CompTIA EK0-002 Short notes: Exam Passing Tips

e-business Infrastructure

  • File Transfer Protocol (FTP) is an Internet service that helps in transferring files from one computer to another over the Internet.
  • Layer 2 Tunneling Protocol (L2TP) is a more secure version of Point-to-Point Tunneling Protocol (PPTP). It provides tunneling, address assignment, and authentication.
  • Virtual private network (VPN) uses a tunneling protocol to span public networks, such as the Internet, without security risk. VPN enables remote users to access corporate networks securely by using a tunneling protocol such as PPTP or L2TP.
  • TCP/IP is the primary protocol of the Internet.
  • SMTP uses port 25 by default.
  • Address Resolution Protocol (ARP) is a network maintenance protocol of the TCP/IP protocol suite. It is responsible for the resolution of IP addresses to media access control (MAC) addresses of a network interface card (NIC).
  • FTP uses port 20 and 21 by default.
  • MIME stands for Multipurpose Internet Mail Extensions. It is a standard for multi-part, multimedia electronic mail messages and World Wide Web hypertext documents on the Internet.
  • The TCP/IP protocol should be bound to the dial-up adapter for Internet access on a Windows 98 computer.
  • The MGET command is used to download multiple remote files to a local computer, using the current file transfer type.
  • ATM uses 53 byte packets to transfer data.
  • Telnet enables a user to access a UNIX server, using a text-based connection.
  • UDP is a connectionless protocol.
  • Protocol is a set of rules.
  • Push technology automatically transfers updated data to a Web client at a specified time. The update is initiated by the information server instead of clients having to request for it.
  • Hypertext Transfer Protocol (HTTP) is used on the World Wide Web (WWW) to display Hypertext Markup Language (HTML) pages.
  • PPP is a remote access protocol that supports encryption.
  • VPN is an example of extranet.
  • Lightweight Directory Access Protocol (LDAP) is a protocol used to access directory services. It runs over TCP/IP for clients to query and manage information in a Directory Service over a TCP connection using port 389.
  • Dynamic Host Configuration Protocol (DHCP) is a TCP/IP standard used to dynamically assign IP addresses to computers, so that they can communicate with other network services.
  • The following list shows the ports assigned to the protocols by default:
    Protocol Port Number

    • SMTP 25
    • Telnet 23
    • FTP 21
    • HTTP 80
    • POP3 110
  • E-mail service is based on Post Office Protocol 3 (POP3) and Simple Mail Transfer Protocol (SMTP).
  • Hypertext Transfer Protocol Secure (HTTPS) is a protocol used in the Universal Resource Locater (URL) address line to connect to a secure site.
  • Secure Shell (SSH) is a protocol. It uses public key encryption as the main method for user authentication.
  • B2C stands for business-to-consumer. B2C involves transactions conducted between businesses and consumers over the Internet. For example, placing an order for a book or a home appliance by a consumer to a business over the Internet.
  • Bandwidth is a term used to describe the amount of information or data that can be carried on a network at one time.
  • PPTP and HTTPs are the protocols used for establishing a secure connection over the Internet.
  • Electronic commerce includes buying and selling of goods and services, and transferring funds, through digital communications.
  • E-Commerce increases efficiency, opens new markets, and can be used to communicate directly with a customer.
  • The Internet was first used in the late 1960s. It began in the form of ARPANET, which was created by the Advanced Research Projects Agency (ARPA) of the Department of Defense (DOD) in USA. The ARPANET consisted of research universities and military contractors with computers linked by telephone lines.
  • Electronic Data Interchange (EDI) is a set of standards for controlling the exchange of business documents such as purchase orders, invoices, and sales orders, between organizations. This standard is used for American domestic trade.
  • Electronic publishing is a term used for transfer of information through electronic media. The information can be published through CDs and various other online services.
  • E-publishing provides the following advantages:
    • The ease of transferring data via digital media.
    • Reduces paperwork.
    • Less expensive.
  • Gopher is an Internet protocol designed to search, retrieve, and display text documents from remote computers or sites.
  • VPN stands for virtual private network. It allows users to use the Internet as a secure pipeline to their corporate local area networks (LANs).
