q1) how is e-commerce defined questions(e-co…  · web viewas commerce conducted via the internet...

64
Q1) How is E-commerce defined? 1. As commerce conducted via the internet using credit cards for online payments. 2. As an integration of communications, data management, and security capabilities. 3. As a simple exchange of information about the sale of goods and services. 4. As online commerce that does not require authentication and non- repudiation Q2) What is the difference between business-to-business (B2B) and business-to-consumer (B2C) electronic commerce? 1. Business-to-business e-commerce uses only credit-card model for online payment merchandise costs and shipping fees 2. Business-to-consumer e-commerce is available only in the United States and its territories and possessions. 3. Business-to-business e-commerce is conducted between two companies; business-to-consumer between an individual and a company. 4. Business-to-business e-commerce is exempt from state taxes in all 50 U.S. states and most Canadian provinces. Q3) What are two advantages of e-commerce over traditional commerce? 1. Credit card numbers are easy to obtain over the Internet, and taxes will never be levied on Internet purchases. 2. Customs requirements do not affect international online purchases, and copyright law does not apply to the Internet. 3. Business transactions can be completed quickly, and new markets are easier to penetrate. 4. Credit card numbers are always secure, and no government restrictions affect online commerce. Q4) What are some differences between in-house solutions and instant storefronts? 1. Online storefronts allow the business owner complete control of the hardware and software; and instant storefronts are typically less expensive 2. Instant storefronts are typically less expensive; but such options require detailed knowledge of the computing infrastructure. 3. Instant storefronts usually cost less; in-house solutions typically offer more control to the business owner.

Upload: others

Post on 14-Jun-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

Q1) How is E-commerce defined? 1. As commerce conducted via the internet using credit cards for online payments. 2. As an integration of communications, data management, and security capabilities. 3. As a simple exchange of information about the sale of goods and services. 4. As online commerce that does not require authentication and non-repudiation

Q2) What is the difference between business-to-business (B2B) and business-to-consumer (B2C) electronic commerce?

1. Business-to-business e-commerce uses only credit-card model for online payment merchandise costs and shipping fees

2. Business-to-consumer e-commerce is available only in the United States and its territories and possessions.

3. Business-to-business e-commerce is conducted between two companies; business-to-consumer between an individual and a company.

4. Business-to-business e-commerce is exempt from state taxes in all 50 U.S. states and most Canadian provinces.

Q3) What are two advantages of e-commerce over traditional commerce? 1. Credit card numbers are easy to obtain over the Internet, and taxes will never be

levied on Internet purchases. 2. Customs requirements do not affect international online purchases, and copyright

law does not apply to the Internet. 3. Business transactions can be completed quickly, and new markets are easier to

penetrate. 4. Credit card numbers are always secure, and no government restrictions affect

online commerce.

Q4) What are some differences between in-house solutions and instant storefronts? 1. Online storefronts allow the business owner complete control of the hardware

and software; and instant storefronts are typically less expensive 2. Instant storefronts are typically less expensive; but such options require detailed

knowledge of the computing infrastructure. 3. Instant storefronts usually cost less; in-house solutions typically offer more

control to the business owner. 4. Online storefronts require the business owner to buy, develop, and implement an

e-commerce software package; instant storefront are typically more expensive.

Q5) What mechanism can help provide security for online transactions ? 1. An order number. 2. Secure Sockets Layer 3. A database management system. 4. E-cash

Q6) What are the two branches of intellectual property? (Choose 2) 1. Copyright 2. Trademark

Page 2: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

3. Patent 4. Industrial Property 5. Tarrifs 6. Customs 7. Copyrighted Material

Q7) What three types of work are protected by copyright? 1. Literary works, artistic works, and audiovisual works 2. Inventions, literary works, and audiovisual works 3. Inventions, industrial designs and photographic works. 4. Inventions, industrial designs, and literary works

Q8) Who would own the copyright on an e-mail message sent over the internet? 1. ISP 2. Recipient or addressee 3. Original author 4. Original authors employer

Q9) What parts of a software program are typically protected by patent? 1. Algorithms and techniques 2. Usually the entire program 3. Algorithms and databases 4. Scrolling and display functions

Q10) What are the two major branches of intellectual property? 1. Trademark and patent 2. Trademark and copyright 3. Industrial property and copyright 4. Service mark and trademark

Q11) Under U.S. law, how can taxes be levied on online purchases? 1. Only on those that occur within a single state. 2. Only those that are paid for by credit card. 3. Only those that occur between two states 4. Only on international transactions

Q12) How can an existing business improve customer service with an online presence? 1. By automating a tracking and order status system. 2. By closing all its physical locations and operating online only. 3. By doubling or tripling its product offering in a short time. 4. By eliminating its toll-free customer support number in favor of an online form.

Q13) How can online promotion function as a marketing strategy? 1. By attracting non-Internet users to the online business. 2. By providing targeted marketing to selected customers. 3. By placing appropriate data with several search engines.

Page 3: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

4. By directing a message to people who already use the Internet.

Q14) In what way can electronic data interchange help an online business grow? 1. By allowing businesses to exchange data electronically with customers and other

businesses 2. By eliminating the need for business to operate in physical locations. 3. By offering e-commerce software packages at little or no cost. 4. By offering improved hardware with increased bandwidth and faster access.

Q15) What is the chief difference between hard goods and soft goods for sale online? 1. Sales tax is always charged on the sale of hard goods. 2. Soft goods may be delivered to the customer electronically. 3. Only hard goods may be marketed and sold online. 4. Soft goods are always more successful in online sales.

Q16) How could a seller of very inexpensive or very expensive merchandise use the web for marketing?

1. By using a promotional site to drive traffic to its retail stores. 2. By never changing its prices for any goods sold online. 3. By promising interstate customers they need not pay sales tax. 4. By promising customers that the merchandise is of high quality.

Q17) What is the difference between a global market and a niche market? 1. A global market has a very narrow appeal, a niche market is more universal. 2. A global market guartees that customers in all countries will understand and

appreciate the product. 3. A niche market is one in which product offerings should be very upscale and

expensive. 4. A global market has a very wide appeal; whereas niche market aims at a

narrowly selected group of people.

Q18) How do customer demographics help online marketers? 1. By providing information about low-cost shipping options. 2. By providing detailed information about the customer base. 3. By providing detailed information about vendors and suppliers 4. By categorizing information about customs requirements.

Q19) At which one of the following points during a transaction can an E-commerce site charge a credit card?

1. When a receipt is sent out with a future ship date 2. When authorization is received 3. When the shipping address is confirmed 4. When the product is shipped 5. When the card number is received

Page 4: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

Q20) Which one of the following is described by this statement: "a series of veins and arteries moving product from source to consumer"?

1. Supply Chains 2. Nexus of Business 3. Transaction Systems 4. Personalization 5. Data Warehousing

Q21) Which one of the following statements about Cookies is TRUE? 1. Created by the Operating System and stored on the client-side. 2. Created on the client and stored on the server-side 3. Created by the Operating System and stored on the server-side. 4. Created on the server and stored on the server. 5. Created on the client or the server and stored on the client-side.

Q22) An online library wants to charge users as they print pages of online virtual reference materials, to simulate the experience of photocopying pages in an actual library.Which one of the following is an emerging technology that would work in the above situation?

1. Universal Logins 2. Wireless Transactions 3. Digital Cash 4. Micropayments 5. Smart Cards

Q23) What is the maximum level of encryption available for export to countries outside the U.S.?

1. 32 bit 2. 40 bit 3. 56 bit 4. 128 bit 5. 168 bit

Q24) Online retailers want to prevent users from using coupons over and over and potentially racking up fraudulent charges.Based on the above scenario, which one of the following combinations of anti-fraud measures provide the strongest security against coupon abuse?

1. Storing IP Addresses with used coupons 2. Associating e-mail addresses with used coupons 3. Associating credit card numbers and e-mails with used coupons 4. Putting the coupon in the URL, e-mails in a cookie 5. Storing their IP address on the server, storing the credit card information with it

Q25) When an E-Commerce site is designed using 3-tier architecture, which of the following describes the three tiers?

1. Firewall, Business Logic, Data

Page 5: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

2. Presentation, Firewall, Business Logic 3. Database, Security, Firewall 4. Presentation, Business Logic, Data 5. Browser, Firewall, Data

Q26) What level of SSL Encryption is often REQUIRED by corporations in financial transactions in the U.S.?

1. 32 bit 2. 40 bit 3. 56 bit 4. 64 bit 5. 128 bit

Q27) A bank wants to give a customer secure access to the bank's servers. The bank wants a secure method that doesn't require a password.Based on the above scenario, with which one of the following will the the bank provide the customer?

