Which of the constitutes the inner-most layer


Assignment:

1. E-commerce merchant server software includes all of the following except_______.

A. online e-mail.

B. online catalog.

C. online shopping cart.

D. online credit card processing.

2. Which of the following is not a widely used midrange or high-end e-commerce suite?

A. Microsoft Commerce Server.

B. WebTrends Marketing Lab2.

C. IBM WebSphere Commerce.

D. Broadvision Commerce.

3. The ability to change the product to better fit the needs of the customer is called ________.

A. customization.

B. personalization.

C. privacy.

D. accessibility.

4. All of the following are tools for optimizing a Web site's location in search engine listings except ______.

A. keywords and page titles.

B. identifying market niches.

C. buying ads.

D. benchmarking.

5. The most common type of Internet crime according to the IC3 is ______.

A. Credit card fraud.

B. Check fraud.

C. Non-delivery.

D. Auction fraud.

6. In the e-commerce security environment, which of the following constitutes the inner-most layer?

A. people.

B. data.

C. technology solutions.

D. organizational policies and procedures.

7. All of the following are major categories of computer viruses except _____.

A. Macro viruses.

B. File-infecting viruses.

C. Script viruses.

D. Trojan viruses.

8. A worm is designed to spread _________.

A. from computer to computer.

B. from file to file on a computer.

C. from Web site to Web site.

D. from Web site to computer

9. Malicious hackers who act with the intention of causing harm are __________.

A. White hats.

B. Black hats.

C. Grey hats.

D. Brown hats.

10. When hackers flood a Web site with useless traffic to overwhelm the network, it is called ______.

A. phishing.

B. pharming.

C. a Denial of Service (DoS) attack.

D. spoofing.

11. Which of the following is not a dimension of e-commerce security provided by encryption?

A. availability.

B. message integrity.

C. nonrepudiation.

D. confidentiality.

12. The most widely used encryption standard is ______.

A. Advanced Encryption Standard (AES).

B. Data Encryption Standard (DES).

C. Universal Encryption Standard (UES).

D. Optimal Encryption Standard (OES).

13. The most common form of securing channels is through ______.

A. S-HTTP.

B. VPNs.

C. SSL.

D. PPTP.

14. Firewalls perform all of the following functions except ______.

A. Forbids communications from untrustworthy sources.

B. Allows communications from trustworthy sources.

C. Eliminates viruses and other malicious attacks.

D. Filters traffic based on packet attributes.

15. A security plan begins with a(n) is ______.

A. security policy.

B. risk assessment.

C. implementation plan.

D. security organization.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: Which of the constitutes the inner-most layer
Reference No:- TGS03033142

Now Priced at $20 (50% Discount)

Recommended (90%)

Rated (4.3/5)