  • Open Buying on the Internet (OBI) is a standard process that identifies how a company makes a purchase through the Internet from a selling company.
  • Open Trading Protocol (OTP) defines standards to enable a consistent framework for multiple forms of electronic commerce.
  • Internationalization is a trend, which is considered to make an e-commerce site global.
  • The URLs in a Web directory are not automatically indexed. They are arranged hierarchically.
  • A bridge is an interconnectivity device that connects two local area networks (LANs) or two segments of the same LAN using the same communication protocols, and provides address filtering between them.
  • B2C and B2B are types of e-commerce.
  • B2B stands for business-to-business. B2B involves transactions conducted between businesses on the Internet. It is used to exchange products, services, or information between businesses. B2B is also known as e-biz.
  • FAQs are the answers to most of the questions that are very often asked by customers.
  • Portal storefronts can be used as entry-level solutions for small businesses.
  • Visual Basic is a language that is used to create Windows applications.
  • In entry-level e-commerce, a merchant will not consider an unlimited budget, the reason being that he is still a new entrant into e-commerce. An unlimited budget may prove to be a loss for the merchant.
  • Affiliate programs are services in which a link or button is provided on a merchant’s Web site.
  • The integration that can be used to manage data, security, etc., for the sales of goods and services conducted through the Internet is known as e-commerce.
  • B2B is a type of e-commerce where a transaction is performed between two companies or businesses.
  • An online store has the following advantages:
    • Technical details of running an online store will not be required.
    • Cheaper to set up an online store on an established Web site.
    • Store name will be listed on the site.
  • Secure Electronic Transaction (SET) is a standard protocol for secure electronic transactions, such as credit card payments, over the Internet. SET uses 56-bit Data Encryption Standard (DES) encryption and requires digital signatures to verify the identities of all parties involved in a transaction.
  • The merchant account is used for credit card processing. A merchant is a person or organization that sells goods or services to a cardholder.
  • Electronic Funds Transfer (EFT) is a method of automating the payment process. EFT allows businesses to conduct financial transactions electronically.
  • Digital signature is a personal authentication method based on encryption and authorization codes.
  • A payment gateway is required to process online credit card payments. It is a mechanism to process credit card transactions for validation and to transfer funds.
  • There are three types of transactions during a digital cash procedure. The types of transactions are as follows:
    • Withdrawal
    • Payment
    • Deposit
  • The following are entities that are involved in digital cash system:
    • Bank or financial network
    • Payer or a consumer
    • Payee or shop
  • Digital cash is anonymous, portable, and transferable.
  • EBPP stands for Electronic Bill Presentment and Payment. It is a process through which companies create bills for their customers and receive payments from them electronically over the Internet.
  • Customers may use EFT to electronically transfer the amount to their suppliers, instead of issuing checks on the arrival of goods.
  • Automated Clearing House (ACH) is a highly reliable and efficient nationwide batch-oriented electronic funds transfer system.
  • A payment gateway is a combination of software and hardware that provides an interface to the bank card processing network.
  • NetCash is not an online payment system.
  • Digital cash is a system that allows a person to pay for goods or services by transmitting a unique number from one computer to another.
  • Digital cash does not contain the identity of its purchaser, as user information is not required with digital cash.
  • Payment gateway is a mechanism to validate the processing of a credit card transaction and to transfer funds.
  • E-mail is not a model of payment supported by e-commerce.
  • A payment gateway is not a credit card processor. It is a link to a credit card processor and is used to authorize or deny credit card payments.
  • A credit card is a plastic card with a magnetic strip. It is issued by a bank to an individual and can be used to perform bank transactions on the Internet.
  • PDN stands for Private Digital Network. It is a computer network that is used to transfer information of a credit card securely.
  • Personalized pages are the best way to show information that is based on the customers’ last visits or purchases. By doing so, the customers will feel comfortable with the site.
  • Publisher sites are those sites that sell advertisements and solely depend upon advertisements for revenue.
  • A Web form can be used to get input from users. It contains textfields and textareas in which a user can type his e-mail address and other information and send it by using the submit button.
