11. The most common type of Internet crime according to the IC3 is ______________.

  1. Credit card fraud
  2. Check fraud
  3. Non-delivery
  4. Auction fraud
Correct answer: (D)
Auction fraud

12. When hackers flood a Web site with useless traffic to overwhelm the network, it is called ______________.

  1. phishing
  2. pharming
  3. a Denial of Service (DoS) attack
  4. spoofing
Correct answer: (C)
a Denial of Service (DoS) attack

13. A security plan begins with a(n) is ______________.

  1. security policy
  2. risk assessment
  3. implementation plan
  4. security organization
Correct answer: (B)
risk assessment

14. ______________ influence the behavior of others through their personality, skills, or other factors.

  1. Opinion leaders
  2. Direct reference groups
  3. Indirect reference groups
  4. Lifestyle groups
Correct answer: (A)
Opinion leaders

15. A(n) ______________ represents data as two-dimensional tables with records organized in rows and attributes in columns.

  1. database management system
  2. data warehouse
  3. SQL query
  4. relational database
Correct answer: (D)
relational database

16. Creating multiple versions of information goods and selling essentially the same product to different market segments at different prices is called______________.

  1. versioning
  2. bundling.
  3. transactive content
  4. price discrimination
Correct answer: (A)

17. Which of the following represents a limiting factor for the growth of e-commerce?

  1. Persistent cultural attraction of physical markets and traditional shopping experiences
  2. Inadequate selection of goods compared to physical marketplaces.
  3. E-commerce lacks the convenience of other methods of transacting business
  4. The potential audience for e-commerce is too low to support it as a widespread method of commerce
Correct answer: (A)
Persistent cultural attraction of physical markets and traditional shopping experiences

18. Which of the following is a measure of the percentage of purchasers who return to a Web site within a year?

  1. loyalty
  2. reach
  3. recency
  4. unique visitors
Correct answer: (A)

19. Which of the following statements about privacy is true?

  1. It is a moral right to be left alone
  2. Only corporations and government need to be concerned about it
  3. It has only just recently become a concern
  4. It is most easily obtained on the Internet
Correct answer: (A)
It is a moral right to be left alone

20. The redirection of traffic from a legitimate site to an infringing site is called ______________.

  1. cybersquatting
  2. cyberpiracy
  3. metatagging
  4. keywording
Correct answer: (B)
Page 2 of 15