Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

A customer has placed an online order. The order has been written to a database for processing and the customer's credit card has been charged. What is the last interaction with the customer during the order process?

A.

Update the customer profile.

B.

Send a confirmation e-mail message to the customer.

C.

Redirect the customer to the home page.

D.

Send a shipping notification via e-mail to the customer.

Full Access
Question # 5

Mortimer is creating an e-business site for an international supplier of exotic flower bulbs. Many customers are loyal purchase-club members. He has decided to use a virtual catalog in the construction of the site. Which of the following practices pertaining to implementing a virtual catalog should be avoided?

A.

Making multiple base catalogs appear as a single catalog to customer

B.

Adding new items to the virtual catalog to add duplicate database entries

C.

Managing pricing in multiple currencies

D.

Implementing special pricing rules for club members

Full Access
Question # 6

Which of the following describes a referrer program?

A.

One site pays another site for the traffic it sends; traffic is directed in one direction.

B.

A third party verifies referrals from one site to another site as traffic flows from one to the other.

C.

One site pays several sites for traffic it sends; traffic is generated in multiple directions.

D.

Referrals occur only after a company pays a commission for them; traffic is directed in one direction.

Full Access
Question # 7

Which of the following segments first used blogs as an Internet marketing tool?

A.

Mainstream advertisers

B.

Large corporations

C.

Small businesses

D.

Government agencies

Full Access
Question # 8

Which of the following can help assure customers that the information they provide to you will remain private?

A.

Implement and post a privacy policy.

B.

Provide an opt-out link for all e-mail sent to customers.

C.

Post the company security policy.

D.

Create a data backup policy.

Full Access
Question # 9

What is the first step in improving your Web server's performance?

A.

Determine the efficiency of the CGI applications.

B.

Upgrade the server's RAM.

C.

Upgrade the server's CPU.

D.

Monitor performance and create a baseline.

Full Access
Question # 10

Which of the following segments first used blogs as an Internet marketing tool?

A.

Large corporations

B.

Small businesses

C.

Government agencies

D.

Mainstream advertisers

Full Access
Question # 11

What is the name for a tax on goods that are shipped internationally?

A.

Sales tax

B.

Value-added tax (VAT)

C.

Tariff

D.

Tax barrier

Full Access
Question # 12

Which of the following is the most effective option for detecting a site attack by someone who wants to modify your customer database?

A.

Using an intrusion detection system

B.

Limiting the open ports on the system

C.

Using antivirus software

D.

Implementing a firewall

Full Access
Question # 13

Which of the following is a concern with third-party instant storefronts?

A.

They do not include shopping-cart software.

B.

They rely on a third party to secure the site.

C.

They are available only through a portal.

D.

They require extensive knowledge of e-commerce server software.

Full Access
Question # 14

Which type of encryption is typically slower to use but does not require a secure channel to function?

A.

Asymmetric-key encryption

B.

Symmetric-key encryption

C.

Pretty Good Privacy (PGP)

D.

One-time pad (OTP)

Full Access
Question # 15

Which of the following is a common design principle for a frequently asked questions (FAQ) page on an e-commerce site?

A.

Design the page so that it provides all the information about the company's products.

B.

Keep the page design simple so that it is easy to update quickly.

C.

Use dynamically generated HTML so that the page is easy to update quickly.

D.

Use frames so that the page can be viewed easily.

Full Access
Question # 16

Which of the following marketing models is characterized by a complementary venture between two or more companies that join together in production, distribution or marketing in order to achieve individual goals?

A.

B2C market

B.

Vertical market

C.

Open market

D.

Horizontal market

Full Access
Question # 17

The goals for effective usability in an e-commerce site are to get customers to:

A.

visit, learn and return.

B.

visit, learn and purchase.

C.

find, learn and review.

D.

find, compare and revisit.

Full Access
Question # 18

Vera's new e-business failed in its second year because inventory levels were constantly depleted and she was unable to satisfy order fulfillment. The most likely underlying reason for the failure may be that Vera's business plan did not address:

A.

inventory storage requirements.

B.

marketing strategies and tactics.

C.

customer demographics.

D.

supply chain management.

Full Access
Question # 19

Which of the following is commonly used to authenticate a customer who has just used a credit card to buy a product?

A.

The customer's card security code

B.

Secure Sockets Layer (SSL)

C.

A payment gateway for verifying the customer's address

D.

The customer's signature

Full Access
Question # 20

What aspect of e-commerce marketing most significantly differentiates the use of a niche marketing strategy from that of a global marketing strategy?

A.

Common customer interests

B.

Advertising media choices

C.

Products and/or services offered

D.

Geographic distribution of the customers

Full Access
Question # 21

What are the basic steps for retrieving data for display?

A.

Connect to a database server, pass the SQL command, retrieve the results.

B.

Define the server name, name the database, authenticate the credentials.

C.

Predefine SQL strings, authenticate, format for display.

D.

Authenticate to a database server, format for display, retrieve the data results.

Full Access