  • The extranet is used to specify the nature of access to a Web site. The extranet is an area on a Web site that is available only to a set of registered visitors.
  • Extranet is an area of a company’s Web site, which is available only to selected customers, suppliers, and business partners. It allows users limited access to a company’s intranet.
  • Knowledge Query and Manipulation Language (KQML) is a language and protocol for knowledge management such as exchanging information and knowledge. It is used as a language for an application program to interact with an intelligent system.
  • KQML is both a message format and a message-handling protocol to support run-time knowledge sharing among agents.
  • A Web form can be used as an entry point in a knowledge base.
  • A knowledge base can be made successful by maintaining it, updating the knowledge base, and informing users about new topics that are inserted in the knowledge base.
  • Co-browsing is a type of e-service in which a customer support representative is allowed to control the customer’s browser.
  • Online community is used to know about customers’ opinion about a product.
  • Online community can be created by using banners.
  • A message board is a type of Web service where customers can have discussions for a long period of time.
  • Polls contain a question with several options, whereas surveys contain many questions to be answered.
  • According to the Digital Millennium Copyright Act (DMCA), selling code-cracking devices or software on an e-commerce site is not permitted.
  • The Digital Millennium Copyright Act (DMCA) protects ISPs from copyright infringement liability for simply transmitting copyright material over the Internet.
  • The credit card issuing company has violated the Privacy law. According to the Internet Privacy law, a company cannot provide their customer’s financial and personal details to other companies.
  • If an ISP notices that his customer’s Web site has constituted a copyright infringement, the ISP will remove the copyrighted content from the Web site.
  • According to the Digital Millennium Copyright Act (DMCA), it is not illegal for a site to provide free downloads of shareware.
  • An intellectual property is a creative idea and expression that possesses commercial value and receives the legal protection of a property right.
  • When a copyrighted article is published by its owner, republishing the article by another person constitutes a copyright violation.
  • The Paris Convention governs the management of intellectual property.
  • Digital Millennium Copyright Act was passed by Congress and then signed by the President. Title II – the Online Copyright Infringement Liability Limitation Act, sets clear guidelines through which an ISP will not be held for copyright infringement by following specific guidelines dictated by the new law.
  • A new section 43(d) of the Trademark Act (Lanham Act) states that anyone who in bad faith registers, traffics in, or uses a domain name that infringes or dilutes another’s trademark has committed trademark infringement.
  • A copyright is a form of intellectual property, which secures to its holder the exclusive right to produce copies of his or her works of original expression, such as a literary work, movie, musical work or sound recording, painting, photograph, computer program, or industrial design, for a defined, yet extendable, period of time.
  • A trademark is a mark that is used by a company to distinguish its products from those of other companies.
  • Industrial Property Law includes industrial design, invention, trademark, etc.
  • Tariff is a tax imposed by countries when goods are brought across their borders.
  • A product can be patented for an unlimited period of time.
  • Patent laws are used to protect the duplication of software. Software patents cover the algorithms and techniques that are used in creating software. It does not cover the entire program of the software.
  • A Web site can be protected from lawsuits by restricting customers according to their locations, restricting shipping in certain areas, and restricting the access to the site.

Business Initiatives for e-business

  • An online product catalog contains information of the products sold in the site, their prices, images, rates and other related information. This catalog is important for every e-commerce site, as it helps the buyer to purchase products.
  • The growth of e-business depends on various factors such as constant availability of the online store, Electronic Data Interchange, increasing bandwidth.
  • ERP stands for Enterprise Resource Planning. It is used to create a plan for a business management system. It includes all the departments of a business such as planning, marketing, manufacturing, etc.
  • Shopping cart is a software application that is used in e-commerce. It assists people in online shopping. The software helps customers to select items and calculate bills.
  • Online promotion does not face the risk of attracting customers.
  • Security should be most concerned to conduct the e-business successfully.
  • A financial risk is a risk that is related to money. Money can be an income or an expense incurred by a company. If the money is related to investment, it is a capital risk. If it is related to currencies of other countries, it is a currency risk.
  • Polls are a kind of survey. They can be used to ask a customer about the quality of a product or to know about the defects or weaknesses of a product, and so on, in order to improve the product.
