Which of the following is the most effective option for detecting a site attack by someone who wants to modify your customer database?
A. Implementing a firewall
B. Using antivirus software
C. Using an intrusion detection system
D. Limiting the open ports on the system
The details of an e-commerce site order can be kept in memory, stored on the visitor's computer or stored on the Web server. This ability to remember the details of an order is known as:
A. profiling an order.
B. tracking an order.
C. persisting an order.
D. filling the shopping cart.
Which of the following site creation models would be most appropriate for a site needing customer relationship management (CRM) and personalization?
A. Online instant storefront
B. Mid-level online instant storefront
C. Mid-level offline instant storefront
D. High-level offline instant storefront
In evaluating the various Web server, database and scripting-language options available for her company, Lindsay notices that Apache server, MySQL and PHP can be:
A. purchased separately.
B. licensed for a maximum of five years.
C. run on Microsoft Windows, Linux and Solaris operating systems.
D. easily administered by anyone with no Web application experience.
A payment gateway routes payment information between the:
A. shopping cart and the processor.
B. customer account and the issuing bank.
C. merchant account and the acquiring bank.
D. merchant account and the customer account.
What information is required to make a customer comfortable with making a purchase?
A. A brief product description
B. A picture with no additional information
C. A detailed description of the product with pictures
D. All supporting documentation for the product or service
Isabelle, a site administrator, has just analyzed her Web site's traffic and discovered that many users abandon the site when they reach a particular page. Which source of Web site data can Isabelle use to analyze this pattern?
A. Server logs
B. Hit counters
C. Page weight
D. Page rankings
To perform at the maximum level of security, digital certificates must be:
A. guaranteed by VeriSign.
B. issued by a trusted third party.
C. verified digitally by a notary public.
D. issued 30 days before the site goes live.
Which of the following segments first used blogs as an Internet marketing tool?
A. Small businesses
B. Large corporations
C. Government agencies
D. Mainstream advertisers
After using your Web browser to test a few purchases on your staging server, you find that the shopping cart has carried forward purchases from several earlier transactions. What steps should you take first to solve this problem?
A. Close and reopen the browser, and then use the shopping cart again.
B. Delete the system DSN and re-create it, and then use the shopping cart again.
C. Test your e-commerce software on the production server, and then use the shopping cart again.
D. Delete the database and reinstall it using the same parameters, and then use the shopping cart again.