1. A CA Certificate 2. A Client Certificate 3. A S/MIME Certificate 4. A Server Certificate 5. An Object-signing Certificate

Q28) A Retail E-Commerce site has multiple Web servers. A hacker attacks the site.Based on the above scenario, which of the following is NOT a hacker technique?

1. Buffer Over-runs 2. Denial of Service (DoS) 3. Port Scans 4. IP Spoofing 5. POP3/SMTP

Q29) For which one of the following can CGI be used? 1. Generate HTML dynamically on the client-side 2. Write Java Applets and Applications 3. Create custom Flash animations 4. Generate HTML dynamically on the server-side 5. Directly manage and rollback database transactions

Q30) You receive an e-mail that says if you visit pamazon.com and enter the code "BIGSAVINGS" during the purchase process, you will receive $1 off your purchase. This $1 off will only apply to your first purchase, and can't be used again.The above is an example of which one of the following?

1. A Cookie 2. SSL Security Certificate 3. Gift Certificate 4. Digital Cash 5. Electronic Coupon

Page 6: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

Q31) In which one of the following languages are most CGI programs written? 1. Haskell 2. Java 3. Visual Basic 4. Perl 5. SQL

Q32) A Retail E-Commerce Site has multiple Web Servers. When a page request comes in from a Web Browser, an "appliance" decides which Web Server should handle the request.Which one of the following describes the above example?

1. Software Load Balancing 2. Hardware Load Balancing 3. Software Firewalls 4. Hardware Firewalls 5. Proxy Servers

Q33) In which one of the following locations is the "money" actually stored when using a Smart Card?

1. In the Smart Card company's bank account 2. In the magnetic strip on the card 3. In an encrypted chip on the card 4. In the associated bank in a special account 5. On the Smart Card company's server

Q34) Which one of the following would NOT be an advantage of operating an online store front?

1. Low cost of sales compared to traditional retail outlets 2. International sales presence 3. Dramatically increased customer base 4. No advertising expense involved 5. Low overhead

Q35) Which one of the following is absolutely fundamental to any non-Web-based Distribution System?

1. Database 2. Web server 3. Network Router 4. Firewall 5. Certificate Server

Q36) Which one of the following methods of user authentication keeps the user's password the most secure during transport?

1. Basic Clear Text 2. Forms-Based Authentication 3. Digest Authentication 4. NTLM

Page 7: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

5. Basic Clear Text over SSL

Q37) Many E-commerce sites feature recommendations for products based upon other users who have similar interests. What is this type of referral system called?

1. Collaborative Filtering 2. Customer Acquisition Costing 3. Order caching 4. List Retention 5. Cookies

Q38) Which one of the following must XML do to be both "well-formed" and "valid" when used in business to business applications?

1. Be transported using Secure Sockets Layer (SSL) over HTTP 2. Come out of a database or data warehouse 3. Be sent to an XML-enabled web browser 4. Be associated with a Document Type Definition (DTD) 5. Be embedded in HTML.

Q39) Which one of the following is NOT a benefit of designing using a Three Tier Architecture ?

1. Each server within the server farm can be optimized for a specific functionality 2. Because code is compiled rather than scripted a significant performance increase

is gained. 3. Designing a Three Tier System takes less planning. 4. The load is distributed across multiple processors offering increased scalability. 5. None of the above is a benefit

Q40) You search a typical E-commerce site for "Palm V" making sure to include the "quotes".Which of the following products would match the results of the above search?

1. PalmPilot 2. Palm III 3. Palm IIIe 4. Palm V 5. Palm VII

Q41) E-Commerce sites use cookies to store information safely on the user's machine.Based on the above, where do the cookies reside during an HTTP Request to the Web Server?

1. In the Body of the HTTP Message 2. They never leave the browser 3. They are sent in a separate HTTP Request 4. In the HTTP Headers 5. Encoded In the URL sent to the Web server

Q42) Which one of the following describes an exercise where large electronic storefronts simulate a large number of users hitting their sites?

Page 8: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

1. Load Testing 2. Regression Testing 3. Denial of Service (DoS) 4. Load Balancing 5. SPAM

Q43) In which of the following situations can encrypted Credit Card Numbers be sent securely via e-mail?

1. When the message is sent in HTML 2. When the message is sent in Rich Text 3. When the message is sent using PGP 4. When the message is MIME encoded 5. When the message is Base64 encoded

Q44) An E-business vendor extranet wants to run a three-for-one product promotion, with very specific rules and restrictions on who and when products can be purchased.Based on the above scenario, in which one of the following areas in the system architecture would this business problem be addressed?

1. The upper-end 2. The client-side 3. The middle-tier 4. The router 5. The front-end

Q45) Which one of the following is an advantage of using XML over EDI for Business to Business E-Commerce?

1. XML is used by more banks than EDI. 2. XML uses plain text and is easy to use. 3. XML fits more data into the same space than EDI 4. XML is highly secure and encrypted. 5. XML is much more common than EDI.

Q46)Which one of the following choices contains all Server-Side programming methods? 1. ASP, CGI, Perl 2. HTTP, FTP, Telnet 3. DNS, WINS, TCP/IP 4. JavaScript, VBScript, DHTML 5. SSL, SEL, DES

Q47) A company has a considerable investment in existing business logic components. They want a solution that lets them leverage as much of this logic as possible.Based on the above scenario, which one of the following does ASP (Active Server Pages) allow them to do?

1. Call CGI Applications from other servers 2. Call in-process COM Objects 3. Interface to Enterprise Java Beans

Page 9: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

4. Create non-reusable Components 5. Call COM Objects from other servers

Q48) Which one of the following describes the way in which EDI is used in E-Commerce and E-Business?

1. Encrypt passwords sent from the browser to the server. 2. Exchange data between financial systems. 3. Send credit card information from the browser to the Web Server. 4. Calculate local and state Taxes for Invoicing Systems. 5. Store credit card numbers securely on disk.

Q49) You're designing an E-Commerce Web site that sells to consumers. You need a unique identifier to assign to each visitor, so their activities can be tracked.Based on the above scenario, which one of the following choices is a secure and reliable way do this?

1. Ask them for their First and Last Name, and store it in the database. 2. Keep their IP Address in the Web Server's memory. 3. Put their email address in a cookie. 4. Give them a cookie with a Unique ID, then store it in a database. 5. Store their IP Address in a Database

Q50) Which one of the following initiatives started by Microsoft was created to ensure a consistent adoption of XML to enable electronic commerce and application integration?

1. Super XML 2. EDI 3. X-HTML 4. Biztalk 5. Business to Business

Q51) A Retail E-Commerce site has multiple Web Servers. When a page request comes in from a Web Browser, the Web Servers "vote" between each other over which Web Server should handle the request.Which one of the following describes the above situation?

1. Proxy Servers 2. Hardware Load Balancing 3. Software Load Balancing 4. Hardware Firewalls 5. Software Firewalls

Q52) Which one of the following is a "LUHN" check used for? 1. Calculate state and local taxes 2. Perform sophisticated fraud detection checks 3. Calculate shipping costs 4. Send card numbers to the server

Q53) Which one of the following is NOT a valid means of optimizing performance? 1. Caching commonly used data.

Page 10: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

2. Closing database connections as soon as they are no longer needed. 3. Storing common data in Application level variables. 4. Use global variables wherever possible rather than local variables. 5. None

Q54) When you have pressed "Commit Order," in which one of the following ways is your personal information sent while purchasing over a Secure Connection?

1. As a cookie 2. Encoded in the URL 3. In the HTTP POST 4. Hidden Form Variables 5. In an HTTP GET

Q55) EDI, XML, and BizTalk are all examples of which one of the following types of technology?

1. Web browser 2. Web server 3. Business to Consumer 4. Business to Business 5. Programming Languages

Q56) When viewing a site securely, where does the SSL protocol run in relation to TCP/IP, HTTP and the Browser?

1. SSL -> TCP/IP -> HTTP -> Browser 2. TCP/IP -> SSL -> HTTP -> Browser 3. HTTP -> TCP/IP -> SSL -> Browser 4. Browser -> HTTP -> SSL -> TCP/IP 5. TCP/IP -> HTTP -> SSL -> Browser

Q57) A clearance and closeout auto parts site can't afford to over sell products. If they get only 20 carburetors in, and accidentally sell 25, they have a customer service issue to deal with. Often many consumers are vying simultaneously to purchase limited quantities of the same product.Based on the above scenario, at which one of the following points in the purchase process must they check for available inventory to ensure they do not oversell?

1. When the consumer enters their shipping information 2. When the consumer enters their credit card number 3. When the consumer views the product detail page 4. When the consumer presses "Commit Order" 5. When the consumer enters their zip code

Q58) Which one of the following is NOT an E-commerce purchasing component or system?

1. VeriSign 2. Icsign 3. Cyberdollar 4. CyberCash

Page 11: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

5. IBill

Q59) Online and offline storefront packages that allow for the conversion of order information into comma-delimited file formats specifically apply to what potential feature of the package?

1. A price delimiter 2. A database exporter 3. A database administrator 4. A database manager

Q60) Janice was visiting an e-commerce site looking for a new book. She viewed several pages she did not need to see, none of which contained information on books. What is the problem with the e-commerce site she visited?

1. The hyperlinks are not properly organized 2. The hyperlinks were broken. 3. The catalog was poorly designed. 4. The catalog data is not properly organized

Q61) Sam owns a small hardware store and wants to open an e-commerce site to broaden his customer base. He is concerned about costs included in the transfer of funds at the end of the transaction. What monetary solution should he implement to avoid transaction costs?

1. Credit cards 2. Digital cash 3. Electronic cash 4. Digital cards

Q62) An electronic commerce storefront package that would allow transaction of business form information, e-mail information, and template downloads will probably be dealing with what type of transactions?

1. IDE 2. EDI 3. EDO 4. ADO

Q63) Which of the following choices defines a scenario in which a customer service representative can actually control a user's screen during a live session?

1. Synchronous service 2. Asynchronous service 3. IRC 4. Co-Browsing

Q64) When would a site not need to provide shopping carts? 1. When the users provides credit card information before making their selections 2. When the site collects a single fee for annual service. 3. When the user is a return customer

Page 12: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

4. When the user is only buying one item

Q65) You buy a new DVD player, then fill out and send in the registration card. When the manufacturer receives your information, its staff puts your information into a database. What will probably happen, if this merchant does not practice confidentiality?

1. Your DVD player will not be functional until the company fully processes your information

2. Your information will remain confidential. 3. You will receive offers only from that vendor. 4. You could receive offers from many companies.

Q66) A Web server software package must support which of the following choices for the server to collect or deliver personal or confidential data

1. SSL 2. ISDN 3. T1 4. DSL

Q67) In the legacy system integration stage, back-end databases are usually linked to the Web by using what technology?

1. Browser-based front-end ADO applications. 2. Browser-based front-end IDE applications. 3. Browser-based front-end TCP/IP applications 4. Browser-based front-end GUI applications

Q68) Jim's business is developing a Web page so he can reach customers worldwide. Traditionally his business has been able to authenticate a sale with personal information over the phone. To be able to perform authentication via the Internet, one option would be to implement

1. Many firewalls 2. Nothing, you cannot authenticate a sale over the Internet 3. Encryption frameworks and digital signatures 4. A credit bureau in his store

Q69) Anti-circumvention, CMI protection, limitations on service provider liability, and webcasting rules and regulations are part of what act?

1. NET 2. Internet Freedom Act 3. Berne 4. DMCA

Q70) Online advertising that has some form of functionality that allows the user to obtain video or sound objects, or interact with the ad by providing or choosing information is called __?__

1. Rich media 2. Real media

Page 13: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

3. In-line ads 4. Pop-up ads

Q71) A small subdivision of a large market demographic is considered __?__ 1. Males 2. Residents of the US 3. A niche 4. A subsegment

Q72) An automated program that goes from page to page and link to link on the internet for the purpose of cataloging information for use in search engines is called __?___

1. Robots 2. Crawlers 3. Accessibility checkers 4. Validators 5. Spiders

Q73) How will you communicate with customers during each interaction in a way that reinforces your unique company image?

1. Follow-up phone calls 2. Sweepstakes 3. Requiring logins 4. Branding

Q74) Which of the following amends copyright law to include gain other than financial? 1. DMCA 2. NET 3. Internet Tax Freedom Act 4. Nexus

Q75) __?__ is where you have a presence doing business. In the US, you have to collect, report, and pay taxes in states where you have __?__

1. Website 2. Internet account 3. Nexus 4. Liability

Q76) Windows, other than the main browser window, that open when a client views a website?

1. Launch menus 2. Option boxes 3. Property inspectors 4. Pop-up ads

Page 14: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

Q77) __?__ is the use of computers rather than the traditional print mechanism to distribute information. This can include public bulletin boards, artistic representations, newsgroups, and sending others' material.

1. Electric Publishing 2. Electronic Publishing 3. Electric Publication 4. Electronic Privacy

Q78) The percentage of times an ad is clicked on based on the number of times it's viewed is called __?__

1. Hits 2. Impressions 3. CPM 4. CTR

Q79) __?__means that it is illegal to manufacture or import encryption or anti-scrambling.

1. Anti-circumvention 2. Nexus 3. NET 4. WIPO

Q80) MOTO/CNP means that a face-to-face credit card transaction is taking place? 1. True 2. False

Q81) The science of encrypting and decrypting plaintext messages is called __?__ 1. Encryption 2. Cryptography 3. Cryptanalysis 4. Algorithm keys

Q82) Transactions charged to your telephone bill are called __?__ 1. Credit card payments 2. Virtual pin payments 3. E-charge payments 4. Internet-bill payments

Q83) What are some of the most common mistakes when developing an e-commerce site?

1. Addition of shopping cart before site is ready 2. Oversized or too many image files 3. Dead links 4. Lack of a contracted shipper

Page 15: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

Q84) If a web server delivers a web page with four images, how many hits will the server record?

1. 4 2. 1 3. 0 4. 5 5. 2

Q85) Unsolicited bulk electronic mail is most often called __?__ 1. Spam 2. Targeted 3. Opt-in 4. Symmetric

Q86) __?__ is a way in which members of a population are differentiated by action, moods, opinions, and identity.

1. Audience data 2. Demographics 3. Psychographics 4. Usability studies

Q87) The science of recovering plaintext messages without knowing the key is called __?__

1. De-encryption 2. Cryptography 3. Hacking 4. Cryptanalysis

Q88) Gary is explaning to his manager how a SET order-prosessing system runs. He discusses the steps from the time that the order is placed until it reaches the merchant.What is the next step that Gary must explain?

1. The merchant generates an authorisation request and sends it to the bank, encrypted with the merchant's public key.

2. The merchant generates an authorization request and sends it to the customer, encrypted with the merchant's public key.

3. The merchant generates an authorization request and sends it to the bank, encrypted with the bank's public key.

4. The merchant generates an authorization request and sends it to the customer, encrypted with the customer's public key.

Q89) What does the 1976 Copyright Act, Section 103 add copyright protection for? 1. Analog recordings 2. Software 3. Digital photography 4. e-mail

Page 16: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

Q90) What is the advantage of using public key encryption? 1. Faster than private key encryption 2. A secure line is not required 3. The most secure encryption 4. All of the above

Q91) What is the term for a temporary partnership of companies or individuals? 1. Value Added Network 2. Virtual Private Network 3. Virtual Enterprise 4. Value Network Plan

Q92) What are the two types of Verisign Certificates? 1. Level One and Two 2. Level A and B 3. Customer and Merchant 4. Level Basic and Level Advanced

Q93) What can a log file NOT show? 1. What site users came from 2. How often a user returns to the site 3. How users navigate around the site 4. What users downloaded at the previous site

Q94) Which is not a goal of EDI? 1. To enable communication of structured information 2. To increase cash flow 3. To accommodate consumer demand 4. To reduce redundant data entry errors

Q95) What are the three main requirements of a Site Administrator? 1. Network administration, site design and usability testing 2. Maintenance of site and contents, security and monitoring performance 3. Content updates, server maintenance and network performance 4. Site design, implementation and maintenance

Q96) What is a payment gateway? 1. An online component that processes a credit-card transaction to validate the

account number and commerce transfer of funds. 2. An electronic wallet that holds electronic cash and a point-of-sale module. 3. A point-of-sale module that integrates with the web site, the merchant's wallet,

and that holds electronic cash and a point-of-sale module. 4. A credit-card company that accepts or denies online transaction payments based

on available funds.

Q97) What does the No Electronic Theft Act (NET) do?

Page 17: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

1. amends patent law to include domain name theft 2. amends copyright law to include non-monetary financial gain. 3. amends criminal law to make electronic theft of greater than $10,000 a felony 4. amends copyright law to impugn embezzlement from software companies

Q98) Which standardized transaction format involves the process of a selling organization transmitting an order request back to a buying organization's purchasing server for approval and/or additional information?