  • SWOT stands for Strengths, Weaknesses, Opportunities, and Threats. It is a part of business policy that helps an individual or a company to make decisions.
  • Return on Investment (ROI) is the ratio of the profit or loss on an investment to the amount of money invested.
  • Bandwidth is a measure of frequency. It is measured in hertz for analog devices, and in bits per second for digital devices.
  • Search engine can be used to index and facilitate searches on Web pages and news group articles.
  • A search engine is a program that searches for keywords in a document, database, or a Web page on the World Wide Web (WWW).
  • A hit counter is a simple counter that displays the number of visitors to a page. Hit counters are generally found at the bottom of the HTML pages.
  • Communication refers to the process of sending and receiving information between two or more users.
  • The payment models used in e-commerce are credit cards, cash, and checks.
  • Tangible goods are physical goods that can be touched or seen by a user.
  • A Web site that is created should be efficient and easy to use. This is the main idea behind usability.

e-business Strategy and Planning

  • List server is an SMTP server that forwards e-mails it receives to all the members in the list of e-mail recipients forming a discussion group.
  • SQL stands for Structured Query Language. It is used for requesting information from a database. It also contains statements for inserting, updating, and administering data and objects in a database.
  • A site map is an online table of contents. It is a Web page that provides hyperlinks to Web site resources. A site map is an extremely useful navigation mechanism for most Web sites.
  • Microsoft Internet Information Server (IIS) is a Web and application server for the Internet and private intranets.
  • A Web-based application uses Data Source Name (DSN) to connect to a database. DSN is a logical name used by Open Database Connectivity (ODBC) to refer to connection information required to access data.
  • Index server is used to enable Web searching on corporate intranets and Internet sites. Once installed, it automatically builds an index of a Web server that can be easily searched from any Web.
  • Web site’s traffic can be measured by the number of visitors on the Web site.
  • A Web browser that sends a query to a database on a Web server is known as a client.
  • The maximum session-key strength supported by IIS server is 128-bit. You can configure the Web server to require a 128-bit minimum session-key strength, rather than the default 40-bit key strength, for all SSL secure communication sessions.
  • Electronic commerce, popularly known as e-commerce, refers to the method of conducting business communication and transactions over networks and through computers.
  • A cookie is a small bit of text that accompanies requests and pages as they move between Web servers and browsers. It contains information that is read by a Web application, whenever a user visits a site.
  • Cookies are stored in the memory or hard disk of client computers. A Web site stores information, such as user preferences and settings in a cookie.
  • Schema refers to the structure of a database. It is a database definition containing information about all the objects in a database, such as tables, columns in each table, and the relationships between tables in a relational database.
  • Dreamweaver is an HTML editor that offers tools for HTML page creation and Web site management.
  • Boot sector, network files, and system files are vulnerable to virus attacks.
  • The Web browser’s Security setting controls the way in which a Web browser receives information and downloads content from Web sites.
  • SYN attack refers to a condition in which a hacker sends a bunch of packets that leave TCP ports half open.
  • Packet filtering is a method that allows or restricts the flow of specific types of packets to provide security.
  • Public Key Infrastructure (PKI) provides security through data encryption and digital signature.
  • The encryption frameworks and digital signatures have been developed to address security issues in the e-commerce system.
  • Hypertext Transfer Protocol Secure (HTTPS) is used to access a secure Web server on the Internet. In case of a SSL connection between a Web browser and a Web server, you must enter HTTPS instead of HTTP as the protocol type in the URL.
  • A firewall is a combination of software and hardware that prevents data packets from coming in or going out of a specified network or computer.
  • Click-through rate is the total number of users visiting a Web site by clicking the banner advertisement.
  • CPM refers to the cost per thousand impressions. It is a method to price banner advertisements.
  • The click-through ratio is used to describe the ratio of clicks to impressions on an advertisement. It helps a Webmaster to know the ratio of people visiting a site advertised through the banner in relation to the number of times the banner is shown.
  • The number of hits per page will help you rank the Web pages in your site according to their popularity. The number of hits per page denotes the number of clicks on that particular page. The more the number of hits, the more popular is the page.
