IS3445 CHAP 2 FROM BRICK-AND-MORTAR TO E-COMMERCE TO E-BUSINESS TRANSFORMATION Flashcards Preview

IS3445 SEC WEB APPS > IS3445 CHAP 2 FROM BRICK-AND-MORTAR TO E-COMMERCE TO E-BUSINESS TRANSFORMATION > Flashcards

Flashcards in IS3445 CHAP 2 FROM BRICK-AND-MORTAR TO E-COMMERCE TO E-BUSINESS TRANSFORMATION Deck (29)
Loading flashcards...
1
Q

___ - in this model companies affiliated with advertising agencies place ads on their sites for a financial incentive.

A

AFFILIATE MARKETING

2
Q

___ is keeping records of operations and transactions to assess the accuracy of processes.

A

AUDITING

3
Q

___ is the process of establishing the validity of a person’s identity.

A

AUTHENTICATION

4
Q

___ is the process of giving an individual access to information after authentication.

A

AUTHORIZATION

5
Q

___ is the degree to which a system is operable and committable at a start of a process or function.

A

AVAILABILITY

6
Q

___ is the percentage of single-page visits to a Web site, or those visitors that bounce away to another site. It is a standard measure of quality and relevance to the visitor.

A

BOUNCE RATE

7
Q

___ measures the number of times an Internet ad is clicked, versus the times it is viewed.

A

CLICK-THROUGH RATE (CTR)

8
Q

___ represents the percentage of visitors who perform a desired action against those that do not.

A

CONVERSATION RATE

9
Q

___ represents the amount an advertiser pays each time a user clicks an ad.

A

COST PER CLICK (CPC)

10
Q

___ is an attack that can result in decreased availability of the targeted system.

A

DENIAL OF SERVICE (DoS)

11
Q

___ is the currency that you purchase with a credit, charge, or debit card, then download to your computer or smart card.

A

ELECTRONIC CASH

12
Q

___ is an electronic storage device for electronic currency and information about the owner of the wallet.

A

ELECTRONIC WALLET

13
Q

___ emphasizes the need for information to be delivered unaltered to the recipient.

A

IINTEGRITY

14
Q

___ is an affiliate-based commerce model where sites pay affiliates for generating traffic to them.

A

PAY-PER-CLICK (PPC) REVENUE MODEL

15
Q

___ is a protocol used to establish and secure VPN connections.

A

POINT-TO-POINT TUNNELING PROTOCOL (PPTP)

16
Q

___ is a web site visitors who are searching specifically for your goods or services.

A

QUALIFIED TRAFFIC

17
Q

___ is an application-layer protocol designed to establish and maintain multimedia sessions.

A

SESSIONS INITIATION PROTOCOL (SIP)

18
Q

___ refers to the strategies used to make a site more browser-friendly.

A

SEARCH ENGINE OPTIMIZATION (SEO)

19
Q

___ logos and icons are used to associate a Web site with a known and trusted entity.

A

TRUST LOGOS & TRUST ICONS

20
Q
  1. DoS attacks stop access to authorized users of a Web site.
    TRUE OR FALSE
A

TRUE

21
Q
  1. Which of the following are included in CLM?
  2. Acquisition
  3. Retention
  4. Suspension
  5. Conversion
A

Acquisition

Retention

Conversion

22
Q
  1. Which of the following are required to establish a VPN connection? (Select three.)
  2. VPN client
  3. VPN server
  4. SSL
  5. Transmission media
A

VPN client

VPN server

Transmission media

23
Q
  1. You are designing a customer service strategy for a large company. They have requested full two-way communication between service staff and the customer. Which of the following methods would you suggest? (Select two).
  2. Email support
  3. FAQ
  4. Customer feedback forms
  5. VoIP
A

Email support

VoIP

24
Q
  1. You are placing keywords into the HTML code of a Web page. Which of the following tags should you use? (Select two).
  2. 4.
A
25
Q
  1. You are trying several different online marketing strategies and decide to share your bookmarks online to promote your site. Which type of marketing strategy are you employing?
  2. Social blogging
  3. Social book keeping
  4. Social bookmarking
  5. Social tracking
A

Social bookmarking

26
Q
  1. The single most important thing an organization can do to defend itself against network attacks and malware is to keep systems patched and updated.
    TRUE OR FALSE
A

TRUE

27
Q
  1. A “Contact Us” form is an example of ___.
A

Limited two-way communications.

28
Q
  1. You have to connect three remote employees to the corporate network. which of the following technologies would you use?
  2. SSL
  3. VPN
  4. One-way communication
  5. Remote acquisition
A

VPN

29
Q
  1. Ecommerce security has three main concepts:
    CONFIDENTIALITY, INTEGRITY, AND AVAILABILITY.

TRUE OR FALSE

A

TRUE