Maggie is developing a site that allows purchases to be made online. What technology should she use to enable security measures on this site?
What aspect of e-commerce marketing most significantly differentiates the use of a niche marketing strategy from that of a global marketing strategy?
You are considering payment methods for a business-to-business (B2B) e-commerce site. Which payment method would be most appropriate for your needs?
A large company with an adequate staff and funding wants to implement an e-commerce storefront. Which of the following methods would be most suitable for this company?
Which of the following is the most efficient strategy for detecting an attack on your company's e-commerce site?
The details of an e-commerce site order can be kept in memory, stored on the visitor's computer or stored on the Web server. This ability to remember the details of an order is known as:
Vera's new e-business failed in its second year because inventory levels were constantly depleted and she was unable to satisfy order fulfillment. The most likely underlying reason for the failure may be that Vera's business plan did not address:
Yvonne has received reports that the Web server she administers has been responding slowly to page requests, and often responds so slowly that requested pages are never received. After reviewing the server logs, Yvonne determines that the Web server has received more than 1 billion requests sent to a nonexistent port. The Web server is the target of:
What step would be appropriate before launching an e-commerce site with a newly installed payment gateway?
The daily number of visitors to Cathy's site has increased by 600 percent and the current server configuration is beginning to drop requests. Cathy has decided to scale out the Web site by adding servers that will function as a server farm to host the company site. Adding servers in this way is known as:
Which of the following can help assure customers that the information they provide to you will remain private?
You are logged on to a Linux system. You suspect a problem with the system's MySQL database server. Which of the following files will contain relevant information pertaining to the failure?
Jorge is developing an e-commerce solution for his company, which sells subscription services. Customers need to be billed on a recurring basis for their subscriptions. Which payment method would Jorge find most appropriate for this situation?
You are transitioning from a traditional "brick-and-mortar storefront that accepts credit cards to a new e-commerce storefront. Which payment method would be most appropriate during the transition?
An attack has affected a commercial server providing customized Web content services to Michael's e-commerce site. The attack is most likely an example of:
Placing an institutional banner ad on a site that targets a specific market can result in:
Which of the following is the most effective strategy (as opposed to a tactic) for entering a new business market?
Which of the following market models is considered industry-centric that is, a model in which all the businesses in a particular market are involved in the same industry?
In credit card transactions, which of the following occurs during the settlement phase?
Which of the following is often cited as an advantage of Microsoft Internet Information Services (IIS)?
Carly has requested a digital certificate for her Web site. Instructions for downloading and installing the new certificate will be:
The main purpose of monitoring e-commerce Web server resources and performance (including bandwidth, uptime, downtime and network usage) is to ensure:
What type of storefront would be most appropriate for an individually owned business that deals in items without a set retail price, such as antiques?
What is the result of an e-commerce HTTP server that processes the input queue at a rate equal to or greater than that of incoming requests?
What is the name of the electronic funds transfer (EFT) system governed by the United States and designed to provide the clearing of electronic payments between banks?
Which of the following is the most effective option for detecting a site attack by someone who wants to modify your customer database?
Customers use your company's software to receive real-time weather reports. One of the company's software developers has proposed creating a second application that installs at the same time as the weather software, but operates in the background and reports user preferences and other information to your company. What is the name for this type of application?