Which technology provides channel security (privacy and authentication) through encryption, and reliability through a message integrity check (secure hash functions)?
Some Web servers can be configured to listen for HTTP requests for multiple Web sites on a single server. Which of the following steps can be taken to configure multiple Web sites to use port 80 as their default and to secure transactions?
Winnie has collected the physical evidence of an attack on her company's Web site, including the Web server, hard disk drives, site traffic and firewall logs. Which less tangible evidence could be lost?
Which of the following can help customers complete purchases more quickly?
Which of the following market models is considered industry-centric that is, a model in which all the businesses in a particular market are involved in the same industry?
Which of the following is the most efficient strategy for detecting an attack on your company's e-commerce site?
Which of the following can help assure customers that the information they provide to you will remain private?
You want to configure a second Web site on a server. Which of the following most efficiently ensures that requests are properly processed by this second Web server for customers around the world?
According to the X.509 (ITU) standard, which of the following is a non-standard certificate field that can contain additional information such as date of birth?
The goals for effective usability in an e-commerce site are to get customers to:
The purpose of a stress test is to determine:
You are logged on to a Windows system. You suspect a problem with your Oracle database, and want to view the pertinent information related to the problem. What log should you check?
Which of the following describes an effective target-marketing program for a company that sells kayak accessories to distributors?
Which of the following statements about banner exchange networks is accurate?
Which of the following is a primary concern when configuring a shopping-cart system?
Tomas receives multiple e-mail notices after he successfully places an online order with a book retailer. What is the customary sequence of order e-mail notices?
Which type of encryption is typically slower to use but does not require a secure channel to function?
A large company with an adequate staff and funding wants to implement an e-commerce storefront. Which of the following methods would be most suitable for this company?
A hash encryption function:
Which of the following is often used in place of photo identification and a signature whenever a credit card is used in an e-commerce transaction?
Before you can conduct usability testing, you should: