less affluent users.
C) a low-traffic segment of the Internet.
D) banner exchange programs.
Question
What are the basic steps for retrieving data for display?

A) Connect to a database server, pass the SQL command, retrieve the results.
B) Define the server name, name the database, authenticate the credentials.
C) Predefine SQL strings, authenticate, format for display.
D) Authenticate to a database server, format for display, retrieve the data results.
Question
Which of the following statements about banner exchange networks is accurate?

A) They are effective only in a B2B environment.
B) They are effective in both B2B and B2C environments.
C) They are effective only in a B2C environment.
D) They are most effective in non-profit environments.
Question
Which of the following is the most efficient strategy for detecting an attack on your company's e-commerce site?

A) Teaching employees about social engineering
B) Conducting an audit
C) Testing password strength
D) Reviewing system logs
Question
Which of the following can help customers complete purchases more quickly?

A) A well-planned site hierarchy
B) An RSS feed directing customers to a site blog
C) Product testimonials from other customers
D) Detailed descriptions of products
Question
A large company with an adequate staff and funding wants to implement an e-commerce storefront. Which of the following methods would be most suitable for this company?

A) In-house solution
B) Offline solution
C) Instant storefront
D) Online solution
Question
What is the name of the electronic funds transfer (EFT) system governed by the United States and designed to provide the clearing of electronic payments between banks?

A) The Automated Clearing House (ACH) network
B) The National Clearing House (NCH) network
C) The Originating Depository Financial Institution (ODFI)
D) The Receiving Depository Financial Institution (RDFI)
Question
You will be hiring someone to localize your e-commerce site in order to reach a specific audience. Which of the following is most essential for the person you hire to effectively complete the job?

A) The ability to communicate clearly with the team that created the site
B) An understanding of the scripting language and database type used on the site
C) An understanding of the importance of the just-in-time (JIT) process to the company
D) An understanding of the language and culture of the audience you want to reach
Question
You are planning to install a database server in a mission-critical environment. What is the best way to ensure continuous data availability and reliability?

A) Install a multiprocessor server.
B) Install multiple hot-swappable hard disk drives.
C) Provide fail-over clustering.
D) Establish a strict security policy.
Question
What is the result of an e-commerce HTTP server that processes the input queue at a rate equal to or greater than that of incoming requests?

A) Network bandwidth decreases.
B) The site visitor experiences a delay.
C) The server performs adequately.
D) A bottleneck occurs.
Question
Mortimer is creating an e-business site for an international supplier of exotic flower bulbs. Many customers are loyal purchase-club members. He has decided to use a virtual catalog in the construction of the site. Which of the following practices pertaining to implementing a virtual catalog should be avoided?

A) Making multiple base catalogs appear as a single catalog to customer
B) Adding new items to the virtual catalog to add duplicate database entries
C) Managing pricing in multiple currencies
D) Implementing special pricing rules for club members
Question
Which of the following is commonly used to authenticate a customer who has just used a credit card to buy a product?

A) The customer's card security code
B) Secure Sockets Layer (SSL)
C) A payment gateway for verifying the customer's address
D) The customer's signature
Question
Which of the following are common elements of an e-commerce transaction system?

A) Employee incentive plans and credit-card payment services
B) Credit card payments and online payment services
C) Order tracking and customer referrer programs
D) Automatic restocking of goods and currency conversion
Question
A customer living in Canada has purchased a product from a company in France. This product will be shipped to the customer. Which of the following might be levied on this transaction?

A) Sales tax
B) Tariff
C) Value-added tax (VAT)
D) Provincial tax
Question
A retail business that advertises and markets using traditional print materials has decided to expand its marketing reach and increase revenue by developing an online catalog. Which of the following is the primary objective?

A) Personalizing the site
B) Creating a visually attractive catalog
C) Converting the existing print catalog into HTML
D) Creating an effective selling tool
Question
What is the most accurate way to determine the number of visits to a Web site?

A) Use automatic e-mail notification.
B) Install a hit counter.
C) Use a tracking service.
D) Measure server bandwidth used.
Question
Which of the following security threats is reduced by a strong password policy?

