3 Months Free Update
3 Months Free Update
3 Months Free Update
The details of an e-commerce site order can be kept in memory, stored on the visitor's computer or stored on the Web server. This ability to remember the details of an order is known as:
The daily number of visitors to Cathy's site has increased by 600 percent and the current server configuration is beginning to drop requests. Cathy has decided to scale out the Web site by adding servers that will function as a server farm to host the company site. Adding servers in this way is known as:
Your e-business acquires raw materials and parts from several international suppliers and assembles those materials into a finished product. What is the name for the process that connects the materials and components to the consumer?
Which of the following demonstrates the importance of manual transaction processing?
Which of the following is often cited as an advantage of Microsoft Internet Information Services (IIS)?
What information is required to make a customer comfortable with making a purchase?
Which of the following is the most effective strategy for conducting an opt-in e-mail marketing campaign?
What is the name of the electronic funds transfer (EFT) system governed by the United States and designed to provide the clearing of electronic payments between banks?
Carly has requested a digital certificate for her Web site. Instructions for downloading and installing the new certificate will be:
Which organization is responsible for regulating the process of importing and exporting goods?
Which of the following segments first used blogs as an Internet marketing tool?
Alcazar wants to host three Web sites on the same computer, and to use SSL for transactions on each site. Which of the following methods for hosting multiple Web sites would be most suitable?
A large company with an adequate staff and funding wants to implement an e-commerce storefront. Which of the following methods would be most suitable for this company?
Which of the following is the most efficient strategy for detecting an attack on your company's e-commerce site?
Jennifer placed a special product advertisement on the home page of her e-commerce site. After one week, she reviewed her server logs to see how many visitors clicked the ad, completed the registration page and then entered credit card information to purchase the product. Jennifer's site path analysis is a review of:
Which of the following is the most effective strategy (as opposed to a tactic) for entering a new business market?
Which of the following is a messaging protocol designed to ensure the integrity of data sent between incompatible computers?
According to the X.509 (ITU) standard, which of the following is a non-standard certificate field that can contain additional information such as date of birth?
What security protocol typically allows Web-based applications to pass data securely by providing an encrypted channel?
Which of the following statements about Secure Electronic Transactions (SET) is correct?
Most Web sites that use online advertising can be divided into two site categories based on how the sites benefit from the advertising. What are these two e-commerce site categories?
Customers use your company's software to receive real-time weather reports. One of the company's software developers has proposed creating a second application that installs at the same time as the weather software, but operates in the background and reports user preferences and other information to your company. What is the name for this type of application?
Which of the following is the most effective way to build community with your online storefront?
The main purpose of monitoring e-commerce Web server resources and performance (including bandwidth, uptime, downtime and network usage) is to ensure:
To perform at the maximum level of security, digital certificates must be:
Which of the following site creation models would be most appropriate for a site needing customer relationship management (CRM) and personalization?
Which of the following is submitted to identify each person who handles evidence after a site infiltration?
An attack has affected a commercial server providing customized Web content services to Michael's e-commerce site. The attack is most likely an example of:
Marty included a banner ad for her online MP3 player store on a music download Web site. She found that 72 percent of users who visited the site via banner ad clickthrough became customers. Which of the following is the term for this percentage?
Which of the following steps are necessary for installing a payment gateway?
You are logged on to a Linux system. You suspect a problem with the system's MySQL database server. Which of the following files will contain relevant information pertaining to the failure?