v3.0 (1D0-525)

Page:    1 / 5   
Total 78 questions

Which of the following is often cited as an advantage of Microsoft Internet Information
Services (IIS)?

  • A. It runs as a server background process.
  • B. It is launched automatically with an HTTP request.
  • C. It is integrated into the Windows server environment.
  • D. It is free with every purchase of ASP and SQL Server.


Answer : C

Which of the following can help assure customers that the information they provide to you will remain private?

  • A. Create a data backup policy.
  • B. Post the company security policy.
  • C. Implement and post a privacy policy.
  • D. Provide an opt-out link for all e-mail sent to customers.


Answer : C

What is the result of an e-commerce HTTP server that processes the input queue at a rate equal to or greater than that of incoming requests?

  • A. A bottleneck occurs.
  • B. Network bandwidth decreases.
  • C. The server performs adequately.
  • D. The site visitor experiences a delay.


Answer : C

You want to configure a second Web site on a server. Which of the following most efficiently ensures that requests are properly processed by this second Web server for customers around the world?

  • A. A host header value
  • B. The server's hosts file
  • C. Secure Sockets Layer (SSL)
  • D. The hosts file on user systems


Answer : A

The goals for effective usability in an e-commerce site are to get customers to:

  • A. visit, learn and return.
  • B. find, learn and review.
  • C. visit, learn and purchase.
  • D. find, compare and revisit.


Answer : C

Which of the following are common methods for tracking customers in a referrer program?

  • A. Customer names, landing page hit counts, page redirections
  • B. Cookies, page redirections, specialized URLs with ID numbers
  • C. Cookies, Web server referrer agent log files, registered user names
  • D. Web browser tracking files, sales commission records, customer names


Answer : B

You need to enable SSL/TLS on a Web server for a virtual directory. You have just installed a signed digital certificate from a certificate authority. What is the next step you should take?

  • A. Place a copy of the certificate in the virtual directory as a hidden file.
  • B. Specify that you want to use the certificate to sign the virtual directory.
  • C. Specify that you want to use SSL/TLS for the Web server's virtual directory.
  • D. Place the digital certificate in the Trusted Root Certification Authorities store.


Answer : C

What is the single most important result of any marketing strategy?

  • A. Number of products sold
  • B. Dollars generated in sales
  • C. Return On Investment (ROI)
  • D. Cost of the marketing campaign


Answer : C

Which of the following security threats is reduced by a strong password policy?

  • A. Pharming attacks
  • B. Database tampering
  • C. Buffer overflow attacks
  • D. Denial-of-service attacks


Answer : B

The daily number of visitors to Cathy's site has increased by 600 percent and the current server configuration is beginning to drop requests. Cathy has decided to scale out the Web site by adding servers that will function as a server farm to host the company site. Adding servers in this way is known as:

  • A. cloning.
  • B. fail-over.
  • C. clustering.
  • D. scaling up.


Answer : C

Which of the following marketing models is characterized by a complementary venture between two or more companies that join together in production, distribution or marketing in order to achieve individual goals?

  • A. B2C market
  • B. Open market
  • C. Vertical market
  • D. Horizontal market


Answer : D

The details of an e-commerce site order can be kept in memory, stored on the visitor's computer or stored on the Web server. This ability to remember the details of an order is known as:

  • A. profiling an order.
  • B. tracking an order.
  • C. persisting an order.
  • D. filling the shopping cart.


Answer : C

Which of the following is the most efficient strategy for detecting an attack on your company's e-commerce site?

  • A. Conducting an audit
  • B. Reviewing system logs
  • C. Testing password strength
  • D. Teaching employees about social engineering


Answer : B

Which party in an electronic funds transfer uses the Automated Clearing House (ACH) network to clear funds?

  • A. The Web customer
  • B. The Web merchant
  • C. The Web merchant's bank
  • D. The Web customer's bank


Answer : C

Denying that a payment transaction took place is known as:

  • A. repudiation.
  • B. nonrepudiation.
  • C. poor data integrity.
  • D. negative authentication.


Answer : A

Page:    1 / 5   
Total 78 questions