  • Target marketing is a process of determining the areas where the online promotion is viewed by the audience and make marketing strategies accordingly.
  • Banners are media that advertise products or services by placing them as hyperlinks on Web pages.
  • A banner is an image advertisement on a Web page that is linked to the Web page of the advertiser’s Web site.
  • CPC stands for cost per click. It is an Internet formula that is used to price banner ads. The payment is made to the publishers by their advertisers on the basis of the number of clicks on a specific banner ad.
  • The size of banner ads is measured in pixels.
  • Banners can be used for giving ads on a portal or a Web site.
  • A page view refers to only the number of times a Web page is accessed, whereas a hit refers to the number of times a Web page is accessed with all its objects and contents.
  • Advertising is a process adopted by companies to promote their goods and services. Companies use different modes of advertising such as television, radio, Internet, etc., for the promotion of their products and services.
  • Online promotion is a technique that is used to attract customers to buy products or services. Online promotion can be conducted through various means such as banners, images, animations, etc.
  • Target marketing is used to market the products to all customers of a specific area.
  • Online promotion refers to the promotion of goods and services, whereas online marketing refers to selling of goods and services. Online promotion is conducted to improve the marketing of a product.
  • A publisher site is used to sell advertisements.
  • Pretty Good Privacy (PGP) is an encryption method that uses public-key encryption to encrypt and digitally sign e-mail messages during communication between e-mail clients.
  • IITF stands for Information Infrastructure Task Force. It consists of high-level representatives of the Federal agencies that play a major role in the development and application of information technologies.
  • Monitoring the computer hard disks or e-mails of employees pertains to the privacy policy of an organization.
  • An intranet is a private network that is contained within an enterprise. Intranet is used to share company information and computing resources among employees. It is also used to facilitate working in groups and for teleconferencing.
  • Opt-in is a technique of collecting an email list of users by providing them a form to subscribe on a Web site.
  • E-mail marketing can be performed through opt-in technique.
  • If a company hides faults in its products and supplies them to its customers, it will give a bad name to the company.
  • Backup is a technique of storing data in different media such as a magnetic tape, CD, floppy, etc. This data can be restored if there is any damage due to any disaster.
  • The antivirus provides the facility of continuously scanning all the applications and other programs for any viruses. Whenever an antivirus detects a virus, it takes measures to destroy it and secure the system.
  • A disaster recovery plan should contain data, hardware, and software that can be critical for a business.
  • Inventory refers to the stock of a specific product kept by a seller.
  • A catalog is a compilation of product details. It contains a list of products or services and can be used to put on a Web page all information that is necessary for the products or services offered by a company. A customer can access all information about a product in the catalog.
  • Inventory does not depend on cash reserves. It depends on the demand of a product, and the cost and time required for manufacturing the product.
  • The advantages of e-commerce are exploring new markets, reduction in overhead and paperwork.
  • In order to maintain inventory following should be kept in mind:
    • Time
    • Demand
    • Cost
  • Capacity planning refers to the process of adjusting the production capacity of a company to meet the changed or predicted demands.
  • Lead capacity refers to adding capacity due to increase in demand.
  • Capacity planning is of the following types:
    • Lead capacity
    • Lag capacity
    • Match capacity
  • The planning phase is essential to the success of a Web development project. During the planning phase, the developer identifies the project goals, performs feasibility study, and determines the content to be presented.
  • Keep the following techniques in mind while developing Web sites:
    • Use few colors.
    • Use the correct image standards.
    • Specify image size so that the rest of the page can render while images load.
    • Keep background images small or use color instead of images.
  • Payment gateway: It is one of the most important considerations while designing the payment part of the site. Payment modes can hamper or increase your site’s usability.
  • Shipping and handling: As shipping and handling are directly related to the potential customer, they are also important considerations.
  • Online catalog: It is also an important consideration in the designing stage of an e-commerce site. As users are going to interact mostly to this part of the site, Webmaster needs to take great care of it.
  • The customer’s privacy and safety are the most important things to consider while designing an e-commerce site.
  • The content inventory includes information to be given on the site and site functionality.