A) Buffer overflow attacks
B) Denial-of-service attacks
C) Database tampering
D) Pharming attacks
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/86
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 2: CIW E-Commerce Designer
1
What step would be appropriate before launching an e-commerce site with a newly installed payment gateway?

A) Contact the issuing bank to verify connections.
B) Contact the acquiring bank to verify connections.
C) Register the gateway with accepted credit card issuers.
D) Test the system using various payment methods.
D
2
Which of the following is true of high-level offline storefronts?

A) They use only proprietary encryption and data-formatting standards.
B) They are not designed to support business-to-business (B2B) needs.
C) They require the site to be taken offline whenever a change is made.
D) They require the greatest amount of expertise to use properly.
D
3
According to the X.509 (ITU) standard, which of the following is a non-standard certificate field that can contain additional information such as date of birth?

A) Fingerprint
B) Subject (User) Name
C) Subject Public-Key Information
D) Extensions (v3)
D
4
You want to configure a second Web site on a server. Which of the following most efficiently ensures that requests are properly processed by this second Web server for customers around the world?

A) Secure Sockets Layer (SSL)
B) The server's hosts file
C) The hosts file on user systems
D) A host header value
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
5
Nain is a front-desk receptionist at a large corporation. After a recent payday for the employees, Nain received a phone call from someone claiming to be an employee who was out-of-state on an assignment. This person asked Nain whether his check had been deposited, and to verify that the check was written to a specific account name and bank routing number. This occurrence may be a type of attack known as a:

A) denial-of-service attack.
B) social-engineering attack.
C) pharming attack.
D) phishing attack.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
6
You are logged on to a Linux system. You suspect a problem with the system's MySQL database server. Which of the following files will contain relevant information pertaining to the failure?

A) ~root/.error
B) /var/run/lock/mysql
C) ~root/.database_error
D) /var/log/messages
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
7
Which organization is responsible for regulating the process of importing and exporting goods?

A) Port Authority
B) Exchange
C) World Bank
D) Customs
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is submitted to identify each person who handles evidence after a site infiltration?

A) Authentication record
B) Proof of delivery
C) Chain of custody
D) Server status report
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
9
The daily number of visitors to Cathy's site has increased by 600 percent and the current server configuration is beginning to drop requests. Cathy has decided to scale out the Web site by adding servers that will function as a server farm to host the company site. Adding servers in this way is known as:

A) fail-over.
B) clustering.
C) cloning.
D) scaling up.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
10
The details of an e-commerce site order can be kept in memory, stored on the visitor's computer or stored on the Web server. This ability to remember the details of an order is known as:

A) filling the shopping cart.
B) persisting an order.
C) tracking an order.
D) profiling an order.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is most essential when setting a marketing goal for an e-commerce site?

A) The site must support efforts to improve customer service.
B) The site must conform to the latest technical standards.
C) The site must complement the company's direction.
D) The site must conform to the latest accessibility standards.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
12
You are transitioning from a traditional "brick-and-mortar storefront that accepts credit cards to a new e-commerce storefront. Which payment method would be most appropriate during the transition?

A) Open Buying on the Internet (OBI)
B) Advance payment using check or money order
C) Cash on delivery (c.o.d.)
D) Credit card with offline processing
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
13
Tom has encountered a problem with the Apache server installation on his company's server. Because he does not have an immediate solution to the problem, he should contact:

A) the Apache user online forum.
B) the Apache Help desk.
C) the Apache service staff.
D) the Apache live Help service.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
14
What is the first step in improving your Web server's performance?

A) Determine the efficiency of the CGI applications.
B) Upgrade the server's RAM.
C) Upgrade the server's CPU.
D) Monitor performance and create a baseline.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
15
An e-commerce site administrator believes that her site's security has been compromised. The most important participants of her recovery plan are the Web team, law enforcement and the:

A) marketing department.
B) certificate authority (CA).
C) Internet Service Provider (ISP).
D) server software publisher.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
16
Carly has requested a digital certificate for her Web site. Instructions for downloading and installing the new certificate will be:

A) sent to Carly's e-mail address.
B) sent to Carly by postal service.
C) provided only on Carly's request.
D) remotely installed on Carly's Web server.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
17
Before you can conduct usability testing, you should:

A) publish your site to a production server.
B) identify your potential customers.
C) identify browser compatibility issues.
D) identify the most-traveled path of your site.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
18
What is the term for using a single secret key to both encrypt and decrypt your data?

