Six key dimensions to e-commerce security

Assignment Help Business Management
Reference no: EM131068548

Question 1: The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and:

A. confidentiality.

B. usability.

C. functionality.

D. viability.

Question 2: Which of the following is an example of an integrity violation of e-commerce security?

A. A website is not actually operated by the entity the customer believes it to be.

B. A merchant uses customer information in a manner not intended by the customer.

C. A customer denies that he or she is the person who placed the order.

D. An unauthorized person intercepts an online communication and changes its contents.

Question 3: Which of the following is NOT a key point of vulnerability when dealing with e-commerce?

A. The client computer

B. The server

C. The communications pipeline

D. The credit card companies

Question 4: Malware that comes with a downloaded file that a user requests is called a:

A. Trojan horse.

B. backdoor.

C. drive-by download.

D. PUP.

Question 5: Which of the following is a prominent hacktivist group?

A. Anonymous

B. Anti-Phishing Working Group

C. IC3

D. Symantec

Question 6: Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other?  

A. DES

B. IM

C. NFC

D. Text messaging

Question 7: According to the Computer Security Institute's 2011 Computer Crime and Security Survey, which of the following was the most commonly reported type of attack?

A. Malware infection

B. Laptop theft

C. Website defacement

D. Insider abuse

Question 8:All of the following are methods of securing channels of communication EXCEPT:

A. SSL/TLS.

B. certificates.

C. VPN.

D. FTP.

Question 9: __________ refers to the ability to ensure that an e-commerce site continues to function as intended.  

A. Nonrepudiation

B. Authenticity

C. Availability

D. Integrity

Question 10: The Data Encryption Standard uses a __________ bit key.

A. 512

B. 256

C. 56

D. 12

Question 11: __________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.

A. Nonrepudiation

B. Authenticity

C. Availability

D. Integrity

Question 12: Online bill payment now accounts for __________ of all bill payments.

A. 10%

B. 25%

C. 50%

D. 100%

Question 13: Symmetric key encryption is also known as:

A. public key encryption.

B. secret key encryption.

C. PGP.

D. PKI.

Question 14: Rustock is an example of which of the following?

A. Worm

B. Botnet

C. Phishing

D. Hacktivism

Question 15: A digital certificate contains all of the following EXCEPT the:  

A. subject's private key.

B. subject's public key.

C. digital signature of the certification authority.

D. digital certificate serial number.

Question 16: Which of the following statements about public key encryption is NOT true?

A. Public key encryption uses two mathematically related digital keys.

B. Public key encryption ensures authentication of the sender.

C. Public key encryption does not ensure message integrity.

D. Public key encryption is based on the idea of irreversible mathematical functions.

Question 17: __________ refers to the ability to ensure that messages and data are only available to those authorized to view them.

A. Confidentiality

B. Integrity

C. Privacy

D. Availability

Question 18: What is the most frequent cause of stolen credit cards and card information today?

A. Lost cards

B. The hacking and looting of corporate servers storing credit card information

C. Sniffing programs

D. Phishing attacks

Question 19: In the United States, the primary form of online payment is:

A. PayPal.

B. credit cards.

C. debit cards.

D. Google Wallet.

Question 20: All of the following are limitations of the existing online credit card payment system EXCEPT:

A. poor security.

B. cost to consumers.

C. cost to merchant.

D. social equity.

Question 21: All of the following are traditional online marketing and advertising tools EXCEPT:

A. affiliate marketing.

B. permission marketing.

C. social marketing.

D. sponsorship marketing.

Question 22: Which of the following forms of online advertising typically has the highest click-through rate?

A. E-mail marketing in-house list

B. Interstitials

C. Search engine keyword purchase

D. Sponsorships

Question 23: Which of the following is NOT one of the four main methods advertisers use to behaviorally target ads?

A. Nielsen ratings

B. Data collected from social networks

C. Integration of offline data

D. Clickstream data

Question 24: Recency refers to the:

A. percentage of customers who do not return during the next year after an initial purchase.

B. time elapsed since the last action taken by a customer.

C. percentage of existing customers who continue to buy on a regular basis.

D. percentage of customers who return to the site within a year to make additional purchases.

Question 25: CTR is a measure of the:  

A. percentage of times an ad is clicked.

B. number of times an ad is served.

C. number of http requests.

D. number of pages viewed.

Question 26: Which of the following examples illustrates the "Long Tail" phenomenon?

A. Rhapsody music streaming service reported that its no play rate had increased to over 20 percent.

B. The number of blockbuster "winner take all" video titles is declining.

C. Amazon sells a larger number of obscure books than hit books.

D. The average blog has a readership of slightly more than 1.

Question 27: Which of the following measures the ratio of actual orders to checkouts started?  

A. Checkout conversion rate

B. Conversion rate

C. Acquisition rate

D. Cart conversion rate

Question 28: Which of the following forms of online advertising is growing the fastest?

A. Paid search

B. Sponsorships

C. Video

D. Rich media

Question 29: Purchasing an online ad on a CPA basis means that the advertiser:

A. pays for impressions in 1,000 unit lots.

B. pays a prenegotiated fee for each click an ad receives.

C. pays only for those users who perform a specific action, such as registering, purchasing, etc.

D. exchanges something of equal value for the ad space.

Question 30: Promoted Trends is an example of which of the following types of online advertising?