  • Log file information is not stored in e-business.
  • An order form should not contain a credit card number. A customer would not prefer to disclose his credit card number, as it can be misused.
  • A newsgroup can provide correct information related to a company. A newsgroup is a public bulletin board where Internet users can communicate easily and post, read, and reply to incoming messages.
  • Customers can launch their complains through call centers and help desks.
  • A help desk is an office that responds to customers’ complaints and helps them resolve their issues.

e-business Infrastructure

  • Web caching is a method for minimizing performance bottlenecks and reducing network traffic by serving locally cached Web content.
  • A Denial-of-Service (DoS) attack is mounted with the objective of causing a negative impact on the performance of a computer or network.
  • Bottlenecks are usually found in network connection, slow hard disks, and lack of memory for static HTML pages. Bottleneck in ASP application performance is connection management.
  • In anonymous authentication method, a user can establish a Web connection to a Web server without providing a username and password.
  • The Commerce Server Site Packager is a deployment tool that has two primary uses. It can be used to package the Microsoft Commerce Server 2002 site into a single file, which includes Internet Information Services (IIS) 5.0 or later settings (metabase), the file system, resources from the Administration database, and SQL Server databases. It can also be used to unpack the Commerce Server site or portions of it onto other computers.
  • The time a Web server takes to provide results in the users’ Web browsers should be considered for monitoring the Web server’s performance.
  • Secure Socket Layer (SSL) is a technology built-in a Web server and browser to encrypt data traveling over the Internet. The Secure Socket Layer (SSL) protocol provides communication privacy, authentication, and message integrity by using a combination of public-key and symmetric encryption.
  • Caching Servers store the Web pages previously retrieved by users in their memory and serve them directly to users who later request for the same data.
  • Use SSL and encrypted authentication to secure a Web server in order to allow only authenticated users to access it.
  • Performance Monitor is used to get statistical information about the hardware and software components of a server.
  • Server optimization is a goal to optimize the performance and resource utilization of a server.
  • A Web server is a computer where the Web pages of a Web site are saved, processes the requests of a Web browser, and has a domain name and an IP address.
  • Log files are those files that are maintained by a Web server. These files record information about a Web site, such as the number of visitors, number of hits, click patterns, etc. Log Analysis software is used to determine information of the log files.
  • Log Analysis can be used to track the effectiveness of a banner.
  • Log Analysis software is used to determine information of the log files.
  • Click pattern is a route through which a user has visited and surfed a Web site.
  • A Web server that is to be set up should have a high quality and be of a reasonable cost. The Web server should be stable and its performance should be good.
  • The performance of a Web server can only be checked through software that is installed on the Web server.
  • Uptime is the length of time a Web server has been running since it was last rebooted.
  • The Not Found error is displayed if the page requested by a user does not exist on a Web server. Its status code is 404.
  • The browser name is not included in the header information sent by a Web server.
  • PWS stands for Personal Web Server. It can be installed on a Windows 98 computer. It is compatible with IIS and can be used for serving a small Web site or an intranet. It can also be used for testing purposes.
  • Encryption is the process of converting text to a format, which cannot be read by humans.
  • Authentication is a process in which a user has to be authenticated before using the resources of a Web server.
  • In order to protect the files related to a Web site from being tampered, following should be applied:
    • A directory and its files can be encrypted to prevent the use of data and its modification.
    • A virtual directory can be created and mapped with the physical directory. Hence, unauthorized users will not be able to locate the actual directory.
    • A directory can be authenticated so that unauthorized users are unable to access it.
    • The visitors of a Web site can access a physical directory through a virtual directory.
  • Throughput is the amount of data that is served to a user in a given period of time.
  • A Web server cannot update the technology of a Web site by itself. The technology used in a Web page can only be updated by the owner of the Web site.
  • Throughput is related to the performance of a Web server.
  • Bottleneck is a situation caused by excessive demand on scarce system resources.
  • Clustering is a way of grouping multiple Web servers to handle heavy traffic.
  • A Web server is a central location where data related to a Web site is saved. A centralized database is easy to maintain. The storing and retrieving of data through the centralized database is also very easy.
