New Year Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

CIW 1D0-525 CIW v5 E-Commerce Designer Exam Practice Test

Page: 1 / 7
Total 71 questions

CIW v5 E-Commerce Designer Questions and Answers

Question 1

Which technology provides channel security (privacy and authentication) through encryption, and reliability through a message integrity check (secure hash functions)?

Options:

A.

HTTP

B.

S-HTTP

C.

SSL

D.

SET

Question 2

Some Web servers can be configured to listen for HTTP requests for multiple Web sites on a single server. Which of the following steps can be taken to configure multiple Web sites to use port 80 as their default and to secure transactions?

Options:

A.

Bind multiple IP addresses to a single NIC on the server.

B.

Use separate host header names for each Web site.

C.

Configure the firewall to accept multiple HTTP requests.

D.

Install IIS and Apache on the same server to host multiple Web sites.

Question 3

Winnie has collected the physical evidence of an attack on her company's Web site, including the Web server, hard disk drives, site traffic and firewall logs. Which less tangible evidence could be lost?

Options:

A.

User authentication data

B.

System data stored in RAM

C.

IP address traceroute data

D.

ISP router records

Question 4

Which of the following can help customers complete purchases more quickly?

Options:

A.

Detailed descriptions of products

B.

An RSS feed directing customers to a site blog

C.

Product testimonials from other customers

D.

A well-planned site hierarchy

Question 5

Which of the following market models is considered industry-centric that is, a model in which all the businesses in a particular market are involved in the same industry?

Options:

A.

Horizontal market

B.

B2C market

C.

Open market

D.

Vertical market

Question 6

Which of the following is the most efficient strategy for detecting an attack on your company's e-commerce site?

Options:

A.

Teaching employees about social engineering

B.

Conducting an audit

C.

Testing password strength

D.

Reviewing system logs

Question 7

Which of the following can help assure customers that the information they provide to you will remain private?

Options:

A.

Implement and post a privacy policy.

B.

Provide an opt-out link for all e-mail sent to customers.

C.

Post the company security policy.

D.

Create a data backup policy.

Question 8

You want to configure a second Web site on a server. Which of the following most efficiently ensures that requests are properly processed by this second Web server for customers around the world?

Options:

A.

Secure Sockets Layer (SSL)

B.

The server's hosts file

C.

The hosts file on user systems

D.

A host header value

Question 9

According to the X.509 (ITU) standard, which of the following is a non-standard certificate field that can contain additional information such as date of birth?

Options:

A.

Fingerprint

B.

Subject (User) Name

C.

Subject Public-Key Information

D.

Extensions (v3)

Question 10

The goals for effective usability in an e-commerce site are to get customers to:

Options:

A.

visit, learn and return.

B.

find, learn and review.

C.

find, compare and revisit.

D.

visit, learn and purchase.

Question 11

The purpose of a stress test is to determine:

Options:

A.

whether more system RAM is necessary.

B.

whether a more powerful CPU is necessary.

C.

whether a performance bottleneck is present.

D.

whether visitors can reach the site.

Question 12

You are logged on to a Windows system. You suspect a problem with your Oracle database, and want to view the pertinent information related to the problem. What log should you check?

Options:

A.

Application log

B.

Security log

C.

Networking log

D.

Error log

Question 13

Which of the following describes an effective target-marketing program for a company that sells kayak accessories to distributors?

Options:

A.

Placing a banner advertisement on a third-party Web site that sells touring packages to the Caribbean

B.

Placing a banner advertisement on a third-party Web site that sells kayaks to outdoor enthusiasts

C.

Sending an e-mail advertisement to those who sell kayaks to outdoor enthusiasts

D.

Sending an e-mail advertisement to everyone who has indicated an interest in outdoor activities

Question 14

Which of the following statements about banner exchange networks is accurate?

Options:

A.

They are effective only in a B2B environment.

B.

They are effective in both B2B and B2C environments.

C.

They are effective only in a B2C environment.

D.

They are most effective in non-profit environments.

Question 15

Which of the following is a primary concern when configuring a shopping-cart system?

Options:

A.

Compatibility with ODBC and ASP

B.

Payment gateway support of SSL/TLS

C.

The initial connection cost

D.

Compatibility with the payment gateway

Question 16

Tomas receives multiple e-mail notices after he successfully places an online order with a book retailer. What is the customary sequence of order e-mail notices?

Options:

A.

Order address verified, order shipped, order charged to the credit card

B.

Order processed, order status confirmed, order shipped with tracking number

C.

Order fulfilled, order processed, order shipped with tracking number assigned

D.

Order shipped, order processed, order charged to the credit card

Question 17

Which type of encryption is typically slower to use but does not require a secure channel to function?

Options:

A.

Asymmetric-key encryption

B.

Symmetric-key encryption

C.

Pretty Good Privacy (PGP)

D.

One-time pad (OTP)

Question 18

A large company with an adequate staff and funding wants to implement an e-commerce storefront. Which of the following methods would be most suitable for this company?

Options:

A.

In-house solution

B.

Offline solution

C.

Instant storefront

D.

Online solution

Question 19

A hash encryption function:

Options:

A.

is encrypted with a public key and decrypted with a private key.

B.

is not used because today's computers can easily hack it.

C.

is relatively easy to encrypt but difficult to decrypt.

D.

contains a secret key that is used to encrypt and decrypt.

Question 20

Which of the following is often used in place of photo identification and a signature whenever a credit card is used in an e-commerce transaction?

Options:

A.

Cookies deposited by the site's shopping cart

B.

Information verified by a Public Key Infrastructure (PKI) company

C.

Billing address verification

D.

The purchaser's public key

Question 21

Before you can conduct usability testing, you should:

Options:

A.

identify your potential customers.

B.

identify the most-traveled path of your site.

C.

identify browser compatibility issues.

D.

publish your site to a production server.

Page: 1 / 7
Total 71 questions