Six key dimensions to e-commerce security are nonrepudiation

Assignment Help Business Management
Reference no: EM131068960

Question 1. The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and:

A. confidentiality.

B. usability.

C. functionality.

D. viability.

Question 2. Which of the following is an example of an integrity violation of e-commerce security?

A. A website is not actually operated by the entity the customer believes it to be.

B. A merchant uses customer information in a manner not intended by the customer.

C. A customer denies that he or she is the person who placed the order.

D. An unauthorized person intercepts an online communication and changes its contents.

Question 3. Which of the following is NOT a key point of vulnerability when dealing with e-commerce?

A. The client computer

B. The server

C. The communications pipeline

D. The credit card companies

Question 4. Malware that comes with a downloaded file that a user requests is called a:

A. Trojan horse.

B. backdoor.

C. drive-by download.

D. PUP.

Question 5. Which of the following is a prominent hacktivist group?

A. Anonymous

B. Anti-Phishing Working Group

C. IC3

D. Symantec

Question 6. Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other?  

A. DES

B. IM

C. NFC

D. Text messaging

Question 7. According to the Computer Security Institute's 2011 Computer Crime and Security Survey, which of the following was the most commonly reported type of attack?

A. Malware infection

B. Laptop theft

C. Website defacement

D. Insider abuse

Question 8. All of the following are methods of securing channels of communication EXCEPT:

A. SSL/TLS.

B. certificates.

C. VPN.

D. FTP.

Question 9. __________ refers to the ability to ensure that an e-commerce site continues to function as intended.  

A. Nonrepudiation

B. Authenticity

C. Availability

D. Integrity

Question 10. The Data Encryption Standard uses a __________ bit key.

A. 512

B. 256

C. 56

D. 12

Question 11. __________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.

A. Nonrepudiation

B. Authenticity

C. Availability

D. Integrity

Question 12. Online bill payment now accounts for __________ of all bill payments.

A. 10%

B. 25%

C. 50%

D. 100%

Question 13. Symmetric key encryption is also known as:

A. public key encryption.

B. secret key encryption.

C. PGP.

D. PKI.

Question 14. Rustock is an example of which of the following?

A. Worm

B. Botnet

C. Phishing

D. Hacktivism

Question 15. A digital certificate contains all of the following EXCEPT the:  

A. subject's private key.

B. subject's public key.

C. digital signature of the certification authority.

D. digital certificate serial number.

Question 16. Which of the following statements about public key encryption is NOT true?

A. Public key encryption uses two mathematically related digital keys.

B. Public key encryption ensures authentication of the sender.

C. Public key encryption does not ensure message integrity.

D. Public key encryption is based on the idea of irreversible mathematical functions.

Question 17. __________ refers to the ability to ensure that messages and data are only available to those authorized to view them.

A. Confidentiality

B. Integrity

C. Privacy

D. Availability

Question 18. What is the most frequent cause of stolen credit cards and card information today?

A. Lost cards

B. The hacking and looting of corporate servers storing credit card information

C. Sniffing programs

D. Phishing attacks

Question 19. In the United States, the primary form of online payment is:

A. PayPal.

B. credit cards.

C. debit cards.

D. Google Wallet.

Question 20. All of the following are limitations of the existing online credit card payment system EXCEPT:

A. poor security.

B. cost to consumers.

C. cost to merchant.

D. social equity.

Part 2 of 2 -

Question 21. All of the following are traditional online marketing and advertising tools EXCEPT:

A. affiliate marketing.

B. permission marketing.

C. social marketing.

D. sponsorship marketing.

Question 22. Which of the following forms of online advertising typically has the highest click-through rate?

A. E-mail marketing in-house list

B. Interstitials

C. Search engine keyword purchase

D. Sponsorships

Question 23. Which of the following is NOT one of the four main methods advertisers use to behaviorally target ads?

A. Nielsen ratings

B. Data collected from social networks

C. Integration of offline data

D. Clickstream data

Question 24. Recency refers to the:

A. percentage of customers who do not return during the next year after an initial purchase.

B. time elapsed since the last action taken by a customer.

C. percentage of existing customers who continue to buy on a regular basis.

D. percentage of customers who return to the site within a year to make additional purchases.

Question 25. CTR is a measure of the:  

A. percentage of times an ad is clicked.

B. number of times an ad is served.

C. number of http requests.

D. number of pages viewed.

Question 26. Which of the following examples illustrates the "Long Tail" phenomenon?

A. Rhapsody music streaming service reported that its no play rate had increased to over 20 percent.

B. The number of blockbuster "winner take all" video titles is declining.

C. Amazon sells a larger number of obscure books than hit books.

D. The average blog has a readership of slightly more than 1.

Question 27. Which of the following measures the ratio of actual orders to checkouts started?  

A. Checkout conversion rate

B. Conversion rate

C. Acquisition rate

D. Cart conversion rate

Question 28. Which of the following forms of online advertising is growing the fastest?

A. Paid search

B. Sponsorships

C. Video

D. Rich media

Question 29. Purchasing an online ad on a CPA basis means that the advertiser:

A. pays for impressions in 1,000 unit lots.

B. pays a prenegotiated fee for each click an ad receives.

C. pays only for those users who perform a specific action, such as registering, purchasing, etc.

D. exchanges something of equal value for the ad space.

Question 30. Promoted Trends is an example of which of the following types of online advertising?

A. Blog advertising

B. Interest-based advertising

C. Game advertising

D. Social network advertising

Question 31. Acquisition rate is a measure of the:

A. percentage of visitors who indicate an interest in a site's products by registering or visiting a product's pages.

B. percentage of visitors who become customers.

C. percentage of existing customers who continue to buy on a regular basis.

D. percentage of shoppers who do not return within a year after their initial purchase.

Question 32. Which of the following is NOT a feature that is driving social E-commerce growth?

A. Social sign-on

B. Network notification

C. Collaborative shopping

D. Personal intelligent agents

Question 33. Purchasing an online ad on a CPC basis means that the advertiser:

A. pays for impressions in 1,000 unit lots.

B. pays a prenegotiated fee for each click an ad receives.

C. pays only for those users who perform a specific action, such as registering, purchasing, etc.

D. exchanges something of equal value for the ad space.

Question 34. Which of the following is the top concern of Internet users about purchasing online?

A. Inability to see and touch before buying

B. Difficulty of returning products

C. Shipping costs

D. Inability to speak to sales assistant in person

Question 35. View-through rate measures the __________ response rate to an ad.

A. 30-minute

B. 24-hour

C. 7-day

D. 30-day

Question 36. Which of the following is NOT a practice that degrades the results and usefulness of search engines?

A. Content farms

B. Link farms

C. Social search

D. Click fraud

Question 37. The marketing technique known as __________ involves merchants offering products or services for a very low price for a short period of time.

A. search engine marketing

B. flash marketing

C. yield management

D. bait-and-switch

Question 38. Which of the following measures the average length of stay at a website?

A. Loyalty

B. Stickiness

C. Recency

D. Retention rate

Question 39. In __________ advertising, companies pay for ads to be placed dynamically on any participating website that the search engine determines is appropriate.

A. paid inclusion

B. network keyword

C. keyword

D. social

Question 40. Which of the following statements about CAN-SPAM is NOT true?

A. CAN-SPAM went into effect in January 2004.

B. CAN-SPAM prohibits unsolicited e-mail (spam).

C. CAN-SPAM prohibits the use of deceptive subject lines and false headers.

D. Large spammers are among CAN-SPAM's biggest supporters.

Reference no: EM131068960

Questions Cloud

How full-absorption costing can be abused by management : Author's Corner Video "Variable Cost, Fixed Cost, and Operating Leverage". Explain how full-absorption costing can be abused by management to misstate financial results.
Rate of return will templeton : This money will be used for her college education 18 years from now. He calculates that he will need $71,231 by the time she starts college. What rate of return will templeton need in order to achieve this goal.
Calculate the amount of the revised annual payment : A loan is being repaid with 30 annual payments of 300 each. With the 10th payment, the borrower pays an extra 1000, and then repays the balance over 10 years with a revised annual payment. The effective rate of interest is 8%. Calculate the amount..
Determine five key strategies a sales manager : Determine five key strategies a sales manager would need to show a meeting, convention, or exposition organizer during a FAM trip to close the sale.During busy times of the year, a hotel, convention center, or meeting hall may have more demand tha..
Six key dimensions to e-commerce security are nonrepudiation : Question 1. The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and:
Describe how the action research implemented : Prepare for your initial post by reflecting on all you have learned through this course. In your post, explain in at least one paragraph and using scholarly resources to support your assertions how the continuous improvement efforts through the us..
Variety of steps buyers and sellers : Whether formally or informally, there are a variety of steps buyers and sellers must complete during the pre award phase of the procurement process to prepare for the later phases of the procurement process. How do these preparations contribute to..
Decision making across the organization : Write a paper of no more than 750 words in which you respond to the Broadening Your Perspective 18-1 activity titled "Decision Making Across the Organization" in Ch. 18 of Accounting.
What is the required return on equity for lever : Companies Udon and Lever are identical in every aspect except that Udon is un-leveraged while Lever has $15 million of 6 percent bonds outstanding. What value would MM estimate for each firm? What is the required return on equity (Ks) for Lever? What..

Reviews

Write a Review

Business Management Questions & Answers

  What good services does the business provide

What good services does this business provide? And to what market (s)? What is its basis for competing? How does it make profit or contribute to a society?

  Explain why did microsoft decided to establish a corporate

Explain why did Microsoft decided to establish a corporate research laboratory in Cambridge, England. Elucidate why you think which garnishments are necessary or illustrate what other alternatives to garnishments may be available. 100 words

  Compute the reliability and validity of your job analysis

Compute the reliability and validity of your job analysis and Evaluate different performance appraisal methods that might be applied to your chosen job.

  Explain and evaluate your options for chances for success

Explain and Evaluate your options according to what you feel to be your chances for success.

  Problem regarding the forecasting methods

Read Problem 6 in Chapter 6 of your textbook. Calculate and answer parts a through d. Include all calculations and spreadsheets in your post. Explain why the moving average method was used instead of another forecasting method. What might be anoth..

  International job search - nestle1 outline the recruitment

international job search - nestle1. outline the recruitment strategies of nestle2. explain how nestle classifies their

  Describe the coverage strategy you would employ

Assume you are the manufacturer of a new type of electronics products which will sell for over $300 at retail. Describe the coverage strategy you would employ and provide your rationale.

  Business question global business environmentshould free

business question global business environmentshould free trade always be fair? provide an example of when free trade

  Explain value hidden in complementary products and services

Do you think Pepsi might find unused value hidden in complementary products and services?

  Which policies are unique to the financial environment

Identify one entity from each health care financial environment identified in the Financial Environments Worksheet.

  The rough draft of your diversity management proposal is due

The rough draft of your Diversity Management Proposal is due

  Post addresses issues in contemporary businessshow how your

post addresses issues in contemporary business.show how your perspective of business has changed as a result of the

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd