Latest CIW 1D0-525 Dumps and Practice Tests

CIW V5 E-Commerce Designer: 1D0-525 Exam

  • 1D0-525 Questions & Answers
  • Exam Code: 1D0-525
  • Exam Name: CIW V5 E-Commerce Designer
  • Q & A: 156 Q&As

1: You will be hiring someone to localize your e-commerce site in order to reach a specific audience. Which of the following is most essential for the person you hire to effectively complete the job?
A.The ability to communicate clearly with the team that created the site
B.An understanding of the scripting language and database type used on the site
C.An understanding of the language and culture of the audience you want to reach
D.An understanding of the importance of the just-in-time (JIT) process to the company
Correct Answers: C

2: You are transitioning from a traditional “brick-and-mortar storefront that accepts credit cards to a new e-commerce storefront. Which payment method would be most appropriate during the transition?
A.Cash on delivery (c.o.d.)
B.Open Buying on the Internet (OBI)
C.Credit card with offline processing
D.Advance payment using check or money order
Correct Answers: C

3: Which technology provides channel security (privacy and authentication) through encryption, and reliability through a message integrity check (secure hash functions)?
Correct Answers: B

4: Marty included a banner ad for her online MP3 player store on a music download Web site. She found that 72 percent of users who visited the site via banner ad clickthrough became customers. Which of the following is the term for this percentage?
A.Exposure rate
B.Purchase rate
C.Conversion rate
D.Clickthrough rate
Correct Answers: C

5: You are running a site that provides e-learning services to several Fortune 100 companies. This site is available at the following location: A new customer wants to access the same server at a new name: Which type of DNS entry should be created?
Correct Answers: D

6: Which of the following is the most effective option for detecting a site attack by someone who wants to modify your customer database?
A.Implementing a firewall
B.Using antivirus software
C.Using an intrusion detection system
D.Limiting the open ports on the system
Correct Answers: C

7: What is the name of the electronic funds transfer (EFT) system governed by the United States and designed to provide the clearing of electronic payments between banks?
A.The National Clearing House (NCH) network
B.The Automated Clearing House (ACH) network
C.The Receiving Depository Financial Institution (RDFI)
D.The Originating Depository Financial Institution (ODFI)
Correct Answers: B

8: Nain is a front-desk receptionist at a large corporation. After a recent payday for the employees, Nain received a phone call from someone claiming to be an employee who was out-of-state on an assignment. This person asked Nain whether his check had been deposited, and to verify that the check was written to a specific account name and bank routing number. This occurrence may be a type of attack known as a:
A.phishing attack.
B.pharming attack.
C.denial-of-service attack. attack.
Correct Answers: D

9: The details of an e-commerce site order can be kept in memory, stored on the visitor’s computer or stored on the Web server. This ability to remember the details of an order is known as:
A.profiling an order.
B.tracking an order.
C.persisting an order.
D.filling the shopping cart.
Correct Answers: C

10: The main purpose of monitoring e-commerce Web server resources and performance (including bandwidth, uptime, downtime and network usage) is to ensure: availability.
B.visitor satisfaction.
D.increased profitability.
Correct Answers: A

11: A retail business that advertises and markets using traditional print materials has decided to expand its marketing reach and increase revenue by developing an online catalog. Which of the following is the primary objective?
A.Personalizing the site
B.Creating an effective selling tool
C.Creating a visually attractive catalog
D.Converting the existing print catalog into HTML
Correct Answers: B

12: Which of the following describes a root certificate authority (CA)?
A.A CA that cannot be brought offline
B.A CA that has an unlimited validity period
C.A CA that uses LDAP to transmit its credentials to other CAs
D.A CA that signs its own certificate and certifies itself as legitimate
Correct Answers: D

13: Which of the following is often used in place of photo identification and a signature whenever a credit card is used in an e-commerce transaction?
A.Billing address verification
B.The purchaser’s public key
C.Cookies deposited by the site’s shopping cart
D.Information verified by a Public Key Infrastructure (PKI) company
Correct Answers: A

14: The certificate authority (CA) cryptographically signs a certificate file with its private key. Anyone can verify the certificate signature with the public key. This is known as:
A.hash encryption.
B.binary-key encryption.
C.symmetric-key encryption.
D.asymmetric-key encryption.
Correct Answers: D

15: What is the name for a tax on goods that are shipped internationally?
B.Sales tax
C.Tax barrier
D.Value-added tax (VAT)
Correct Answers: A

16: What is the result of an e-commerce HTTP server that processes the input queue at a rate equal to or greater than that of incoming requests?
A.A bottleneck occurs.
B.Network bandwidth decreases.
C.The server performs adequately.
D.The site visitor experiences a delay.
Correct Answers: C

17: According to the X.509 (ITU) standard, which of the following is a non-standard certificate field that can contain additional information such as date of birth?
B.Extensions (v3)
C.Subject (User) Name
D.Subject Public-Key Information
Correct Answers: B

18: What aspect of e-commerce marketing most significantly differentiates the use of a niche marketing strategy from that of a global marketing strategy?
A.Advertising media choices
B.Common customer interests
C.Products and/or services offered
D.Geographic distribution of the customers
Correct Answers: B

19: What is the term for using a single secret key to both encrypt and decrypt your data?
A.Hash encryption
B.Binary-key encryption
C.Symmetric-key encryption
D.Asymmetric-key encryption
Correct Answers: C

20: An e-commerce site administrator believes that her site’s security has been compromised. The most important participants of her recovery plan are the Web team, law enforcement and the: department.
B.certificate authority (CA).
C.server software publisher.
D.Internet Service Provider (ISP).
Correct Answers: D