IS3445 CHAP 2 FROM BRICK-AND-MORTAR TO E-COMMERCE TO E-BUSINESS TRANSFORMATION Flashcards
___ - in this model companies affiliated with advertising agencies place ads on their sites for a financial incentive.
AFFILIATE MARKETING
___ is keeping records of operations and transactions to assess the accuracy of processes.
AUDITING
___ is the process of establishing the validity of a person’s identity.
AUTHENTICATION
___ is the process of giving an individual access to information after authentication.
AUTHORIZATION
___ is the degree to which a system is operable and committable at a start of a process or function.
AVAILABILITY
___ is the percentage of single-page visits to a Web site, or those visitors that bounce away to another site. It is a standard measure of quality and relevance to the visitor.
BOUNCE RATE
___ measures the number of times an Internet ad is clicked, versus the times it is viewed.
CLICK-THROUGH RATE (CTR)
___ represents the percentage of visitors who perform a desired action against those that do not.
CONVERSATION RATE
___ represents the amount an advertiser pays each time a user clicks an ad.
COST PER CLICK (CPC)
___ is an attack that can result in decreased availability of the targeted system.
DENIAL OF SERVICE (DoS)
___ is the currency that you purchase with a credit, charge, or debit card, then download to your computer or smart card.
ELECTRONIC CASH
___ is an electronic storage device for electronic currency and information about the owner of the wallet.
ELECTRONIC WALLET
___ emphasizes the need for information to be delivered unaltered to the recipient.
IINTEGRITY
___ is an affiliate-based commerce model where sites pay affiliates for generating traffic to them.
PAY-PER-CLICK (PPC) REVENUE MODEL
___ is a protocol used to establish and secure VPN connections.
POINT-TO-POINT TUNNELING PROTOCOL (PPTP)
___ is a web site visitors who are searching specifically for your goods or services.
QUALIFIED TRAFFIC
___ is an application-layer protocol designed to establish and maintain multimedia sessions.
SESSIONS INITIATION PROTOCOL (SIP)
___ refers to the strategies used to make a site more browser-friendly.
SEARCH ENGINE OPTIMIZATION (SEO)
___ logos and icons are used to associate a Web site with a known and trusted entity.
TRUST LOGOS & TRUST ICONS
- DoS attacks stop access to authorized users of a Web site.
TRUE OR FALSE
TRUE
- Which of the following are included in CLM?
- Acquisition
- Retention
- Suspension
- Conversion
Acquisition
Retention
Conversion
- Which of the following are required to establish a VPN connection? (Select three.)
- VPN client
- VPN server
- SSL
- Transmission media
VPN client
VPN server
Transmission media
- You are designing a customer service strategy for a large company. They have requested full two-way communication between service staff and the customer. Which of the following methods would you suggest? (Select two).
- Email support
- FAQ
- Customer feedback forms
- VoIP
Email support
VoIP
- You are placing keywords into the HTML code of a Web page. Which of the following tags should you use? (Select two).
- 4.
- You are trying several different online marketing strategies and decide to share your bookmarks online to promote your site. Which type of marketing strategy are you employing?
- Social blogging
- Social book keeping
- Social bookmarking
- Social tracking
Social bookmarking
- The single most important thing an organization can do to defend itself against network attacks and malware is to keep systems patched and updated.
TRUE OR FALSE
TRUE
- A “Contact Us” form is an example of ___.
Limited two-way communications.
- You have to connect three remote employees to the corporate network. which of the following technologies would you use?
- SSL
- VPN
- One-way communication
- Remote acquisition
VPN
- Ecommerce security has three main concepts:
CONFIDENTIALITY, INTEGRITY, AND AVAILABILITY.
TRUE OR FALSE
TRUE