1. OTP 2. OBI 3. EDI 4. OBP

Q99) What is it called when space in a queue runs out? 1. timed out error 2. log error 3. 404 error 4. bottleneck

Q100) Which encryption implementation uses two 56-bit keys? 1. IDEA 2. SHA 3. RC5 4. Triple DES

Q101) Which aspect of Intellectual Property does the PTO NOT govern? 1. Copyright 2. Industrial designs 3. Trademarks 4. International Protection

Q102) What is the approximate current volume of B2B web commerce business? 1. Over 100 Million 2. Over 1 Billion 3. Over 100 Billion 4. Over One Trillion

Q103) Which is a form of asynchronous service? 1. Email 2. Co-browsing 3. Knowledge database 4. Dial-up service

Q104) Which of the following is true about S/MIME? 1. Uses enveloping 2. Required a VPN

Page 18: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

3. Uses only symmetric key encryption 4. Does not use session keys

Q105) What price-level items are most suited for online sales? 1. very low price items 2. mid-price items 3. high price items 4. All of the above

Q106) What did the IITF publish as part of it's recommendations in the area of electronic publishing?

1. The Millennium Copyright Act 2. The Digital Rights Treatise 3. Internet Tax Freedom Paper 4. The Green Paper

Q107) In the SET transaction process, where is consumer credit card information most vulnerable?

1. Over the phone line to the ISP 2. Travelling across the internet backbone 3. The database server holding the card info 4. In cookies

Q108) Which is a disadvantage of using asynchronous e-service? 1. often not timely enough 2. learning curve involved 3. often difficult to implement 4. All of the above

Q109) What is an instant online storefront solution disadvantage? 1. Upgrade issues 2. Long project cycle 3. No control over site navigation 4. Cannot use dynamic product descriptions

Q110) Which encryption implementation that uses a single 56-bit key? 1. DES 2. Triple DES 3. Skipjack 4. RC2

Q111) The number of times users click a banner ad 1. Impressions 2. Page Views 3. Ad Clicks 4. Unique users

Page 19: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

Q112) A sequence of requests made by one user at one site 1. Page views 2. CPM 3. Visits 4. Impressions

Q113) Which of the following is not an example of Audience Data? 1. Demographics 2. Psychographics 3. Impressions 4. Survey Data

Q114) In SQL Server, what is one of the database parameters a user must initially set up? 1. The initial size in MB 2. The transaction log initial size in MB 3. The database name 4. All of the above

Q115) IIS requires Microsoft transaction server for what? 1. Setting up a merchant account 2. Processing a transaction 3. Implementing a payment gateway 4. a and c only

Q116) What is the term under intellectual property that is defined by distinctive words, letters numbers, drawings, pictures, containers or packaging

1. Trademark 2. Invention 3. Servicemark 4. a and c only

Q117) Active Server Pages use what technology? 1. Server-side scripting & components 2. Client-side scripting & objects 3. HTML 4. All of the above

Q118) This measures the dollar amount per thousand clicks 1. Clickthrough 2. Ad Clicks 3. CPM 4. none of the above

Q119) What is an instant offline storefront solution advantage? 1. Easily integrated into current system 2. Product changes can be easily made

Page 20: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

3. Can be managed from anywhere 4. Inexpensive

Q120) Service metrics involved the measuring of what? 1. Speed, availability and consistency 2. Downloads, traffic and customer feedback 3. Customer feedback, supplier feedback and internal feedback 4. Bandwidth, file size and error logs

Q121) What is true about the digital signature process? 1. decryption failures prove nothing 2. the process is computationally intensive 3. It is inexpensive to implement 4. none of the above

Q122) What is the disadvantage of the process of checking for certificate revocation? 1. can delay e-commerce servers 2. not always accurate verification 3. process takes several days 4. checking revocation is expensive

Q123) What is the default client-server arrangement in SSL? 1. The server always authenticates the client and the client may optionally

authenticate the server 2. The client always authenticates the server and the server may optionally

authenticate the client 3. The client and the server must always authenticate each other 4. The client and the server may both optionally authenticate each other

Q124) What is NOT an element required of the certificate standard? 1. Serial Number 2. Public Key Information 3. Private Key information 4. Issuer name

Q125) EDI is ideal for what kind of business conditions? (choose two) 1. small volume 2. high productivity 3. tight margins 4. non-repetitive varied transactions

Q126) What kinds of materials are NOT covered by copyright? 1. Newsgroup postings 2. Photographs 3. Software and Audiovisual Work 4. Parodies and Jokes

Page 21: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

Q127) Which of the following is NOT true of Microsoft's Internet Information Server (IIS 4.0)?

1. Runs only on NT 2. Works with NT security structure 3. Requires SQL Server 4. Has the familiar Microsoft interface

Q128) What is a standard full banner size? 1. 5" x 2 " 2. 468 x 60 3. 200 x 200 4. 235 x 100

Q129) What does CASIE stand for? 1. Coalition for Advertising Supported Information and Entertainment 2. Community of Artists Selling Internet Entertainment 3. Creative Artists Society for Internet Entertainment 4. Corporation for Agencies Supporting Information and Electronics

Q130) What two functions does SSL provide? 1. SET and STT 2. integrity and standards 3. security and reliability 4. security and certificates

Q131) What is the EDI unit of transmission that contains a header, string of data elements and trailer called?

1. EDI Code 2. Transaction set 3. Data segment 4. Message Digest

Q132) What issues does the Internet Tax Freedom Act (ITFA) of 1998 address? 1. New tax liabilities and new tariffs 2. Tax incentives and anti-circumvention 3. Site "property" taxes and bit taxes 4. A tax moratorium and free trade issues

Q133) Which encryption implementation uses a 128-bit key? 1. IDEA 2. RC5 3. MD5 4. DES

Q134) SSL operates at what layer of the OSI? 1. Network

Page 22: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

2. Application 3. Data 4. Transport

Q135) Individual pages at an IIS site are designated as requiring a secure channel through what means?

1. IIS Console > Properties > File Security Tab 2. Site Server Console > SSL Options > Enable certificate 3. IIS Console > MMC > Properties 4. MMC > Site Server Console > IIS

Q136) What is NOT a main feature of a publisher site? 1. Sell advertising 2. A lot of site content 3. Few links outside site 4. Repeat visits high priority

Q137) Why would a certificate be revoked? 1. private key compromised 2. service no longer valid 3. Certificate Authority compromised 4. all of the above

Q138) What is an instant online storefront solution advantage? 1. Can be managed from anywhere 2. Allow the use of a preferred FQDN 3. Easy maintenance 4. all of the above

Q139) Which of the following is most likely used for Business to Consumer transactions? 1. EDI 2. OBI 3. OPX 4. OTP

Q140) RPC complies with what specifications? (choose two) 1. ISO 2. ANSI 3. OSF 4. DCE

Q141) What is the difference between Marketing & Promotion? 1. Marketing is the advertising and promotion is the giveaways 2. Marketing is the visual image and promotion is the written message 3. Marketing is the message and promotion is the vehicle 4. Marketing is the communication and promotion is the advertising

Page 23: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

Q142) What organization handles domain name trademark claims? 1. W3C 2. InterNIC 3. IETF 4. IITF

Q143) What is the most important patent law treaty? 1. The National Commission for the Protection of Intellectual Property 2. The International Agreement for the Protection of Copyright 3. International Convention for the Protection of Industrial Property 4. The Global Alliance for Intellectual Property

Q144) What allows EDI to be sent securely over unsecured lines? 1. S/MIME 2. VPN 3. IDEA 4. XML

Q145) How can a referrer program be measured? 1. Page redirections, cookies and log files 2. Plug-ins, caching and cookies 3. Caching, cookies and impressions 4. Log files, plug-ins and special URLs

Q146) What is a sequence of requests for services from one or more servers? 1. a bottleneck 2. a queue 3. an RPC 4. a cache

Q147) Which encryption implementation that uses an 80-bit key? 1. Blowfish 2. Skipjack 3. DES 4. RC2

Q148) Which encryption implementation results in a 160-bit message digest? 1. MD5 2. RC4 3. Skipjack 4. SHA

Q149) The number of different users who visit a site within a specific time period 1. Clickthrough 2. Unique users 3. Users per hour

Page 24: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

4. Visits

Q150) What is true of using a third-party tracking service vs. reviewing web server logs? 1. Third-party tracking services are more powerful than reviewing server logs 2. Traffic can only be examined by third-party tracking services 3. Third-party tracking services are less powerful than reviewing server logs 4. Traffic can only be accurately examined by server logs

Q151) What is the difference between Banner Exchanges and Referrer Programs

1. Referrer program promotion is more niche targeted 2. Banner exchanges require tracking 3. Banner exchanges are more expensive 4. Referrer program traffic is directed in one direction

Q152) What feature best serves the security purpose of non-repudiation? 1. Digital signatures 2. ACL 3. Message digests 4. None of the above

Q153) What are the steps to implement an online transaction payment process 1. Prepare the server and web site, set up an online merchant account and then

install payment software 2. Set up an SSL account, install a payment server and then install payment software 3. Prepare the server, install a credit card processor and then install a digital wallet 4. Install a payment server, set up an SSL account and then install a digital wallet

Q154) In conducting usability analysis, what is NOT a test result analysis guideline? 1. a second usability test is required 2. address commonly reported issues first 3. address secondary issues if possible / feasible 4. find commonly reported issues

Q155) Which is a well-known hash algorithm? 1. RSA 2. SHA 3. IDEA 4. DES

Q156) Which of the following is not an example of Online Promotion? 1. Banner ads 2. Search engine placement 3. Spam email 4. New site logo design

Page 25: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

Q157) Which of the following is NOT a soft good? 1. software 2. books 3. music 4. news

Q158) What is the first document called that a web server refers to when it receives a non-specific request?

