Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CIW > CIW Certification > 1D0-525

1D0-525 CIW v5 E-Commerce Designer Question and Answers

Question # 4

The purpose of a stress test is to determine:

A.

whether more system RAM is necessary.

B.

whether a more powerful CPU is necessary.

C.

whether a performance bottleneck is present.

D.

whether visitors can reach the site.

Full Access
Question # 5

Mason runs an e-commerce site selling products from his business in Texas, which has a local sales tax of 7.5 percent. What would the tax rate be for a customer in Egypt?

A.

7 percent

B.

0 percent

C.

6.5 percent

D.

7.5 percent

Full Access
Question # 6

Tomas receives multiple e-mail notices after he successfully places an online order with a book retailer. What is the customary sequence of order e-mail notices?

A.

Order address verified, order shipped, order charged to the credit card

B.

Order processed, order status confirmed, order shipped with tracking number

C.

Order fulfilled, order processed, order shipped with tracking number assigned

D.

Order shipped, order processed, order charged to the credit card

Full Access
Question # 7

The details of an e-commerce site order can be kept in memory, stored on the visitor's computer or stored on the Web server. This ability to remember the details of an order is known as:

A.

filling the shopping cart.

B.

persisting an order.

C.

tracking an order.

D.

profiling an order.

Full Access
Question # 8

What is the first step in improving your Web server's performance?

A.

Determine the efficiency of the CGI applications.

B.

Upgrade the server's RAM.

C.

Upgrade the server's CPU.

D.

Monitor performance and create a baseline.

Full Access
Question # 9

Which of the following is commonly used to authenticate a customer who has just used a credit card to buy a product?

A.

The customer's card security code

B.

Secure Sockets Layer (SSL)

C.

A payment gateway for verifying the customer's address

D.

The customer's signature

Full Access
Question # 10

Which of the following are common methods for tracking customers in a referrer program?

A.

Customer names, landing page hit counts, page redirections

B.

Cookies, page redirections, specialized URLs with ID numbers

C.

Web browser tracking files, sales commission records, customer names

D.

Cookies, Web server referrer agent log files, registered user names

Full Access
Question # 11

An attack has affected a commercial server providing customized Web content services to Michael's e-commerce site. The attack is most likely an example of:

A.

Application Service Provider (ASP) infiltration.

B.

registrar database tampering.

C.

Secure Electronic Transactions (SET) corruption.

D.

certificate authority (CA) infiltration.

Full Access
Question # 12

A payment gateway routes payment information between the:

A.

customer account and the issuing bank.

B.

merchant account and the customer account.

C.

shopping cart and the processor.

D.

merchant account and the acquiring bank.

Full Access
Question # 13

You are running a site that provides e-learning services to several Fortune 100 companies. This site is available at the following location: www.appliedlearningservices.com. A new customer wants to access the same server at a new name: www.als1.com. Which type of DNS entry should be created?

A.

A

B.

MX

C.

CNAME

D.

AAAA

Full Access
Question # 14

Which of the following is a disadvantage of an online storefront?

A.

Specialized hardware requirements

B.

High software costs

C.

Difficulty of administration

D.

Lack of control over security

Full Access
Question # 15

Nain is a front-desk receptionist at a large corporation. After a recent payday for the employees, Nain received a phone call from someone claiming to be an employee who was out-of-state on an assignment. This person asked Nain whether his check had been deposited, and to verify that the check was written to a specific account name and bank routing number. This occurrence may be a type of attack known as a:

A.

denial-of-service attack.

B.

social-engineering attack.

C.

pharming attack.

D.

phishing attack.

Full Access
Question # 16

The main purpose of monitoring e-commerce Web server resources and performance (including bandwidth, uptime, downtime and network usage) is to ensure:

A.

visitor satisfaction.

B.

cost-effectiveness.

C.

site availability.

D.

increased profitability.

Full Access
Question # 17

Before you can conduct usability testing, you should:

A.

identify your potential customers.

B.

identify the most-traveled path of your site.

C.

identify browser compatibility issues.

D.

publish your site to a production server.

Full Access
Question # 18

Which of the following is the most effective option for detecting a site attack by someone who wants to modify your customer database?

A.

Using an intrusion detection system

B.

Limiting the open ports on the system

C.

Using antivirus software

D.

Implementing a firewall

Full Access
Question # 19

In credit card transactions, which of the following occurs during the settlement phase?

A.

The customer enters credit card information on a Web site and confirms the order.

B.

Credit card information is passed to a payment gateway.

C.

The processor verifies the credit card through the issuing bank.

D.

The acquiring bank transfers money to the merchant's account.

Full Access
Question # 20

Mortimer is creating an e-business site for an international supplier of exotic flower bulbs. Many customers are loyal purchase-club members. He has decided to use a virtual catalog in the construction of the site. Which of the following practices pertaining to implementing a virtual catalog should be avoided?

A.

Making multiple base catalogs appear as a single catalog to customer

B.

Adding new items to the virtual catalog to add duplicate database entries

C.

Managing pricing in multiple currencies

D.

Implementing special pricing rules for club members

Full Access
Question # 21

Which of the following is the most effective strategy (as opposed to a tactic) for entering a new business market?

A.

Contact an advertising agency.

B.

Hire a marketing team.

C.

Obtain customer referrals.

D.

Target new customers.

Full Access