McGraw-Hill OnlineMcGraw-Hill Higher EducationLearning Center
Student Centre | Lecturer Centre | Info Centre | HOME

Glossary
Buy Book
Self-Test Questions
Web Links

Jacket
E-Business Strategy
Paul Phillips, University of Surrey, UK

Cyber Rules And Challenges

Self-Test Questions



1

The term Cyber rules can be best described as:
A)Rules required for brick-and-mortar companies
B)Rules required for governing e-commerce
C)Rules required to manage service sector companies
D)None of the above
2

According to Grippo, Siegel, Warner and Smith (2001) which of the following is imperative for proper and effective network security:
A)Authenticity
B)Speed
C)Risk
D)None of the above
3

The Internet Architecture Board (IAB) is:
A)A non-profit, non-governmental, international, professional membership organization that focuses on standards, education and policy issues
B)A non-profit, non-governmental, international, professional membership organization that focuses on marketing issues
C)Responsible for defining the overall architecture of the Internet, providing guidance and broad to the Internet Engineering Task Force (IETF)
D)None of the above
4

Email spam is a:
A)Virtual form of useful email, which is expensive and hard to create
B)Virtual form of requested email
C)Virtual form of junk email, which is cheap and easy to create
D)None of the above
5

The pump and dump security law violation involves:
A)A small group of informed people purchasing a stock before they recommend it to thousands of online investors
B)A large group of informed people purchasing a stock after recommending it to thousands of online investors
C)A large group of informed people purchasing a stock before they recommend it to thousands of online investors
D)None of the above
6

Spoofing attempts to:
A)Intercept encrypted data (such as passwords or a user ID)
B)Intercept unencrypted data (such as passwords or a user ID)
C)Mislead others by pretending to be another person, computer terminal or business entity
D)None of the above
7

Which of the following best explains Digital IDs?
A)Digital IDs use public key encryption techniques that use two related keys, a public key and a private key
B)Digital IDs use private key encryption techniques that use two related keys, a public key and a private key
C)Digital IDs use private key encryption techniques that use only related keys, a public key and a private key
D)None of the above
8

The secure sockets layer (SSL) security provides:
A)A protocol for transmitting online data securely
B)Data encryption, server authentication, message integrity and optional client authentication for a TCP/IP connection
C)An open standard developed and offered by Visa and MasterCard
D)None of the above
9

The World Intellectual Property Organisation (WIPO) refers to intellectual property:
A)As the tangible assets of organizations
B)As the tangible creations of organizations used in business
C)As the creations of the mind: inventions; literary and artistic works, symbols, names images and designs used in business
D)None of the above
10

Why has there been some controversy over patents for Internet business processes?
A)Computer systems and software applications were reckoned to be simply mathematical algorithms, abstract ideas or methods of doing business
B)Computer systems and software applications were reckoned to be too difficult to document accurately
C)The Internet was developed for all members of society
D)None of the above
11

The Amazon '1-click' patent can be classified as a business-method patent because:
A)It includes a lengthy patent documentation
B)It includes concepts for conducting an online business transaction
C)It includes a method and apparatus for a cryptographically assisted commercial network system
D)None of the above
12

The top level domain name of .bb stands for which country?
A)Brazil
B)Bermuda
C)Barbados
D)None of the above