|
Question 1. Which of the following can help assure customers that the information they provide to you will remain private? A. Implement and post a privacy policy. B. Provide an opt-out link for all e-mail sent to customers. C. Post the company security policy. D. Create a data backup policy. Answer: A Question 2. Which of the following pieces of information will best help you determine the number of transactions your database server can accommodate? A. The number of concurrent user connections B. Maximum uptime requirements C. The number of database tables required D. Minimum installation requirements Answer: A Question 3. To perform at the maximum level of security, digital certificates must be: A. issued by a trusted third party. B. issued 30 days before the site goes live. C. verified digitally by a notary public. D. guaranteed by VeriSign. Answer: A Question 4. The purpose of a stress test is to determine: A. whether more system RAM is necessary. B. whether a more powerful CPU is necessary. C. whether a performance bottleneck is present. D. whether visitors can reach the site. Answer: C Question 5. Which of the following is the most effective option for detecting a site attack by someone who wants to modify your customer database? A. Using an intrusion detection system B. Limiting the open ports on the system C. Using antivirus software D. Implementing a firewall Answer: A Question 6. The main purpose of monitoring e-commerce Web server resources and performance (including bandwidth, uptime, downtime and network usage) is to ensure: A. visitor satisfaction. B. cost-effectiveness. C. site availability. D. increased profitability. Answer: C Question 7. A hash encryption function: A. is encrypted with a public key and decrypted with a private key. B. is not used because today's computers can easily hack it. C. is relatively easy to encrypt but difficult to decrypt. D. contains a secret key that is used to encrypt and decrypt. Answer: C Question 8. You need to enable SSL/TLS on a Web server for a virtual directory. You have just installed a signed digital certificate from a certificate authority. What is the next step you should take? A. Place a copy of the certificate in the virtual directory as a hidden file. B. Place the digital certificate in the Trusted Root Certification Authorities store. C. Specify that you want to use SSL/TLS for the Web server's virtual directory. D. Specify that you want to use the certificate to sign the virtual directory. Answer: C Question 9. Which of the following site creation models would be most appropriate for a site needing customer relationship management (CRM) and personalization? A. Online instant storefront B. Mid-level offline instant storefront C. Mid-level online instant storefront D. High-level offline instant storefront Answer: D Question 10. Tomas receives multiple e-mail notices after he successfully places an online order with a book retailer. What is the customary sequence of order e-mail notices? A. Order address verified, order shipped, order charged to the credit card B. Order processed, order status confirmed, order shipped with tracking number C. Order fulfilled, order processed, order shipped with tracking number assigned D. Order shipped, order processed, order charged to the credit card Answer: B
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.