According to the X.509 (ITU) standard, which of the following is a non-standard certificate field that can contain additional information such as date of birth?
A. Fingerprint
B. Extensions (v3)
C. Subject (User) Name
D. Subject Public-Key Information
User-tracking services can provide data about site visitors. Which of the following types of data are collected by tracking services?
A. Operating system, browser type, domain
B. Operating system, third-party cookies, passwords
C. Operating system, browser type, third-party cookies
D. Operating system, demographic information, domain
Before you can conduct usability testing, you should:
A. identify your potential customers.
B. identify browser compatibility issues.
C. publish your site to a production server.
D. identify the most-traveled path of your site.
Which of the following describes a referrer program?
A. One site pays another site for the traffic it sends; traffic is directed in one direction.
B. One site pays several sites for traffic it sends; traffic is generated in multiple directions.
C. A third party verifies referrals from one site to another site as traffic flows from one to the other.
D. Referrals occur only after a company pays a commission for them; traffic is directed in one direction.
In credit card transactions, which of the following occurs during the settlement phase?
A. Credit card information is passed to a payment gateway.
B. The processor verifies the credit card through the issuing bank.
C. The acquiring bank transfers money to the merchant's account.
D. The customer enters credit card information on a Web site and confirms the order.
Jennifer placed a special product advertisement on the home page of her e-commerce site. After one week, she reviewed her server logs to see how many visitors clicked the ad, completed the registration page and then entered credit card information to purchase the product. Jennifer's site path analysis is a review of:
A. good e-commerce advertising.
B. customer satisfaction surveys.
C. controlled-navigation click patterns.
D. live usability testing and role playing.
Which of the following are common elements of an e-commerce transaction system?
A. Order tracking and customer referrer programs
B. Credit card payments and online payment services
C. Automatic restocking of goods and currency conversion
D. Employee incentive plans and credit-card payment services
Which of the following security threats is reduced by a strong password policy?
A. Pharming attacks
B. Database tampering
C. Buffer overflow attacks
D. Denial-of-service attacks
After using your Web browser to test a few purchases on your staging server, you find that the shopping cart has carried forward purchases from several earlier transactions. What steps should you take first to solve this problem?
A. Close and reopen the browser, and then use the shopping cart again.
B. Delete the system DSN and re-create it, and then use the shopping cart again.
C. Test your e-commerce software on the production server, and then use the shopping cart again.
D. Delete the database and reinstall it using the same parameters, and then use the shopping cart again.
An attack has affected a commercial server providing customized Web content services to Michael's e-commerce site. The attack is most likely an example of:
A. registrar database tampering.
B. certificate authority (CA) infiltration.
C. Application Service Provider (ASP) infiltration.
D. Secure Electronic Transactions (SET) corruption.