0% found this document useful (0 votes)
38 views6 pages

Exam 2 E-Commerce

The document outlines various internet marketing techniques and e-commerce concepts, including permission marketing, affiliate marketing, and customer retention strategies. It also discusses security measures in e-commerce, such as the use of VPNs and digital certificates, as well as threats like phishing and internal attacks. Additionally, it addresses customer service methods and the importance of personalization in marketing efforts.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views6 pages

Exam 2 E-Commerce

The document outlines various internet marketing techniques and e-commerce concepts, including permission marketing, affiliate marketing, and customer retention strategies. It also discusses security measures in e-commerce, such as the use of VPNs and digital certificates, as well as threats like phishing and internal attacks. Additionally, it addresses customer service methods and the importance of personalization in marketing efforts.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Marketing technique used on the Internet where companies obtain authorization from the

consumers before sending them promotional information:


Answers:
Permission Marketing

Customer retention method that results from the combination of traditional content with
dynamic information adapted to the profile of each user:
Transitive content

To protect ourselves in e-commerce, we must only use technology solutions.


True

Unwanted programs are acquired from web 2.0 sites.


True

Marketing technique, used on the Internet, that allows an agreement for a website to pay for
another website a commission for the new business opportunities that reference the
site:
Affiliate marketing

The privacy policy determines the levels of access to information assets according to the
user level.
True

The first virus that appeared on the Internet was called the Morris virus.
True

Credit cards are the main form of online payment.


True

Customer service technique that requires real-time interactive exchange:


Chat

NFC technology helps the use of mobile payment systems.


True

Company that processes Internet crime complaints in conjunction with the FBI:
IC3

SSL allows for the protection of communication.


FALSE

Requires the user to perform an activity for it to be activated.


Virus
Keyloggers capture the keystrokes made by the user.
True

Macro viruses are those designed to function in a specific application.


True

The zombie in a botnet is responsible for giving the instructions of what is going to be done.
FALSE
Encryption allows to protect the communication channel. Response
False

It refers to the forgery of a website very similar to the original but that is not.
b. Pharming

Phishing uses social engineering to steal user information.


True

Pricing strategy used when introducing a new product to the market.


market
It is free

Customer retention technique that allows changing the product, not just the message.
marketing
Adaptation to the customer's taste

The email sent as a result of permission marketing must always include:


An unsubscribe link

The safety of consumers and the cost for merchants are advantages of the cards.
credit.
False

When using affiliate marketing, it is important to partner with companies that have
relationship with the field to which the website is dedicated.
True

It is used to flood a website from different geographical locations with useless traffic to
saturate it and make the site crash or slow down:
a. DDoS

The company wishes to send its sales catalog via email, within the information
delete
The client keeps information about family, friends, and colleagues.
What is the internet marketing technique that should be applied?
Viral marketing in the 2.0 environment
Karen, due to health problems, is working from home; she needs to have remote access to
the organization's internal networks, but for this, the IT department must ensure that
secure access to the network.
What communication assurance should the IT department apply?
VPN (virtual private networks)

Maria has a company that sells beauty products, so she takes advantage of
the popularity of social media to promote such products through advertisements, the
which is only visualized by women.

The marketing technique used in this case is:


Social media marketing

A user wishes to cancel a subscription that they had previously allowed, but no longer want.
interests. When she accepted the subscription, she wanted to receive information related to babies, but
Your children have grown up and do not wish to continue receiving that information.
Which of the marketing techniques does the above refer to?
Permission marketing

Denia has made a purchase with her credit card through e-commerce, same
what
It will proceed to deny, as the requested product does not meet his expectations.
Which dimension of e-commerce are you referring to?
No repudiation

Diunsa wants its clients to receive messages via email from the
promotions of the month for the products that the customer is interested in, directing them directly
with their name to the clients.
What would be the most suitable online retention technique for this case?
Personalization and one-to-one marketing

A user wishes to delete a subscription that they had previously allowed, but no longer do.
interesting. When she accepted the subscription, she wanted to receive information related to babies, but
Your children have grown up and do not wish to continue receiving that information.
What marketing technique does the above refer to?
Permission marketing

Karen is in charge of the security of the company's servers, as well as of its


clients; Karen wants to protect all the information that is shared between the server and the client.
The technological solutions you can use are:
Operating system, antivirus updates
UNITEC uses web bugs and cookies to collect information about individuals who
they navigate on their website.
Based on the above, what marketing technique could UNITEC use to
promote your services?
Advertising networks

