Question 1 the six key dimensions to e-commerce security


Question 1. The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and:

A. confidentiality.

B. usability.

C. functionality.

D. viability.

Question 2. Which of the following is an example of an integrity violation of e-commerce security?

A. A website is not actually operated by the entity the customer believes it to be.

B. A merchant uses customer information in a manner not intended by the customer.

C. A customer denies that he or she is the person who placed the order.

D. An unauthorized person intercepts an online communication and changes its contents.

Question 3. Which of the following is NOT a key point of vulnerability when dealing with e-commerce?

A. The client computer

B. The server

C. The communications pipeline

D. The credit card companies

Question 4. Malware that comes with a downloaded file that a user requests is called a:

A. Trojan horse.

B. backdoor.

C. drive-by download.

D. PUP.

Question 5. Which of the following is a prominent hacktivist group?

A. Anonymous

B. Anti-Phishing Working Group

C. IC3

D. Symantec

Question 6. Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other?  

A. DES

B. IM

C. NFC

D. Text messaging

Question 7. According to the Computer Security Institute's 2011 Computer Crime and Security Survey, which of the following was the most commonly reported type of attack?

A. Malware infection

B. Laptop theft

C. Website defacement

D. Insider abuse

Question 8. All of the following are methods of securing channels of communication EXCEPT:

A. SSL/TLS.

B. certificates.

C. VPN.

D. FTP.

Question 9. __________ refers to the ability to ensure that an e-commerce site continues to function as intended.  

A. Nonrepudiation

B. Authenticity

C. Availability

D. Integrity

Question 10. The Data Encryption Standard uses a __________ bit key.

A. 512

B. 256

C. 56

D. 12

Question 11. __________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.

A. Nonrepudiation

B. Authenticity

C. Availability

D. Integrity

Question 12. Online bill payment now accounts for __________ of all bill payments.

A. 10%

B. 25%

C. 50%

D. 100%

Question 13. Symmetric key encryption is also known as:

A. public key encryption.

B. secret key encryption.

C. PGP.

D. PKI.

Question 14. Rustock is an example of which of the following?

A. Worm

B. Botnet

C. Phishing

D. Hacktivism

Question 15. A digital certificate contains all of the following EXCEPT the:  

A. subject's private key.

B. subject's public key.

C. digital signature of the certification authority.

D. digital certificate serial number.

Question 16. Which of the following statements about public key encryption is NOT true?

A. Public key encryption uses two mathematically related digital keys.

B. Public key encryption ensures authentication of the sender.

C. Public key encryption does not ensure message integrity.

D. Public key encryption is based on the idea of irreversible mathematical functions.

Question 17. __________ refers to the ability to ensure that messages and data are only available to those authorized to view them.

A. Confidentiality

B. Integrity

C. Privacy

D. Availability

Question 18. What is the most frequent cause of stolen credit cards and card information today?

A. Lost cards

B. The hacking and looting of corporate servers storing credit card information

C. Sniffing programs

D. Phishing attacks

Question 19. In the United States, the primary form of online payment is:

A. PayPal.

B. credit cards.

C. debit cards.

D. Google Wallet.

Question 20. All of the following are limitations of the existing online credit card payment system EXCEPT:

A. poor security.

B. cost to consumers.

C. cost to merchant.

D. social equity.

Part 2 of 2 -

Question 21. All of the following are traditional online marketing and advertising tools EXCEPT:

A. affiliate marketing.

B. permission marketing.

C. social marketing.

D. sponsorship marketing.

Question 22. Which of the following forms of online advertising typically has the highest click-through rate?

A. E-mail marketing in-house list

B. Interstitials

C. Search engine keyword purchase

D. Sponsorships

Question 23. Which of the following is NOT one of the four main methods advertisers use to behaviorally target ads?

A. Nielsen ratings

B. Data collected from social networks

C. Integration of offline data

D. Clickstream data

Question 24. Recency refers to the:

A. percentage of customers who do not return during the next year after an initial purchase.

B. time elapsed since the last action taken by a customer.

C. percentage of existing customers who continue to buy on a regular basis.

D. percentage of customers who return to the site within a year to make additional purchases.

Question 25. CTR is a measure of the:  

A. percentage of times an ad is clicked.

B. number of times an ad is served.

C. number of http requests.

D. number of pages viewed.

Question 26. Which of the following examples illustrates the "Long Tail" phenomenon?

A. Rhapsody music streaming service reported that its no play rate had increased to over 20 percent.

B. The number of blockbuster "winner take all" video titles is declining.

C. Amazon sells a larger number of obscure books than hit books.

D. The average blog has a readership of slightly more than 1.

Question 27. Which of the following measures the ratio of actual orders to checkouts started?  

A. Checkout conversion rate

B. Conversion rate

C. Acquisition rate

D. Cart conversion rate

Question 28. Which of the following forms of online advertising is growing the fastest?

A. Paid search

B. Sponsorships

C. Video

D. Rich media

Question 29. Purchasing an online ad on a CPA basis means that the advertiser:

A. pays for impressions in 1,000 unit lots.

B. pays a prenegotiated fee for each click an ad receives.

C. pays only for those users who perform a specific action, such as registering, purchasing, etc.

D. exchanges something of equal value for the ad space.

Question 30. Promoted Trends is an example of which of the following types of online advertising?

A. Blog advertising

B. Interest-based advertising

C. Game advertising

D. Social network advertising

Question 31. Acquisition rate is a measure of the:

A. percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.

B. percentage of visitors who become customers.

C. percentage of existing customers who continue to buy on a regular basis.

D. percentage of shoppers who do not return within a year after their initial purchase.

Question 32. Which of the following is NOT a feature that is driving social E-commerce growth?

A. Social sign-on

B. Network notification

C. Collaborative shopping

D. Personal intelligent agents

Question 33. Purchasing an online ad on a CPC basis means that the advertiser:

A. pays for impressions in 1,000 unit lots.

B. pays a prenegotiated fee for each click an ad receives.

C. pays only for those users who perform a specific action, such as registering, purchasing, etc.

D. exchanges something of equal value for the ad space.

Question 34. Which of the following is the top concern of Internet users about purchasing online?

A. Inability to see and touch before buying

B. Difficulty of returning products

C. Shipping costs

D. Inability to speak to sales assistant in person

Question 35. View-through rate measures the __________ response rate to an ad.

A. 30-minute

B. 24-hour

C. 7-day

D. 30-day

Question 36. Which of the following is NOT a practice that degrades the results and usefulness of search engines?

A. Content farms

B. Link farms

C. Social search

D. Click fraud

Question 37. The marketing technique known as __________ involves merchants offering products or services for a very low price for a short period of time.

A. search engine marketing

B. flash marketing

C. yield management

D. bait-and-switch

Question 38. Which of the following measures the average length of stay at a website?

A. Loyalty

B. Stickiness

C. Recency

D. Retention rate

Question 39. In __________ advertising, companies pay for ads to be placed dynamically on any participating website that the search engine determines is appropriate.

A. paid inclusion

B. network keyword

C. keyword

D. social

Question 40. Which of the following statements about CAN-SPAM is NOT true?

A. CAN-SPAM went into effect in January 2004.

B. CAN-SPAM prohibits unsolicited e-mail (spam).

C. CAN-SPAM prohibits the use of deceptive subject lines and false headers.

D. Large spammers are among CAN-SPAM's biggest supporters.

Solution Preview :

Prepared by a verified Expert
Business Management: Question 1 the six key dimensions to e-commerce security
Reference No:- TGS01414771

Now Priced at $50 (50% Discount)

Recommended (99%)

Rated (4.3/5)