Search Header Logo

Ecom 3

Authored by Mohamed Razi

Business

University

Used 5+ times

Ecom 3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What are the two most important management challenges in building a successful e-commerce presence?

developing a clear understanding of business objectives and knowing how to choose the right technology to achieve those objectives

having an accurate understanding of your business environment and an achievable business plan

building a team with the right skill sets and closely managing the development process

identifying the key components of your business plan and selecting the right software, hardware, and infrastructure for your site

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

All of the following are basic functionality provided by web servers except:

site management tools

data capture tools

security services

a shopping cart

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following types of sites typically needs a high percentage of secure pages?

web services

customer self-service

trading

publishing/subscription

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Building which of the following is the most expensive path to creating a mobile presence?

native app

mobile website

mobile web app

hybrid HTTP

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of an integrity violation of e-commerce security?

A website is not actually operated by the entity the customer believes it to be

A merchant uses customer information in a manner not intended by the customer

A customer denies that he is the person who placed the order

An unauthorized person intercepts an online communication and changes its contents

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the most frequent cause of stolen credit cards and card information today?

lost cards

the hacking and looting of corporate servers storing credit card information

sniffing programs

phishing attacks

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following dimensions of e-commerce security is not provided for by encryption?

confidentiality

availability

message integrity

nonrepudiation

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?