A) Asymmetric-key encryption
B) Hash encryption
C) Symmetric-key encryption
D) Binary-key encryption
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
19
Tom has encountered a problem with the Apache server installation on his company's server. Because he does not have an immediate solution to the problem, he should contact:

A) the Apache live Help service.
B) the Apache user online forum.
C) the Apache service staff.
D) the Apache Help desk.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
20
You are considering payment methods for a business-to-business (B2B) e-commerce site. Which payment method would be most appropriate for your needs?

A) Cash on delivery (c.o.d.)
B) Purchase order and post-purchase billing
C) Advance payment using check or money order
D) Purchase request and pre-purchase billing
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
21
An online instant storefront can build community by:

A) granting quantity discounts.
B) creating an e-mail newsletter.
C) using banner exchange programs.
D) providing a public listing of customer e-mail addresses.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
22
Alcazar wants to host three Web sites on the same computer, and to use SSL for transactions on each site. Which of the following methods for hosting multiple Web sites would be most suitable?

A) Use server virtualization software to run multiple operating systems.
B) Use three separate ports.
C) Use three separate host header names.
D) Bind three IP addresses to the server.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
23
You have posted your e-commerce site on a staging server. Which of the following most effectively ensures that your site will provide a satisfying experience for users?

A) Implementing Web site stress-testing software
B) Engaging in role playing in order to test the site
C) Using design techniques to ensure symmetrical balance
D) Using design techniques to ensure asymmetrical balance
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
24
What is the result of an e-commerce HTTP server that processes the input queue at a rate equal to or greater than that of incoming requests?

A) A bottleneck occurs.
B) Network bandwidth decreases.
C) The server performs adequately.
D) The site visitor experiences a delay.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following is a primary concern when configuring a shopping-cart system?

A) Compatibility with ODBC and ASP
B) Payment gateway support of SSL/TLS
C) The initial connection cost
D) Compatibility with the payment gateway
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
26
Placing an institutional banner ad on a site that targets a specific market can result in:

A) a higher clickthrough rate.
B) increased banner exchange.
C) better banner ad positioning on the site.
D) higher search-engine ranking.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following steps are necessary for installing a payment gateway?

A) Determine payment methods and configure the gateway to work with the e-commerce solution.
B) Contact credit card organizations and link the gateway to the customer database.
C) Choose an e-commerce solution and establish shipping and taxation options.
D) Set up an Automated Clearing House account and obtain a shopping-cart system.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
28
Jennifer placed a special product advertisement on the home page of her e-commerce site. After one week, she reviewed her server logs to see how many visitors clicked the ad, completed the registration page and then entered credit card information to purchase the product. Jennifer's site path analysis is a review of:

A) live usability testing and role playing.
B) controlled-navigation click patterns.
C) customer satisfaction surveys.
D) good e-commerce advertising.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
29
Maggie is developing a site that allows purchases to be made online. What technology should she use to enable security measures on this site?

A) SSL
B) S-HTTP
C) HTTP
D) SET
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
30
The goals for effective usability in an e-commerce site are to get customers to:

A) visit, learn and return.
B) find, learn and review.
C) find, compare and revisit.
D) visit, learn and purchase.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following is a disadvantage of an online storefront?

A) Specialized hardware requirements
B) High software costs
C) Difficulty of administration
D) Lack of control over security
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
32
You are planning to install a database server in a mission-critical environment. What is the best way to ensure continuous data availability and reliability?

A) Provide fail-over clustering.
B) Install a multiprocessor server.
C) Establish a strict security policy.
D) Install multiple hot-swappable hard disk drives.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following describes a targeted marketing program?