1. default directory 2. home URL 3. index page 4. default document

Q159) What cryptographic technique is used by Verisign for digital IDs? 1. RSA 40-bit 2. Hashing 3. RSA 1024-bit 4. Skipjack

Q160) What feature serves the security purpose of access control? 1. Usernames 2. Passwords 3. ACL 4. All of the above

Q161) How do HTML Meta tags help site visibility? 1. Search index placement 2. Add a custom banner to site 3. Used by search engine crawlers 4. Required for log files

Q162) What administrative features might be part of a knowledge base? 1. Allowing for status, approval and assignment variables 2. Assigning all users questions to the same department 3. Discarding answers after they have been sent to the user 4. Deleting user feedback after the answer has been sent

Q163) Which of the following is true of the digital cash model? 1. requires back-end processing 2. customer anonymity 3. standard software not required 4. merchant needs no point of sale module

Q164) What is ODBC? 1. A an open standard database management system that is designed for all

operating systems

Page 26: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

2. An open standard that database manufacturers follow so that other applications can communicate with the database

3. A Microsoft database communication device to facilitate a database server 4. None of the above

Q165) What law governs privacy & confidentiality on the internet? 1. Lanham Act 2. The Digital Millennium Privacy Act 3. No Electronic Theft Act 4. There are no laws governing privacy &

confidentiality

Q166) What affects some site tracking features? 1. whether a browser is Java enabled 2. browser caching 3. plug-in support 4. client side scripting

Q167) What is the main disadvantages of Electronic Publishing 1. More expensive than traditional publishing 2. Intellectual property rights more easily violated 3. More time consuming than traditional publishing 4. All of the above

Q168) What browser feature assists log file functioning and analysis? 1. impressions 2. a plug-in 3. cookies 4. none of the above

Q169) S/MIME allows for what security services? 1. Authentication 2. Encryption 3. Privacy 4. All of the above

Q170) What benefit does hashing provide? 1. It requires no secure channel for safe transmission. 2. It compresses long messages into short message digests. 3. It allows for identification and authentication of users. 4. It provides a secure channel for symmetric encryption.

Q171) Which of the following is not a hard good? 1. computer parts 2. cell phones 3. books on tape

Page 27: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

4. online banking

Q172) Which of the following has the potential for XML functionality? 1. OTP 2. OBI 3. EDI 4. all of the above

Q173) Where would a user find the ODBC function? 1. Site Server 2. Control Panel 3. Microsoft Management Console 4. Microsoft Front Page

Q174) Which of the following is true of the ACH model? 1. ACH is batch oriented 2. ACH network has direct contact with public customers and merchants 3. ACH is real-time 4. ACH is implemented globally

Q175) Which of the following has the potential to be both a benefit and a risk for the web storefront?

1. new market entry 2. instant worldwide availability 3. market analysis 4. intellectual property

Q176) Which encryption implementation results in a 128-bit message digest? 1. IDEA 2. MD5 3. Blowfish 4. SHA

Q177) What security feature best serves the purpose of data confidentiality? 1. Usernames 2. ACL 3. Encryption 4. Message digests

Q178) Which is NOT a certificate type? 1. Server certificate 2. Personal Certificate 3. Software Certificate 4. One-Way Certificate

Page 28: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

Q179) Instead of investing in stand-alone Business-to-Business infrastructure, some companies utilize what?

1. VPN 2. Business-to-Business Networks 3. OBI 4. OPX

Q180) Which is NOT a site traffic review method? 1. Log file analysis software 2. Traffic tracking software 3. Referrer site method 4. Performance testing

Q181) This measures the dollar amount per user click 1. CPC 2. Ad Clicks 3. CPM 4. none of the above

Q182) Which payment model provides the most immediate transfer of funds? 1. Cash 2. Credit 3. Debit 4. Check

Q183) Software Patents cover what? (choose two) 1. Algorithms 2. The whole program 3. Scrolling and display functions 4. Techniques

Q184) The number of times user requests a page containing a particular ad 1. Page views 2. Unique users 3. Visits 4. all of the above

Q185) What component of Site Server Commerce Edition creates generic names and images for an online web site?

1. The Site Administration Panel 2. The Site Foundation Wizard 3. The Site Manager 4. The Default.asp page

Q186) Which is not a step in the phased approach to implementing a web storefront? 1. Implement a full transactional web site

Page 29: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

2. Create an information only web site 3. Use online promotions to enhance visibility 4. integrating the legacy system into the storefront operation

Q187) The number of times banner is downloaded 1. Clickthrough 2. Page views 3. Visits 4. Impressions

Q188) What document created by Verisign sets theperformance standards for certifying authorities?

1. Certificate Authority Requirements 2. Certified Standard Policies 3. Common Policy Standard 4. Certification Practice Statement

Q189) What is NOT a main feature of a marketer site? 1. sell advertising 2. sell products 3. few links outside site 4. sell services

Q190) What is a web farm? 1. A site serving multiple sites 2. ISP serving multiple web sites 3. A network serving multiple domains 4. None of the Above

Q191) What does an RPC allow servers to do? 1. Access a dedicated network 2. Communicate across a dedicated network 3. Communicate only outside of a dedicated network 4. Limit distributed applications from colliding

Q192) What is a message digest? 1. A specific application of one-way function; it is stored in the message itself. 2. An algorithm applied with the encryption key on a plaintext message to produce

ciphertext. 3. The de facto standard for public-key cryptographic systems. 4. A type of encryption that requires both participants to have a single secret key.

Q193) Name three shortcomings of certificates? 1. Not enough certificate authorities, too much information and certificate lending

possible

Page 30: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

2. Selective disclosure, not enough certificate authorities, certificate lending possible

3. Not enough information on certificate, too many certificate authorities and certificate lending possible

4. Easy data aggregation, selective disclosure and not enough certificate authorities

Q194) What is the port for HTTPS Protocol? 1. Port 80 2. Port 21 3. Port 110 4. Port 443

Q195) Which encryption implementation that does not use a variable length key? 1. Blowfish 2. RC2 3. DES 4. RC5

Q196) Which payment model provides the slowest transfer of funds? 1. Cash 2. Credit 3. Debit 4. Check

Q197) EDI was originally networked though what infrastructures? (Choose two) 1. VPN 2. VAN 3. VEN 4. ISP Dial-up

Q198) In MS Site Server, what role do the Server Administration Pages play? 1. Generates the site building the user interface 2. Builds the site infrastructure 3. Acts as the HTML interface for back end store operations 4. HTML interface to customize order processes

Q199) In conducting usability analysis, what is NOT a pre-launch guideline? 1. make sure site is ready for launch 2. give users actual tasks and have them take notes 3. Include a cross-section of testers for all skill levels 4. Store their IP Address in a Database advise users of site design goals

Q200) Which of the following is true? 1. There can be multiple novelty claims on a single patent 2. There can be only one novelty claim on a patent 3. A claim must be patented

Page 31: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

4. A patent must not have a claim

Q201) Which is NOT a primary goal of usability? 1. Good site navigation 2. Building a moderate amount of depth 3. Ease of purchase 4. Controlled click patterns

Q202) Which of the following is NOT a factor in encryption strength? 1. Strength of the algorithm 2. Secrecy of the key 3. Strength of the key 4. Length of key

Q203) Which encryption type involves the use of a public key? 1. Asymmetric 2. Symmetric 3. Triple DES 4. PKT

Q204) The percentage of ad viewings that resulted in a user clicking the ad 1. Page views 2. CPM 3. CPC 4. Clickthrough

Q205) What does the On-Line Copyright Infringement Liability Limitation Act exempts ISPs from liability for?

1. billing errors 2. known transmission of illegal material 3. unknown actions of user or users 4. network downtime

Q206) Which is a disadvantage of using synchronous e-service? 1. often not personal enough 2. often not timely enough 3. often requires more bandwidth 4. All of the above

Q207) What is the EDI string of data elements encapsulated by a header and trailer called?

1. EDI Code 2. Transaction set 3. Data segment 4. Message Digest

Page 32: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

Q208) What does a virtual server allow a developer to do? 1. run several web sites on the same NT system 2. run several servers on the same NT system 3. implement several firewalls on the network 4. add FTP and NNTP capabilities to a single web server

Q209) Which of the following is a symmetric key type? 1. MD5 2. RSA 3. DES 4. SHA

Q210) What function in Microsoft's Site Server verifies that no site links are broken? 1. Site Builder Wizard 2. Control Panel 3. Pipeline Editor 4. Content Analyzer

Q211) Under the World Intellectual Property Organization (WIPO) what two treaties administered

1. The Berne Treaty and The Paris Convention 2. The Berlin Treaty and the The Geneva Agreement 3. The Zurich Treaty and the The Munich Convention 4. The Geneva Treaty and The Paris Agreement

Q212) Any activity within a rolling time frame “session” 1. A Visit 2. Page views 3. Hits 4. cache

Q213) E-Commerce defined as the integration of what three things that allow organizations to exchange information about the sale of goods & services?

1. Transaction parties, financial institutions and data exchange 2. Communications, data management, security 3. Customers, merchants and networks 4. Transaction parties, payment infrastructure and security

Q214) What section of the U.S. Constitution provides for intellectual property rights? 1. Article 1, Section 8 2. Article 3, Section 5 3. Bill of Rights 4. Property Clause

Q215) What is the component of an e-commerce site that keeps track of the items a customer wants to buy called?

Page 33: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

1. Transaction log 2. Shopping cart 3. Cache 4. Cookie Tracker

Q216) S/MIME protocol assumes sender and receiver have what? 1. A private key pair 2. A public key pair 3. Both public and private key pairs 4. No public or private key pairs

Q217) What is Open Trading Protocol? 1. An Internet e-commerce specification based on open technologies. 2. An open protocol that defines trading protocol options. 3. A business-to-business network focused on bringing buyers and sellers together 4. The international exchange of documents in standarized electronic form

Q218) An advantage of businesses using EDI is solutions 1. Less expensive to implement than other 2. All document formats are very standard 3. Reduces possibility for errors 4. All of the above

Q219) What does RPC stand for? 1. Remote Procedure Call 2. Remote Procedure Command 3. Remote Protocol Command 4. Remote Process Control

Q220) Does the U.S. Patent and Trademark Office allow patents on algorithms and techniques?

1. Yes 2. No, and they never did 3. No, and they no longer do 4. Yes, this practice began in 1991

Q221) Through what interface can Site Server not be administered? 1. MMC 2. Web-based 3. Command line 4. File manager

Q222) What are three types of online promotions? 1. Radio, Banner Ads and word of mouth 2. Referrer sites, search engine placement and email 3. Site links, spam and in-store contests

Page 34: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

4. Targeted email, auctions and in-store contests

Q223) What is NOT a method of correcting bottlenecks? 1. Upgrading components 2. replicating components 3. increasing queue capacity 4. resetting server

Q224) What is EDI's ANSI format standard? 1. X400 2. X409 3. X25 4. X12

Q225) What is the de facto payment standard for credit card transactions? 1. SET 2. SSL 3. ACH 4. EDI

Q226) What feature in IIS handles installing a certificate and setting a default certificate? 1. Key manager 2. Transaction server 3. Site Wizard 4. Foundation Wizard

Q227) Where is a third-party issued digital certificate installed? 1. E-commerce server 2. Ffirewall implementation 3. Client browser 4. None of the above

Q228) Which piece of legislation defined trademark law as it exists today? 1. The 1976 Copyright Act 2. The Digital Millennium Trademark Clause 3. The 1957 Trademark Protection Act 4. The Lanham Act

Q229) For which one of the following can CGI be used? 1. Generate HTML dynamically on the client-side 2. Write Java Applets and Applications 3. Create custom Flash animations 4. Generate HTML dynamically on the server-side 5. Directly manage and rollback database transactions

Page 35: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

Q230) Which of the following allows the user to create directory management using Visual Basic, Java or C/C++?

1. MDAC 2. MMC 3. ADSI 4. ODBC

Q231) Which is NOT a feature of Site Server Commerce Edition? 1. Site Builder Wizard 2. Site Foundation Wizard 3. Pipeline Editor 4. Shopping Cart Wizard

Q232) What is an in-house solution advantage? 1. Inexpensive 2. Implemented quickly 3. Total control over site infrastructure 4. all of the above

Q233) What method of encryption is traditionally used for storing ATM pin numbers? 1. Asymmetric 2. One-Way encryption 3. Symmetric 4. Two-way encryption

Q234) Which is a form of synchronous service? 1. Web Forms 2. Telephony 3. DSL service 4. FAQ

Q235) Studies on banner ad positioning have shown what placement locations receive the highest clickthrough?

1. The top and the lower right 2. The center and the lower left 3. The upper and middle right 4. The upper left and the lower right

Q236) What are the two main intellectual property branches? 1. Patents and trademarks 2. Trademarks and copyrighted material 3. Industrial property and trademarks 4. Industrial property and copyrighted material

Q237) Which law allows the US to conform to WIPO treaties for international copyright standards?

Page 36: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

1. The WTO Seattle Treaty 2. The Digital Millennium Copyright Act 3. No Electronic Theft Act 4. None of the Above

Q238) Each instance a web server sends a page or image to a browser 1. Hit 2. Impressions 3. Page views 4. A Visit

Q239) Which method of generating site visibility has been shown most effective? 1. Banner advertising 2. Targeted email 3. Offline Advertising 4. No method has been shown to be the most effective

Q240) HTTPS is enabled throughout designated pages at a site via what Microsoft component?

1. IIS Console 2. MMC 3. Site Server Console 4. Transaction Server

Q241) How can trademark rights be lost? 1. Claim is not renewed 2. Trademark changed 3. Trademark becomes a “household name” 4. All of the above

Q242) How can a business-to-business network help an online business? 1. By providing infrastructure and purchasing support 2. By always providing an e-commerce package and policies 3. By always offering a direct affiliation with pre-established suppliers 4. By allowing business owners to invest in a customized infrastructure

Q243) Which law contains a clause involving the protection of webcasting content? 1. The Digital Millennium Copyright Act 2. No Electronic Theft Act 3. The Push Technology Liability Act 4. The Web Broadcast Limitation Act

Q244) What is the best form of e-mail marketing? 1. Targeted e-mail 2. Spam e-mail 3. E-mail list purchased from online marketer

Page 37: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

4. Opt-in e-mail

Q245) What is considered effective in banner advertising strategy? 1. Calls to action 2. Ad longevity 3. Varied sizing 4. All of the above

Q246) Which is a common RPC? 1. SQL Server Agent's mail features 2. Replication 3. Backing up to network drives 4. all of the above

Q247) EDI is promoted by what standards organization? 1. Worldwide Web Consortium 2. Web Data Interchange Standards Associations 3. Information Infrastructure Task Force 4. Electronic Data Standards Institute

Q248) What is true of the Business to Business model and the Business to Consumer Model

1. The Business to Consumer model is more complex 2. The Business to Business model is more complex 3. Both models face the same challenges in data exchange 4. Both models face the same challenges in meeting customer requirements

Q249) Which encryption implementation that uses variable block size, key length and number of rounds?

1. RC5 2. RC2 3. Triple DES 4. DES

Q250) What is the approximate current volume of B2C web commerce business? 1. Over 10 Million 2. Over 100 Million 3. Over 10 Billion 4. Over 100 Billion

Q251) How is the SET process accelerated? 1. Use of enveloping 2. Use of public key 3. Use of SSL 4. Use of message digests

Page 38: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

Q252) What is the three part process for SSL? 1. Encryption, server authenticated and message integrity maintained 2. Algorithm applied, key encrypted and server identified 3. Encryption key applied, data transfer and algorithm decrypted 4. Certificate verified, signature applied, data transfer

Q253) Which of the following is NOT a proprietary database implementation product? 1. ColdFusion 2. Oracle8 3. MS SQL Server 4. Apache

Q254) Which is not a form of self-service 1. FAQ 2. Account profiles 3. Web forms 4. Knowledge database

Q255) What feature best serves the security purpose of data integrity? 1. Usernames 2. Message digests 3. ACL 4. A and C only

Q256) Which law contains the anti-circumvention provision making it illegal to manufacture, import or distribute products designed to circumvent encryption, scrambling, etc.?

