Which of the following is often used in place of photo identification and a signature whenever a credit card is used in an e-commerce transaction?
A. Billing address verification
B. The purchaser's public key
C. Cookies deposited by the site's shopping cart
D. Information verified by a Public Key Infrastructure (PKI) company
The certificate authority (CA) cryptographically signs a certificate file with its private key. Anyone can verify the certificate signature with the public key. This is known as:
A. hash encryption.
B. binary-key encryption.
C. symmetric-key encryption.
D. asymmetric-key encryption.
A retail business that advertises and markets using traditional print materials has decided to expand its marketing reach and increase revenue by developing an online catalog. Which of the following is the primary objective?
A. Personalizing the site
B. Creating an effective selling tool
C. Creating a visually attractive catalog
D. Converting the existing print catalog into HTML
Which of the following describes a root certificate authority (CA)?
A. A CA that cannot be brought offline
B. A CA that has an unlimited validity period
C. A CA that uses LDAP to transmit its credentials to other CAs
D. A CA that signs its own certificate and certifies itself as legitimate
The main purpose of monitoring e-commerce Web server resources and performance (including bandwidth, uptime, downtime and network usage) is to ensure: A. site availability.
B. visitor satisfaction.
C. cost-effectiveness.
D. increased profitability.
Nain is a front-desk receptionist at a large corporation. After a recent payday for the employees, Nain received a phone call from someone claiming to be an employee who was out-of-state on an assignment. This person asked Nain whether his check had been deposited, and to verify that the check was written to a specific account name and bank routing number. This occurrence may be a type of attack known as a:
A. phishing attack.
B. pharming attack.
C. denial-of-service attack.
D. social-engineering attack.
The details of an e-commerce site order can be kept in memory, stored on the visitor's computer or stored on the Web server. This ability to remember the details of an order is known as:
A. profiling an order.
B. tracking an order.
C. persisting an order.
D. filling the shopping cart.
What is the name of the electronic funds transfer (EFT) system governed by the United States and designed to provide the clearing of electronic payments between banks?
A. The National Clearing House (NCH) network
B. The Automated Clearing House (ACH) network
C. The Receiving Depository Financial Institution (RDFI)
D. The Originating Depository Financial Institution (ODFI)
Which of the following is the most effective option for detecting a site attack by someone who wants to modify your customer database?
A. Implementing a firewall
B. Using antivirus software
C. Using an intrusion detection system
D. Limiting the open ports on the system
Marty included a banner ad for her online MP3 player store on a music download Web site. She found that 72 percent of users who visited the site via banner ad click through became customers. Which of the following is the term for this percentage?
A. Exposure rate
B. Purchase rate
C. Conversion rate
D. Clickthrough rate
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CIW exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 1D0-525 exam preparations and CIW certification application, do not hesitate to visit our Vcedump.com to find your solutions here.