A) A program that targets a specific group of interested people
B) A program that selects the largest array of products and markets them to those most likely to purchase products online
C) A program that selects the smallest array of products and markets them to those most likely to purchase products online
D) A program that targets the broadest group of people in the most countries around the world
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following demonstrates the importance of manual transaction processing?

A) It enables vendors to receive multiple orders of different items.
B) It enables vendors to complete a customer return request by telephone.
C) It enables customers to send an item to an alternative address.
D) It enables customers to use a dial-up connection to perform a transaction.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following requires you to provide redundant Internet connections to ensure site availability?

A) Instant storefront
B) Mid-level offline storefront
C) In-house storefront
D) High-level offline storefront
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
36
You have just obtained a signed digital certificate from a certificate authority. What is the next step you should take?

A) Install the certificate.
B) Sign the certificate.
C) Export the certificate.
D) Publish the certificate.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
37
What aspect of e-commerce marketing most significantly differentiates the use of a niche marketing strategy from that of a global marketing strategy?

A) Common customer interests
B) Advertising media choices
C) Products and/or services offered
D) Geographic distribution of the customers
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
38
What security protocol typically allows Web-based applications to pass data securely by providing an encrypted channel?

A) SSH
B) SSL
C) SET
D) HTTP
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following is the most effective strategy for conducting an opt-in e-mail marketing campaign?

A) Create an executable ActiveX application as an e-mail attachment that describes the company.
B) Send e-mail messages once a day to initial contacts for the first two weeks.
C) Create an executable Java application as an e-mail attachment that describes the company.
D) Send e-mail messages once every two weeks to follow up on an initial contact.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following describes a Sharable Content Object Reference Model (SCORM) manifest?

A) An XML document that describes a Sharable Content Object (SCO)
B) A style sheet that gives structure to the page containing a Sharable Content Object (SCO)
C) An XHTML document that is SCORM-conformant
D) A relational database that contains Sharable Content Object (SCO) information
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
41
Which of the following best describes an e-commerce transaction system?

A) It operates like an atomic reaction: One event sets off a series of events that quickly result in an explosion of activity.
B) It operates like the open-source community: Individuals will not use propriety solutions.
C) It operates like a chain: One broken link causes problems for the entire system.
D) It operates like a retail sales transaction: Personal interaction influences buying decisions.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
42
Denying that a payment transaction took place is known as:

A) nonrepudiation.
B) negative authentication.
C) poor data integrity.
D) repudiation.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
43
You are reviewing the requirements for an order entry system. The system will need to work with your accounting system and your customer database. Which of the following is the most important consideration?

A) Secure transaction processing
B) Ease of use
C) Backup ability
D) Database compatibility
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
44
The goals for effective usability in an e-commerce site are to get customers to:

A) visit, learn and return.
B) visit, learn and purchase.
C) find, learn and review.
D) find, compare and revisit.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
45
Mason runs an e-commerce site selling products from his business in Texas, which has a local sales tax of 7.5 percent. What would the tax rate be for a customer in Egypt?

A) 7 percent
B) 0 percent
C) 6.5 percent
D) 7.5 percent
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
46
Customers use your company's software to receive real-time weather reports. One of the company's software developers has proposed creating a second application that installs at the same time as the weather software, but operates in the background and reports user preferences and other information to your company. What is the name for this type of application?

A) Spyware
B) Freeware
C) Daemon
D) Value-add
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
47
Under Secure Electronic Transactions (SET), which three parties involved in a transaction are required to use the SET protocol?

A) The broker, the merchant, the customer
B) The customer, the credit card company, the bank
C) The merchant, the bank, the customer
D) The wholesaler, the merchant, the bank
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
48
Which of the following is often used in place of photo identification and a signature whenever a credit card is used in an e-commerce transaction?

A) Cookies deposited by the site's shopping cart
B) Information verified by a Public Key Infrastructure (PKI) company
C) Billing address verification
D) The purchaser's public key
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
49
An attack has affected a commercial server providing customized Web content services to Michael's e-commerce site. The attack is most likely an example of:

A) Application Service Provider (ASP) infiltration.
B) registrar database tampering.
C) Secure Electronic Transactions (SET) corruption.
D) certificate authority (CA) infiltration.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
50
Many items can be included in the e-mail order confirmation sent to a customer after an order is completed. What should these items include at a minimum?