  • Hypertext Markup Language (HTML) forms are the most commonly used method of getting information from Web site visitors.
  • The Common Gateway Interface (CGI) specification is used for creating executable programs that run on a Web server.
  • The client-side script controls the front-end (i.e. the browser end) of an application, whereas the server-side scripting, such as ASP, can be used to access a database stored on a Web server.
  • An RDBMS database contains several tables that are related to each other through a primary key and foreign key combination. Managing data in RDBMS is easy for Webmasters.
  • Dynamic HTML (DHTML) is built on an object model that extends the traditional static HTML document.
  • In order to insert rows in a table following SQL scripts can be used:
    INSERT INTO Product (ProductID, ProductName) Values(NULL, “”Speaker Phone””)
    INSERT INTO Product (ProductName) Values(“”Speaker Phone””)
  • Multiple columns can be updated using a single UPDATE statement.
  • A database name can begin with a digit, provided it is enclosed within single quotes.
  • The digits within quotes are treated as a string.
  • A template is a pre-defined structure that can be used for creating Web pages easily.
  • The SELECT statement is used to retrieve data from a database.
  • Firewall is a security facility used to protect the network of an organization from external attacks by intruders.
  • Certificate server is a standards-based, highly customizable server program for managing the creation, issuance, and renewal of digital certificates.
  • Encrypted text is referred to as ciphertext while original text is referred to as plaintext.
  • Firewall is used to protect the network against unauthorized access.
  • Symmetric encryption is a type of encryption that uses a single key to encrypt and decrypt data. Symmetric encryption algorithms are faster than public key encryption.
  • Authentication is a process of verifying the identity of a person, network host, or system process. The authentication process compares the provided credentials with the credentials stored in the database of an authentication server.
  • Public key and private key is used in asymmetric encryption.
  • VeriSign is a certification authority that issues digital certificates. A user can request VeriSign to verify the validity of the certificate.
  • Secure Sockets Layer (SSL) is a protocol developed by Netscape for transmitting private documents via the Internet. Secure Sockets Layer (SSL) uses a combination of public key and symmetric encryption to provide communication privacy, authentication, and message integrity.
  • Firewall should be installed between the LAN and the Internet to protect a LAN against external access and misuse.
  • Certificate-based authentication is the most secure method of authentication. It provides stronger key for encryption as compared to Digest authentication and sends encrypted passwords across the network. This prevents unauthorized users from intercepting the passwords.
  • Anonymous authentication is generally used for public Internet Web sites. Using this method, a user can establish a connection with a Web server without providing username and password.
  • Brute force attack causes account lockouts. In a brute force attack, unauthorized users attempt to log on to a network or a computer by using multiple possible user names and passwords.
  • Asymmetric encryption is a type of encryption that uses two keys – a public key and a private key pair for data encryption.
  • Firewall is available both as software and hardware. You can implement hardware-based firewall for security with minimum administrative effort.
  • Secure Shell (SSH) is a protocol that provides strong authentication and secure communications over unsecured channels.
  • A certificate is a digital representation of information that identifies authorized users on the Internet and intranets.
  • Blocking all the packets, unless they are explicitly permitted, is the most secure policy for a firewall.
  • Mutual authentication is a process in which a client process and server are required to prove their identities to each other before performing any application function.
  • Certification authority (CA) is an entity in a network, which manages security credentials and public keys for message encryption.
  • Certificate Authority is a trusted third-party organization that issues digital certificates to create digital signatures and public key pairs.
  • The following are essential in order to attract visitors to a Web site:
    • The Web site’s rank should be high in search engines.
    • The Web site should have a number of links on other Web sites.
  • In Digest authentication, passwords are sent across a network as a hash value, rather than as clear text.
  • Digest authentication is a more secure authentication method as compared to Basic authentication.
  • Firewall is used to control traffic on a computer network.
  • Following types of servers are dedicated to provide resources to other hosts on the network:
    • Mail servers
    • Print servers
    • Web servers
  • Certificate authority is a trusted third-party organization or company that issues digital certificates to create digital signatures and key pairs.