1. The Digital Millennium Copyright Act 2. No Electronic Theft Act 3. The Zurich Treaty 4. The Global Alliance for Intellectual Property

Q257) Building product awareness is a function of what? 1. Promotion 2. Quality management 3. Customer Service 4. Public Relations

Q258) What is Open Buying on the Internet? 1. An open protocol that defines trading protocol options bringing buyers and

sellers together 2. A business-to-business network focused on bringing buyers and sellers together 3. An Internet e-commerce specification based on open technologies 4. The international exchange of documents in standarized electronic form

Page 39: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

Q259) What is the least effective product/service awareness method an online marketer can use?

1. Banner ads 2. Search engine placement 3. Spam e-mail 4. Refferer sites

Q260) Who typically owns the copyright on an e-mail message transmitted over the internet?

1. The internet service provider 2. The original authors employer 3. The recipient or addressee 4. The original author

Q261) What is the biggest factor driving a change from traditional models of inventory control for e-commerce businesses?

1. Surplus stocks 2. Demand 3. Higher prices 4. Higher margins

Q262) What is the best way to ensure high usability on a web site? 1. Evaluating server logs to analyze users click patterns 2. Asking for customer feedback just after final release of the site 3. Designing it so the first page shows a great deal of content 4. Finishing the testing before final release of the site

Q263) What is the Automated Clearing House? 1. An international payment processing system 2. A nationwide payment processing system 3. An international check verification system 4. A nationwide check verification system

Q264) What is the certificate standard? 1. X509 2. X500 3. X12 4. X25

Q265) What is Electronic Data Interchange? 1. The interorganizational exchange of information in standarized electronic format 2. An open protocol that defines trading protocol options 3. An internet e-commerce specification based on open technologies 4. A business-to-business network focused on bringing buyers and sellers together

Q266) What is a feature of copyright protected material?

Page 40: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

1. An idea or fact 2. Expression and Originality 3. Protection is permanent and lasting 4. a and b only

Q267) Who is the most suitable possible user of a mid-level storefront package? 1. An experienced e-commerce marketer 2. A newly developing business 3. A novice online business owner 4. A beginning web site designer

Q268) How can an existing business improve customer service with an online presence? 1. By closing all its physical locations and operating online 2. By automating a tracking and order status system 3. By doubling or tripling its product offerings in a short time 4. Replacing it's toll free number with an online form

Q269) What technology is typically used to extend a Web server’ s features? 1. Hypertext Transfer Protocol 2. A daemon service 3. CGI scripts, ColdFusion or Active Server Pages 4. HTML and imaging

Q270) When considering security in selecting Web server software, what encryption level might you typically find for SSL services?

1. 1024 bits 2. 40 bits 3. 56 bits 4. 128 bits

Q271) Which component of Site Server Commerce Edition would you use to customize shopping cart buttons?

1. The Site Administration Panel 2. The Site Foundation Wizard 3. The Site Manager 4. The Default.asp page

Q272) What component of Site Server Commerce Edition allows you to actually create your Web site?

1. The Microsoft Management Console 2. The Site Builder Wizard 3. Active Server Pages 4. The Foundation Wizard

Q273) What is the best guideline for including images in an online catalog? 1. They should be a mandatory part of the catalog

Page 41: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

2. They should be available as thumbnails 3. They should never be included in the catalog 4. They should be largeand higly detailed

Q274) What security benefits does Secure Sockets Layer (SSL) provide? 1. Encryption and decryption 2. Decryption and authentication 3. Encryption and server authentication 4. Encryption and a certificate

Q275) What is the primary drawback to electronic cash? 1. The need for all participants in the transaction to use the same package. 2. The need for back-end transaction processing 3. The high cost involved in setting up and using electronic cash packages. 4. The requirements for customers to sacrifice anonymity by providing personal

information.

Q276) What is one-way encryption? 1. A type of encryption that requires both participants to have a single secret key. 2. A type of encryption that requires each participant to have a public key and a

private key. 3. A type of encryption that is easy to compute in one direction but difficult to

compute in the other direction. 4. A message digest involving a digest or hash algorithm that produces a short

unique message.

Q277) How might a knowledge base be integrated with the overall e-commerce site? 1. With an e-mail form that users access from a seperate URL. 2. With a toll-free telephone number provided on the home page. 3. With a printable form that users can mail in to ask questions. 4. With a link to the Help button on the site's main navigation link.

Q278) How is information typically stored in a database? 1. In long columns which are usually referred to as fields. 2. In long rows which are usually referred to as records. 3. In tables with columns (fields) and rows (record) 4. On individual web pages, according to product line.

Q279) What is a cipher? 1. a cryptographic algorithm 2. encrypted text 3. encryption key 4. all of the above

Q280) What piece of information is commonly used to track the status of a shipment? 1. The customer's credit-card number

Page 42: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

2. The merchant's public key 3. The URL of the .asp order page 4. The order ID number or customer ID

Q281) Which is true of public and private keys? 1. Easy to compute mathematically 2. Easy to guess 3. Difficult to compute mathemattically 4. b and c

Q282) Which encryption bit strength is suggested for a certificate to avoid violating any import and export regulations?

1. 1028 2. 2056 3. 512 4. 56

Q283) What is the organization behind the Skipjack algorithm? 1. RSA 2. MIT 3. National Security Agency 4. WDISA

Q284) What does the SET model presuppose? 1. The existence of the current credit card payment infrastructure 2. All parties have the same transaction server protocol 3. Purchasers have third-party issued certificates 4. The existence of the current internet security infrastructure

Q285) What protocol must a client support to utilize certificates? 1. FTP 2. HTTPS 3. MIME 4. SMTP

Q286) What is the IIS default name for an anonymous account? Is 1. ISUR_computername 2. IIS_computername 3. NT_computername 4. IUSR_computername

Q287) Which of the following is a low-end instant storefront solution 1. IIS and Site Server 2. Jumbomall 3. Go Edison 4. INEX Commerce Court

Page 43: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

Q288) Which of the following is a high-end instant storefront solution 1. Jumbomall 2. Yahoo! Shops 3. IIS and Site Server 4. Sterling Commerce

Q289) Who is the person behind the Blowfish algorithm? 1. Bruce Schneier 2. Ron Rivest 3. Tim Berners-Lee 4. Whitfield Diffie

Q290) Certificates do which of the following? 1. Offer absolute proof of identity 2. Assists in authentication only 3. Are best for E-Comm sites for special groups 4. Offer the selective disclosure of information

Q291) Of the following encryption standards, which is not one? 1. VeriSign© Certificate 2. Symmetric 3. Asymmetric 4. One-Way

Q292) The Secure Hash Algorithm was developed by NIST and is a? 1. Message Digest 2. Type of RSA encryption 3. Cipher Block 4. Type of 128 bit encryption

Q293) In order to participate in SET transactions you need? 1. Personal digital certificate 2. Server certificate 3. Public key cryptography 4. Certificate authority certificate

Q294) Verisign© offers two types of personal certificates, what are they? 1. Consumer and business personal certificate 2. Low level certificate and high encryption certificate 3. Level one and level two certificate 4. 56 bit and 128 bit certificate

Q295) There are four types of certificates. What standard do they use? 1. DES 2. MD5 3. X 509 v3

Page 44: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

4. RSA

Q296) In 1996, SET was created by the merging of two protocols and is expected to become the standard?

1. True 2. False 3. Maybe 4. Not likely

Q297) An employee wants a method of strong authentication for his personal use. What would you recommend?

1. Certificate authority certificate 2. Personal certificate 3. Digital wallet 4. Use a Data Encryption Standard (ie:DES)

Q298) OBI has several features, one of which is? 1. Not as prone to incompatibility problems like EDI 2. It runs on the transport layer of the OSI 3. It has a lower cost to implement 4. It works well with production based supplies

Q299) The following four components are typical of what type of transaction? (Requisitioner, Buying organization, Selling organization, Payment Authority)

1. EDI 2. OBI 3. SSL 4. OTP

Q300) In order to use SSL you require which one of the following? 1. Server software(ie:Site Server) 2. Established trading partner 3. Digital certificate(ie:Verisign©) 4. ANSI EDI X12 850 protocol

Q301) One of the least attractive features of EDI is? 1. Security 2. RSA encryption 3. Trading partners requesting your business to convert 4. Cost

Q302) An EDI message contains a string of elements. The entire string is known as? 1. A data segment 2. The X12 850 EDI segment 3. A transaction set 4. A SSL transaction

Page 45: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

Q303) In order to enable online transactions you need to perform 3 tasks. What are they? 1. Set up online merchant account 2. Prepare server & E-Commerce site 3. Purchase digital certificate 4. Install payment software

Q304) You can define E-Commerce in two ways. What are they? 1. Commerce conducted by any electronic medium 2. Commerce conducted strictly online 3. As a merging of data management, communications and security 4. As secure transactions only conducted through use of a web browser

Q305) The Open Trading Protocol(OTP) defines what? 1. EDI transaction processing methods 2. The B2C business model 3. Standardized XML tags 4. The options that control how a trade occurs

Q306) For effective site usability, an E-commerce site needs to achieve four goals. What is the first one?