A) The customer name, the credit card number used and the total credit card charge
B) The date, an order summary and a shipping tracking number
C) Links to more products, product promotions and coupons for future purchases
D) A shipping address, an order summary and company contact information
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
51
Increasing the ability of a Web server to support a greater workload by increasing the resources on the server (for example, memory, processor speed, number of processors) is known as:

A) sizing up.
B) scaling out.
C) clustering.
D) scaling up.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
52
A customer has placed an online order. The order has been written to a database for processing and the customer's credit card has been charged. What is the last interaction with the customer during the order process?

A) Update the customer profile.
B) Send a confirmation e-mail message to the customer.
C) Redirect the customer to the home page.
D) Send a shipping notification via e-mail to the customer.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
53
Which of the following segments first used blogs as an Internet marketing tool?

A) Mainstream advertisers
B) Large corporations
C) Small businesses
D) Government agencies
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
54
Which of the following is a common cause of a buffer overflow?

A) Unnecessary services running in the buffer
B) Unchecked data entered into the buffer
C) Repeated attempts to guess a password stored in the buffer
D) Unexpected SQL statements causing database information to be revealed in the buffer
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
55
The certificate authority (CA) cryptographically signs a certificate file with its private key. Anyone can verify the certificate signature with the public key. This is known as:

A) asymmetric-key encryption.
B) symmetric-key encryption.
C) binary-key encryption.
D) hash encryption.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
56
Which of the following is the most effective way to build community with your online storefront?

A) Accept several different payment options.
B) Provide a quantity discount.
C) Create an incentive-based program.
D) Generate an automatic order confirmation.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
57
Which of the following describes a referrer program?

A) One site pays another site for the traffic it sends; traffic is directed in one direction.
B) A third party verifies referrals from one site to another site as traffic flows from one to the other.
C) One site pays several sites for traffic it sends; traffic is generated in multiple directions.
D) Referrals occur only after a company pays a commission for them; traffic is directed in one direction.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
58
Which of the following segments first used blogs as an Internet marketing tool?

A) Large corporations
B) Small businesses
C) Government agencies
D) Mainstream advertisers
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
59
User-tracking services can provide data about site visitors. Which of the following types of data are collected by tracking services?

A) Operating system, demographic information, domain
B) Operating system, browser type, third-party cookies
C) Operating system, browser type, domain
D) Operating system, third-party cookies, passwords
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
60
Yvonne has received reports that the Web server she administers has been responding slowly to page requests, and often responds so slowly that requested pages are never received. After reviewing the server logs, Yvonne determines that the Web server has received more than 1 billion requests sent to a nonexistent port. The Web server is the target of:

A) denial-of-service attacks.
B) database tampering.
C) pharming attacks.
D) buffer overflow attacks.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
61
Which of the following statements about PayPal is accurate?

A) Your customers will be directed away from your site for payment processing.
B) PayPal does not offer currency conversion for international customers.
C) PayPal does not allow your customers to use major credit cards for purchases.
D) Payment processing uses weak encryption standards and is vulnerable to fraud.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
62
Winnie has collected the physical evidence of an attack on her company's Web site, including the Web server, hard disk drives, site traffic and firewall logs. Which less tangible evidence could be lost?

A) User authentication data
B) System data stored in RAM
C) IP address traceroute data
D) ISP router records
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
63
What is the name for a tax on goods that are shipped internationally?

A) Sales tax
B) Value-added tax (VAT)
C) Tariff
D) Tax barrier
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
64
Blogads are:

A) ads placed in a Web log.
B) ads viewed by younger, less affluent users.
C) a low-traffic segment of the Internet.
D) banner exchange programs.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
65
What are the basic steps for retrieving data for display?