  • A message digest is a number, which is created algorithmically from a file and represents that file uniquely.
  • Symmetric encryption is the simplest encryption method that can be implemented in this situation.
  • Digital certificate should be used to verify the identity of a potential customer.
  • Firewall configuration is vendor specific, and it only allows access to specified ports to increase security. Thus, you should configure the firewall to allow all the ports you need to access.
  • The process of limiting access to the resources of a Web site is called access control.
  • Access control can be performed in the following ways:
    • Registering a user in order to access the resources of a Web site. This can be confirmed by the user’s name and password.
    • Limiting the time during which resources of a Web site can be used. For example, a Web site can be viewed between certain hours of a day.
  • Authentication is a process that authorizes a message, authorizes the sender of a message, and authorizes the receiver of a message.
  • Public key encryption is the other name for asymmetric encryption.
  • A digital certificate is used with public key encryption.
  • A Certification Authority Certificate is owned by a trusted certificate provider. It is also known as a master certificate.
  • A Certification Authority can issue certificates to other Certification Authorities. It must be trusted by all parties involved in a transaction, and can issue a certificate to many users.
  • Secure Sockets Layer can be used to secure a Web server. Server certificates are necessary in order to use SSL.
  • X.509v3 is the standard established to define the content and format of a digital certificate.
  • Uninterruptible power supply (UPS) is a device that allows a computer to keep running for a short period of time in case of power failure or low voltage, using battery backup.
  • Multiple drive failure is a drawback of RAID.
  • PPTP stands for Point-to-Point Tunneling protocol. It is used to securely connect to the Internet through a TCP/IP connection.
  • High speed dial-up is the most unreliable Internet connection to be used to host an e-commerce site.
  • The measuring unit of bandwidth is hertz.
  • T1 line, ADSL, and DSL can be used for data transmission between computers.
  • Use techniques such as closed network, SSID spoofing, and MAC address filtering to secure wireless networks.
  • The 802.1X standard, defined by IEEE, is designed to enhance the security of wireless local area networks (WLANs) that follow the IEEE 802.11 standard. 802.1X provides an authentication framework for wireless LANs.
  • Wireless Transport Layer Security (WTLS) is a security layer of WAP, which is specifically designed for a wireless environment. It provides privacy, data integrity, and authentication for client-server communications over a wireless network.
  • A portal is a Web site that is used by users as an entry to the Internet. It functions as a central location for browsing the Internet and provides services such as search engines, e-mails, chat rooms, weather information, etc.
  • A portal provides the facilities of a search engine, e-mail, shopping mail service, etc.
  • A knowledge base is a kind of search engine that is connected to a database. It is also known as a central repository or central library.
  • A Java applet is a software program written in Java language. It is distributed as an attachment in a Web document and executed in a Java-enabled Web browser.
  • Java is an object oriented programming language developed by Sun Microsystems. It allows the creation of platform independent executables. Java source code files are compiled into a format known as bytecode (files with .class extension).
  • A message board is a page on a Web site that is used to publish legal notices.
  • Java Servlet is the latest technology used as a Java replacement for CGI. It is a server side Web server extension. Java Servlets provide an easy way for server side code to communicate with web-based clients.
  • The intranet is a network of computers, connected to each other using the TCP/IP protocol. Unlike the Internet, intranet is not global. Intranet sites can be used only by a selected group of users.
  • An XML document must have only one top-level element known as document element or root element. Each element must have both a start tag and an end tag.
  • XML facilitates user-defined tags and attributes on which efficient searches can be performed.
  • Interactivity means conversational exchange of input and output between a user and a computer. An interactive Web site is one that takes input from a user and responds accordingly.
  • Chat services, voice connections and co-browsing can be used as e-services.
  • Voice connection is also known as telephony. In this process, a user can talk to other users through the Internet.
  • A FAQ should include shipping rates, changing or canceling an order, etc.
  • <Script Language= “”JavaScript””> is used to set JavaScript as the scripting language for a Web page.
  • Java database connectivity (JDBC) is a common base application programming interface (API), developed by Sun Microsystems Inc., for accessing data from a database.
  • JavaScript and Perl can be used to create and store cookies on client computers.