A digital certificate
a. authenticates the identity of a consumer.
b. authenticates the identity of a commercial site.
c. is awarded annually to the commercial Web site that registers the most hits.
d. confers a great deal of prestige in the online commercial community.
e. both a and b.
Question 2Which of the following is not one of the common examples of indirect spend?
a. Employee benefits
b. Travel
c. Maintenance, repair, and operating supplies
d. Professional and consulting services
e. Production components
Question 3The S.A.F.e. program developed by CyberQuest
a. validates users' identities on the Internet.
b. prevents minors from accessing violent or pornographic sites.
c. tracks hackers on the internet.
d. provides an in-house escrow system to protect buyers against fraud.
e. protects users against downloading viruses from commercial sites.
Question 4The parameters of which a professional services supplier should be evaluated should include, but not be limited to, quality, cost management, delivery, technical support, and wavelength.
Indicate whether the statement is true or false
Question 5Seventy percent of the complaints on the 1998 roster of Net fraud records compiled by the National Consumers League were against
a. Web auctions.
b. sites which did not validate a customer's identity.
c. governmental sites.
d. retail sites.
e. sites which present X-rated material.
Question 6Assigning and maintaining accurate and representative commodity codes for indirect goods and services across an enterprise is relatively easy.
Indicate whether the statement is true or false
Question 7International trade embargoes do not apply to business conducted on the Internet.
a. True
b. False
Question 8Many buyers are beginning to question the sustainability of cost reductions achieved through reverse auctions over time once the initial reductions are made.
Indicate whether the statement is true or false
Question 9Firewalls can be implemented
a. by network administrators in hardware only
b. by network administrators in software only
c. to protect private networks connected to the Internet
d. by consumers who access the sites
e. by the FCC.