1. Marketing 2. Attract users to the site 3. To give users the information they require 4. Security

Q307) The Online Copyright Infringment Act does what? 1. Exempts an ISP from liability based on certain criteria 2. Prevents anyone from using Copyright materials 3. Allows all information on the web to be free of Copyright 4. Exempts all web content from Copyright

Q308) Infrastructure and purchasing is the goal of what? 1. A B2B network 2. An OBI compliant B2B network 3. A High-End E-Commerce package 4. A B2C model using OTP and XML

Q309) The No Electronic Theft(NET) Act deals mainly with what? 1. Theft of software 2. Financial gain 3. Theft of credit card numbers online 4. Export of high encryption standards

Q310) What are the two major branches of intellectual property? 1. Trademark and patent 2. Trademark and copyright

Page 46: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

3. Industrial property and copyright 4. Service mark and trademark

Q311) 2 large companies standardizing and securing information sent between them should use:

1. EFI 2. OBI 3. SET 4. SSL

Q312) A company claims to have the rights to a domain that someone else has registered. Which law applies?

1. Copyright 2. Patent 3. Trademark 4. Intellectual property laws

Q313) Who would own the copyright on an e-mail message sent over the internet?1. ISP 2. Original author3. Recipient or addressee4. Original authors employee

Q314) Which one of the following is described by this statement: "a series of veins and arteries moving product from source to consumer"?

1. 32 bit2. 40 bit3. 56 bit4. 128 bit 5. 168 bit

Q315) What level of SSL Encryption is often REQUIRED by corporations in financial transactions in the U.S.?

1. RSA 40-bit2. Hashing 3. RSA 1024-bit 4. Skipjack

Q316) When considering security in selecting Web server software, what encryption level might you typically find for SSL services?

1. 1024 bits2. 40 bits3. 56 bits4. 128 bits

Page 47: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

Q317) Which encryption bit strength is suggested for a certificate to avoid violating any import and export regulations?

1. 1028 2. 2056 3. 512 4. 56

Q318) Online retailers want to prevent users from using coupons over and over and potentially racking up fraudulent charges. Based on the above scenario, which one of the following combinations of anti-fraud measures provide the strongest security against coupon abuse?

1. Storing IP Addresses with used coupons2. Associating e-mail addresses with used coupons3. Associating credit card numbers and e-mails with used coupons 4. Putting the coupon in the URL, e-mails in a cookie 5. Storing their IP address on the server, storing the credit card information with it

Q319) When an E-Commerce site is designed using 3-tier architecture, which of the following describes the three tiers?

1. Firewall, Business Logic, Data2. Presentation, Firewall, Business Logic3. Database, Security, Firewall4. Presentation, Business Logic, Data5. Browser, Firewall, Data

Q320) Which one of the following is absolutely fundamental to any non-Web-based Distribution System?

1. Database2. Web server3. Network Router4. Firewall 5. Certificate Server

Q321) Which one of the following initiatives started by Microsoft was created to ensure a consistent adoption of XML to enable electronic commerce and application integration?

1. Super XML2. EDI 3. X-HTML4. Biztalk 5. Business to Business

Q322) Which aspect of Intellectual Property does the PTO NOT govern?1. Copyright 2. Trademarks 3. Industrial designs 4. International Protection

Page 48: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

Q323) Does the U.S. Patent and Trademark Office allow patents on algorithms and techniques?

1. Yes 2. No, and they never did3. No, and they no longer do4. Yes, this practice began in 1991

Q324) What is the approximate current volume of B2B web commerce business?1. Over 100 Million2. Over 1 Billion3. Over 100 Billion4. Over One Trillion

Q325) What is the approximate current volume of B2C web commerce business?1. Over 10 Million2. Over 100 Million3. Over 10 Billion4. Over 100 Billion

Q326) In the SET transaction process, where is consumer credit card information most vulnerable?

1. Over the phone line to the ISP2. Travelling across the internet backbone3. The database server holding the card info4. In cookies

Q327) Which is a disadvantage of using asynchronous e-service?1. Often not timely enough 2. Learning curve involved3. Often difficult to implement4. All of the above

Q328) What is true about the digital signature process?1. Decryption failures prove nothing 2. The process is computationally intensive 3. It is inexpensive to implement4. None of the above

Q329) What is the disadvantage of the process of checking for certificate revocation?1. Can delay e-commerce servers2. Not always accurate verification3. Process takes several days4. Checking revocation is expensive

Q330) What is a standard full banner size?1. 5" x 2 "

Page 49: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

2. 468 x 60 3. 200 x 2004. 235 x 100

Q331) What does CASIE stand for?1. Coalition for Advertising Supported Information and Entertainment 2. Community of Artists Selling Internet Entertainment3. Creative Artists Society for Internet Entertainment 4. Corporation for Agencies Supporting Information and Electronics

Q332) What is NOT a main feature of a publisher site?1. Sell advertising2. A lot of site content 3. Few links outside site4. Repeat visits high priority

Q333) Why would a certificate be revoked?1. Private key compromised2. Service no longer valid3. Certificate Authority compromised4. All of the above

Q334) What is the difference between Marketing & Promotion? 1. Marketing is the advertising and promotion is the giveaways2. Marketing is the visual image and promotion is the written message3. Marketing is the message and promotion is the vehicle4. Marketing is the communication and promotion is the advertising

Q335) How can a referrer program be measured?1. Page redirections, cookies and log files2. Plug-ins, caching and cookies3. Caching, cookies and impressions4. Firewall 5. Log files, plug-ins and special URLs

Q336) What is true of using a third-party tracking service vs. reviewing web server logs? 1. Third-party tracking services are more powerful than reviewing server logs 2. Traffic can only be examined by third-party tracking services3. Third-party tracking services are less powerful than reviewing server logs 4. Traffic can only be accurately examined by server logs

Q337) In conducting usability analysis, what is NOT a test result analysis guideline? 1. A second usability test is required2. Address commonly reported issues first3. Address secondary issues if possible / feasible4. Find commonly reported issues

Page 50: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

Q338) What feature serves the security purpose of access control?1. Usernames 2. Passwords 3. ACL 4. All of the above

Q339) What security feature best serves the purpose of data confidentiality?1. Usernames 2. ACL 3. Encryption 4. Message digests

Q340) What administrative features might be part of a knowledge base?1. Allowing for status, approval and assignment variables 2. Assigning all users questions to the same department3. Discarding answers after they have been sent to the user 4. Deleting user feedback after the answer has been sent

Q341) What browser feature assists log file functioning and analysis?1. Impressions 2. Cookies 3. A plug-in4. None of the above

Q342) Where would a user find the ODBC function? 1. Site Server2. Control Panel3. Microsoft Management Console4. Microsoft Front Page

Q343) Which of the following has the potential to be both a benefit and a risk for the web storefront?

1. New market entry2. Instant worldwide availability3. Market analysis4. Intellectual property

Q344) The number of times user requests a page containing a particular ad1. Page views2. Unique users3. Visits 4. All of the above

Q345) The number of times banner is downloaded1. Click through2. Page views

Page 51: Q1) How is E-commerce defined Questions(E-Co…  · Web viewAs commerce conducted via the internet using credit cards for online payments. As an integration of communications, data

3. Visits 4. Impressions

Q346) What document created by Verisign sets the performance standards for certifying authorities?

1. Certificate Authority Requirements2. Certified Standard Policies3. Common Policy Standard4. Certification Practice Statement

Q347) What is a web farm?1. A site serving multiple sites2. ISP serving multiple web sites 3. A network serving multiple domains4. None of the Above

Q348) What does an RPC allow servers to do?1. Access a dedicated network2. Communicate across a dedicated network 3. Communicate only outside of a dedicated network 4. Limit distributed applications from colliding

Q349) EDI was originally networked though what infrastructures? (Choose two)1. VPN 2. VAN 3. VEN 4. ISP Dial-up

Q350) Which of the following is true?1. There can be multiple novelty claims on a single patent 2. There can be only one novelty claim on a patent3. A claim must be patented4. A patent must not have a claim