Nestlé is close to launching a new product on the market; it is a liquid chocolate with
the same brand, with the aim of obtaining new customers who consume that product. From the
the following proposals, the one that best describes the above is:
Brand leverage

Hanna is the person in charge of the data center where the information of the website is stored.
From La Curacao; wishes to protect all the information that is sent and received through
different communication channels to prevent that information from being intercepted by someone
unauthorized.
The technological solutions you can implement are:
SSL and VPN

The Marketing area of the company Mariposa Multicolor is evaluating the possibility of
start to
to make online sales, with the sole purpose of distributing and selling the items to their customers. It
What concept does it refer to as previously mentioned?
Canal

A company is evaluating different customer retention techniques and deciding whether to


implement the technique of adapting to the customer's taste for the marketing of your product;
after conducting research, I find several aspects that it encompasses
technique.
The following are statements related to this technique, EXCEPT:
Segment the market based on accurate and timely understanding.

Carlos usually makes a variety of purchases at an online store; Karla, who is his friend, ...
indicates that they may be exposed to many cyber crimes.
Carlos may be exposed to the following vulnerability points in e-commerce,
EXCEPT:
Product

A company is evaluating a series of technological solutions to be able to implement it in


you
What would be the security threat that is NOT part of this case?
Protection of security policies
A bank hires a hacker to break into its system and test its security, since
on two occasions they suffered the intervention of two hackers: the first entered the system, but did not
stole and damaged information, but published what the flaws were, which led to another hacker
took advantage of the disclosed information, and entered, damaged, and stole information from the bank.
What type of hacker would NOT be part of this case?
White hat hackers

Shagui's computer was infected with different malicious codes, one of them may
distribute autonomously to other teams. Shagui installed a calendar that he downloaded from a
shareware site that opened doors for him to be captured while browsing in
the internet due to a vulnerability in its equipment and, since that moment, its computer sends
automatically generated email messages and its fan starts unexpectedly.
What would be the malicious code that is NOT part of this case?
Virus

Miguel often buys items on Shein.com. To enter the site, he enters the URL.
directly in the browser; however, last month you received an email from
security@sheim.com where a message of a password change alert was displayed.
for that site. Miguel clicked on the link that was in the email and entered the website, whose
URL was sheim.com; since he didn’t pay attention to the URL, but only to the appearance of the site, the
which was similar to the place they usually visit, then they made a purchase of 250 dollars, and
never received his products.
What would be the security threat that is NOT part of this case?
Spam

Textiles Manufacturing maquila wishes to establish the prices of its products and decides
differentiate them depending on the characteristics of their clients, with the purpose of selling the
products to different people and groups, based on their willingness to pay.
What concept does it refer to?
Price discrimination

The company Xtreme cares about e-commerce security, which is why it seeks
apply technological solutions, which is why it has decided to obtain a digital document issued by
a certificate authority and that is unique for each entity in the world.
Taking the above into account, the concept being referred to is:
Digital certificate

Carlos is a collaborator at a financial company, where one of his responsibilities is


authorize payments, receives an email that appears to come from an executive in the
organization that requires the collaborator to send a substantial payment to a new provider of the
company; upon reviewing the payments made, they realize that the disbursement of the
money was paid to a non-existent supplier and it was a fraud committed by the accountant
of the company.
According to the above, what type of threat is being referred to?
Internal attacks
A user enters an e-commerce site and has a question, and wants to consult to
clarify your doubt and be able to make a transaction, you will use customer service techniques within
from the e-commerce site; their search will follow the order from the most used
frequent to the least frequent.
What is the order in which the user will implement the techniques?
Frequently asked questions, chat system, telephone service, response system
automated.

Katie, a user, wants to make a purchase in an online store; she is given a series of
Activities to be performed: 1. ISP connects to the store's server.
2. Verification of funds and sending of confirmation.
3. Issuance of purchase order.
4. Order communication travels via the ISP.
Send the order.
6. Shipping the product to the customer.
The transaction is carried out.
From the detailed activities, what is the sequence of steps to follow for the realization of a
purchase transaction in e-commerce?
ANSWER:
d. 5-4-1-2-7-3-6

Daniela wishes to make a transaction and must select an option to make the payment for the
buy on the website.
Which would NOT be a payment option to be used by Daniela?
Digital cheques

A company wants to analyze the characteristics and elements of blog marketing to decide if
use this technique to promote your products.
Their statements related to blog marketing, EXCEPT:
It is the process of acquiring customers to send them the marketing message.
from a company to its family members, friends, and colleagues.

You might also like