A. Blog advertising

B. Interest-based advertising

C. Game advertising

D. Social network advertising

Question 31: Acquisition rate is a measure of the:

A. percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.

B. percentage of visitors who become customers.

C. percentage of existing customers who continue to buy on a regular basis.

D. percentage of shoppers who do not return within a year after their initial purchase.

Question 32: Which of the following is NOT a feature that is driving social E-commerce growth?

A. Social sign-on

B. Network notification

C. Collaborative shopping

D. Personal intelligent agents

Question 33: Purchasing an online ad on a CPC basis means that the advertiser:

A. pays for impressions in 1,000 unit lots.

B. pays a prenegotiated fee for each click an ad receives.

C. pays only for those users who perform a specific action, such as registering, purchasing, etc.

D. exchanges something of equal value for the ad space.

Question 34: Which of the following is the top concern of Internet users about purchasing online?

A. Inability to see and touch before buying

B. Difficulty of returning products

C. Shipping costs

D. Inability to speak to sales assistant in person

Question 35: View-through rate measures the __________ response rate to an ad.

A. 30-minute

B. 24-hour

C. 7-day

D. 30-day

Question 36: Which of the following is NOT a practice that degrades the results and usefulness of search engines?

A. Content farms

B. Link farms

C. Social search

D. Click fraud

Question 37: The marketing technique known as __________ involves merchants offering products or services for a very low price for a short period of time.

A. search engine marketing

B. flash marketing

C. yield management

D. bait-and-switch

Question 38: Which of the following measures the average length of stay at a website?

A. Loyalty

B. Stickiness

C. Recency

D. Retention rate

Question 39: In __________ advertising, companies pay for ads to be placed dynamically on any participating website that the search engine determines is appropriate.

A. paid inclusion

B. network keyword

C. keyword

D. social

Question 40: Which of the following statements about CAN-SPAM is NOT true?

A. CAN-SPAM went into effect in January 2004.

B. CAN-SPAM prohibits unsolicited e-mail (spam).

C. CAN-SPAM prohibits the use of deceptive subject lines and false headers.

D. Large spammers are among CAN-SPAM's biggest supporters.

Reference no: EM131068548

Questions Cloud

Heating on the consumption of heating : Analyse the effects of an increase in the cost of heating on the consumption of heating and the well-being of that individual before and after the implementation of government policy;
Par value of holdings : If the duration of 5-year maturity bonds with coupon rates of 12% (paid annually) is 4 years and the duration of 20-year maturity bonds with coupon rates of 6% (paid annually) is 11 years, how much of each of these coupon bonds (in market value) w..
What is the most salient experience in my life directly : With regard to varying abilities, what is one of my cognitive, physical, and/or emotional strengths and one of my limitations---and in what ways do they influence my life?
Fundamentals of corporate finance-nominal vs real cash flows : You are graduating in two years. You want to invest your current savings of $5,000 in bonds and use the proceeds to purchase a new car when you graduate and start to work. You can invest the money in either bond A, a two-year bond with a 3% annual in..
Six key dimensions to e-commerce security : Question 1: The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and:
Capital budgeting in not for profits : Capital Budgeting in Not for Profits Are the capital budgeting criteria discussed in chapter 9 of the Ross text applicable to not for profit corporations? How should such entities make capital budgeting decisions? What about the US Government? Should..
Portfolios of asset and risk-free asset : Using the SML [LO 4] Asset W has an expected return of 13.75 percent and a beta of 1.4. If the risk-free rate is 4.65 percent, complete the following table for portfolios of Asset W and a risk-free asset. (Leave no cells blank - be certain to enter "..
Compare the equivalent and nominal p-model for the line : Compare the equivalent and nominal π-model for the line; At the full load the line delivers 800 MW at 0.9 leading power factor and at 480 kV to the receiving end load. Calculate voltage regulation and efficiency of the line
The primary area of concern identified by management : Geeta & Company has experienced increased production costs. The primary area of concern identified by management is direct labor. The company is considering adopting a standard cost system to help control labor and other costs. Useful historical d..

Reviews

Write a Review

Business Management Questions & Answers

  Explain why you chose each individual leader

Identify three nursing leaders you would like to interview for this paper. The nursing leaders may have a variety of leadership styles, but they must all currently hold positions of leadership.

  Provide an example of a work-related change

Discuss three of the tactics that can help reduce resistance to change - particularly those that may prove most effective in your example.

  Explain why is an opinion leader a more credible source

Explain Why is an opinion leader a more credible source of product information than an advertisement for the same product

  What is a business process

What is a business process? Why is adopting a process view of organizations essential to becoming a successful manager?

  What are the mandatory requirements of securing consent

What are the mandatory requirements of securing consent and how are they best documented? What strategies must the organization employ to secure informed consent? Why?

  Leadership styles and the impact - role of followers

Describe how each of these three styles impacts followers in an organization and give a description of participative leadership, delegation, and empowerment

  What actions were built into your strategic plan

What actions were built into your strategic plan to achieve competitive and financial success with that strategy, Why you selected the strategy you used

  Difference between stocks and bonds

What is the difference between stocks and bonds? Which represents more risk to the company? Why?

  Question related to gaming management

What aspects of the gaming industry should be regulated by the state or federal government and what aspects of the gaming industry should be regulated by the gaming establishments themselves?

  Similarities and differences of several it professional

Similarities and differences of several IT Professional organizations

  Merit pay and the motivating value

Explain what are the causes of this belief and suggest ways in which the motivating value of merit raises may be increased.

  Explain briefly each term in context of making a decision

Explain briefly each term in context of making a decision and give examples which the bias or trap might lead to bad decision biases caused by retrievability of information

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd