BU460 Electronic Commerce4

Question 1 (2.5 points)
  

Most of the world's spam is delivered via which of the following?

Viruses

Worms

Trojan horses

Botnets
Question 2 (2.5 points)
  

Proxy servers are also known as:

firewalls.

application gateways.

dual home systems.

packet filters.
Question 3 (2.5 points)
  

Online bill payment now accounts for __________ of all bill payments.

10%

25%

50%

100%
Question 4 (2.5 points)
  
Linden Dollars, created for use in Second Life, are an example of:

digital cash.

virtual currency.

EBPP.

peer-to-peer payment systems.
Question 5 (2.5 points)
  

Which of the following countries has been found to have engaged in cyberespionage against Google?

Russia

Iran

Iraq

China

Question 6 (2.5 points)
  

Online payments are believed to cost __________ to process compared to __________ for paper bills.

20 to 30 cents, $3 to $7

$1 to $2, $10 to $20

$3 to $7, 20 to 30 cents

$10 to $20, $1 to $2
Question 7 (2.5 points)
  

A digital certificate contains all of the following EXCEPT the: 

subject's private key.

subject's public key.

digital signature of the certification authority.

digital certificate serial number.
Question 8 (2.5 points)
  

Which of the following is NOT a key point of vulnerability when dealing with e-commerce?

The client computer

The server

The communications pipeline

The credit card companies

Question 9 (2.5 points)
  

Malware that comes with a downloaded file that a user requests is called a:
Question 9 options:

Trojan horse.

backdoor.

drive-by download.

PUP.
Save
Question 10 (2.5 points)
  

Which of the following is a prominent hacktivist group?

Anonymous

Anti-Phishing Working Group

IC3

Symantec
Question 11 (2.5 points)
  

In the United States, the primary form of online payment is:

PayPal.

credit cards.

debit cards.

Google Wallet.
Question 12 (2.5 points)
  

All of the following are methods of securing channels of communication EXCEPT:

SSL/TLS.

certificates.

VPN.

FTP.
Question 13 (2.5 points)
  

Which of the following did Dropbox implement after a series of security snafus in 2011 and 2012?

Anti-virus software

Two-factor authentication

SSL/TLS

Firewall
Question 14 (2.5 points)
  

Botnets are typically used for all of the following EXCEPT: 

DDoS attacks.

phishing attacks.

storing network traffic for analysis.

stealing information from computers.
Question 15 (2.5 points)
  

All of the following are examples of malicious code EXCEPT:

viruses.

bots.

worms.

sniffers.
Question 16 (2.5 points)
  

Which of the following statements about public key encryption is NOT true?

Public key encryption uses two mathematically related digital keys.

Public key encryption ensures authentication of the sender.

Public key encryption does not ensure message integrity.

Public key encryption is based on the idea of irreversible mathematical functions.
Question 17 (2.5 points)
  

__________ refers to the ability to ensure that messages and data are only available to those authorized to view them.

Confidentiality

Integrity

Privacy

Availability
Question 18 (2.5 points)
  

All of the following are limitations of the existing online credit card payment system EXCEPT:

poor security.

cost to consumers.

cost to merchant.

social equity.
Question 19 (2.5 points)
  

Symmetric key encryption is also known as:

public key encryption.

secret key encryption.

PGP.

PKI.
Question 20 (2.5 points)
  

What is the most frequent cause of stolen credit cards and card information today?

Lost cards

The hacking and looting of corporate servers storing credit card information

Sniffing programs

Phishing attacks

Question 21 (2.5 points)
  

Which of the following measures the average length of stay at a website?

Loyalty

Stickiness

Recency

Retention rate
Question 22 (2.5 points)
  

Which of the following is NOT a kind of Twitter marketing product?

Promoted Shopping

Promoted Tweets

Promoted Accounts

Promoted Trends

Question 23 (2.5 points)
  

Which of the following statements about CAN-SPAM is NOT true?

CAN-SPAM went into effect in January 2004.

CAN-SPAM prohibits unsolicited e-mail (spam).

CAN-SPAM prohibits the use of deceptive subject lines and false headers.

Large spammers are among CAN-SPAM's biggest supporters.
Question 24 (2.5 points)
  

Which of the following is NOT a practice that degrades the results and usefulness of search engines?

Content farms

Link farms

Social search

Click fraud
Question 25 (2.5 points)
  

A Crayola arts-and-crafts column on a parenting website is an example of what form of advertising? 

Sponsorship

Banner swapping

Affiliate relationship

Public relations
Question 26 (2.5 points)
  

Which of the following online advertising formats is the most effective?

Banner ads

Rich media ads

Video ads

E-mail
Question 27 (2.5 points)
  

Which of the following forms of online advertising typically has the highest click-through rate?

E-mail marketing in-house list

Interstitials

Search engine keyword purchase

Sponsorships
Question 28 (2.5 points)
  

Which of the following is NOT one of the four main methods advertisers use to behaviorally target ads?

Nielsen ratings

Data collected from social networks

Integration of offline data

Clickstream data
Question 29 (2.5 points)
  

Purchasing an online ad on a CPC basis means that the advertiser:

pays for impressions in 1,000 unit lots.

pays a prenegotiated fee for each click an ad receives.

pays only for those users who perform a specific action, such as registering, purchasing, etc.

exchanges something of equal value for the ad space.
Question 30 (2.5 points)
  

Promoted Trends is an example of which of the following types of online advertising?

Blog advertising

Interest-based advertising

Game advertising

Social network advertising
Question 31 (2.5 points)
  

Which of the following is the top concern of Internet users about purchasing online?

Inability to see and touch before buying

Difficulty of returning products

Shipping costs

Inability to speak to sales assistant in person
Question 32 (2.5 points)
  

View-through rate measures the __________ response rate to an ad.

30-minute

24-hour

7-day

30-day
Question 33 (2.5 points)
  

All of the following are traditional online marketing and advertising tools EXCEPT:

affiliate marketing.

permission marketing.

social marketing.

sponsorship marketing.
Question 34 (2.5 points)
  

All of the following are online communications that are used to support the evaluation of alternatives stage of the consumer decision process EXCEPT:

search engines.

online catalogs.

social networks.

targeted banner ads.
Question 35 (2.5 points)
  

Purchasing an online ad on a CPA basis means that the advertiser:

pays for impressions in 1,000 unit lots.

pays a prenegotiated fee for each click an ad receives.

pays only for those users who perform a specific action, such as registering, purchasing, etc.

exchanges something of equal value for the ad space.
Question 36 (2.5 points)
  

The marketing technique known as __________ involves merchants offering products or services for a very low price for a short period of time.

search engine marketing

flash marketing

yield management

bait-and-switch
Question 37 (2.5 points)
  

__________ behavior refers to the transaction log that consumers establish as they move about the Web from site to site.

Sponsorship

Browsing

Surfing

Clickstream
Question 38 (2.5 points)
  

Which of the following examples illustrates the "Long Tail" phenomenon?

Rhapsody music streaming service reported that its no play rate had increased to over 20 percent.

The number of blockbuster "winner take all" video titles is declining.

Amazon sells a larger number of obscure books than hit books.

The average blog has a readership of slightly more than 1.
Question 39 (2.5 points)
  

In __________ advertising, companies pay for ads to be placed dynamically on any participating website that the search engine determines is appropriate.

paid inclusion

network keyword

keyword

social
Question 40 (2.5 points)
  

The dial-up audience is __________ the broadband audience.

virtually indistinguishable from

more educated than

less intensely involved with the Internet than

wealthier than

    

No comments:

Post a Comment