Exam 10: Enterprise Resource Planning and Collaboration Systems
Exam 1: Information Systems in Business160 Questions
Exam 2: Strategic Decision Making126 Questions
Exam 3: E-Business155 Questions
Exam 4: Ethics and Information Security140 Questions
Exam 5: It Architectures171 Questions
Exam 6: Databases and Data Warehouses87 Questions
Exam 7: Networks, Telecommunications, and Wireless Computing131 Questions
Exam 8: Supply Chain Management92 Questions
Exam 9: Customer Relationship Management110 Questions
Exam 10: Enterprise Resource Planning and Collaboration Systems200 Questions
Exam 11: Business Basics146 Questions
Exam 12: Business Process61 Questions
Select questions type
An organization should implement information security lines of defence through technology first and people second.
Free
(True/False)
4.7/5
(38)
Correct Answer:
False
Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
Free
(True/False)
4.8/5
(32)
Correct Answer:
False
A(n) ____________ privacy policy details the extent to which email messages may be read by others.
Free
(Short Answer)
5.0/5
(26)
Correct Answer:
What includes a variety of threats such as viruses, worms, and Trojan horses?
(Multiple Choice)
4.8/5
(46)
If an organization were to have only one policy, which one would it want?
(Multiple Choice)
4.7/5
(42)
What is a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing?
(Multiple Choice)
4.8/5
(34)
What type of backup strategy would you recommend to an organization that deals with large volumes of critical information?
(Multiple Choice)
5.0/5
(31)
What is a separate facility that does not have any computer equipment, but is a place where employees can move after the disaster?
(Multiple Choice)
4.9/5
(36)
Surprisingly, the biggest issue surrounding information security is not a technical issue, but a(n) _____________ issue.
(Short Answer)
4.9/5
(42)
Employee monitoring policies explicitly state how, when, and where the company monitors its employees.
(True/False)
4.9/5
(36)
Which of the following is not a part of the email privacy policy stipulations?
(Multiple Choice)
4.8/5
(40)
How individuals behave toward each other, how they handle information, computer technologies, and information systems, are largely influenced by people's ________________.
(Short Answer)
4.8/5
(38)
To facilitate information privacy, many countries have abolished legislation to protect the collection and sharing of personal information.
(True/False)
4.8/5
(32)
Describe the relationship between information security policies and an information security plan.
(Essay)
4.9/5
(35)
Surprisingly, the biggest issue surrounding information security is not a technical issue, but a people issue.
(True/False)
4.8/5
(40)
Which of the following is a program or device that can monitor data travelling over a network?
(Multiple Choice)
4.8/5
(41)
Showing 1 - 20 of 200
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)