A) Connect to a database server, pass the SQL command, retrieve the results.
B) Define the server name, name the database, authenticate the credentials.
C) Predefine SQL strings, authenticate, format for display.
D) Authenticate to a database server, format for display, retrieve the data results.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
66
Which of the following statements about banner exchange networks is accurate?

A) They are effective only in a B2B environment.
B) They are effective in both B2B and B2C environments.
C) They are effective only in a B2C environment.
D) They are most effective in non-profit environments.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
67
Which of the following is the most efficient strategy for detecting an attack on your company's e-commerce site?

A) Teaching employees about social engineering
B) Conducting an audit
C) Testing password strength
D) Reviewing system logs
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
68
Which of the following can help customers complete purchases more quickly?

A) A well-planned site hierarchy
B) An RSS feed directing customers to a site blog
C) Product testimonials from other customers
D) Detailed descriptions of products
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
69
A large company with an adequate staff and funding wants to implement an e-commerce storefront. Which of the following methods would be most suitable for this company?

A) In-house solution
B) Offline solution
C) Instant storefront
D) Online solution
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
70
What is the name of the electronic funds transfer (EFT) system governed by the United States and designed to provide the clearing of electronic payments between banks?

A) The Automated Clearing House (ACH) network
B) The National Clearing House (NCH) network
C) The Originating Depository Financial Institution (ODFI)
D) The Receiving Depository Financial Institution (RDFI)
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
71
You will be hiring someone to localize your e-commerce site in order to reach a specific audience. Which of the following is most essential for the person you hire to effectively complete the job?

A) The ability to communicate clearly with the team that created the site
B) An understanding of the scripting language and database type used on the site
C) An understanding of the importance of the just-in-time (JIT) process to the company
D) An understanding of the language and culture of the audience you want to reach
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
72
You are planning to install a database server in a mission-critical environment. What is the best way to ensure continuous data availability and reliability?

A) Install a multiprocessor server.
B) Install multiple hot-swappable hard disk drives.
C) Provide fail-over clustering.
D) Establish a strict security policy.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
73
What is the result of an e-commerce HTTP server that processes the input queue at a rate equal to or greater than that of incoming requests?

A) Network bandwidth decreases.
B) The site visitor experiences a delay.
C) The server performs adequately.
D) A bottleneck occurs.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
74
Mortimer is creating an e-business site for an international supplier of exotic flower bulbs. Many customers are loyal purchase-club members. He has decided to use a virtual catalog in the construction of the site. Which of the following practices pertaining to implementing a virtual catalog should be avoided?

A) Making multiple base catalogs appear as a single catalog to customer
B) Adding new items to the virtual catalog to add duplicate database entries
C) Managing pricing in multiple currencies
D) Implementing special pricing rules for club members
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
75
Which of the following is commonly used to authenticate a customer who has just used a credit card to buy a product?

A) The customer's card security code
B) Secure Sockets Layer (SSL)
C) A payment gateway for verifying the customer's address
D) The customer's signature
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
76
Which of the following are common elements of an e-commerce transaction system?

A) Employee incentive plans and credit-card payment services
B) Credit card payments and online payment services
C) Order tracking and customer referrer programs
D) Automatic restocking of goods and currency conversion
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
77
A customer living in Canada has purchased a product from a company in France. This product will be shipped to the customer. Which of the following might be levied on this transaction?

A) Sales tax
B) Tariff
C) Value-added tax (VAT)
D) Provincial tax
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
78
A retail business that advertises and markets using traditional print materials has decided to expand its marketing reach and increase revenue by developing an online catalog. Which of the following is the primary objective?

A) Personalizing the site
B) Creating a visually attractive catalog
C) Converting the existing print catalog into HTML
D) Creating an effective selling tool
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
79
What is the most accurate way to determine the number of visits to a Web site?

A) Use automatic e-mail notification.
B) Install a hit counter.
C) Use a tracking service.
D) Measure server bandwidth used.
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
80
Which of the following security threats is reduced by a strong password policy?

A) Buffer overflow attacks
B) Denial-of-service attacks
C) Database tampering
D) Pharming attacks
Unlock Deck
Unlock for access to all 86 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 86 flashcards in this deck.