Exam 10: Enterprise Resource Planning and Collaboration Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An organization should implement information security lines of defence through technology first and people second.

Free
(True/False)
4.7/5
(38)
Correct Answer:
Verified

False

Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.

Free
(True/False)
4.8/5
(32)
Correct Answer:
Verified

False

A(n) ____________ privacy policy details the extent to which email messages may be read by others.

Free
(Short Answer)
5.0/5
(26)
Correct Answer:
Verified

email

What is a backup?

(Multiple Choice)
4.7/5
(34)

What includes a variety of threats such as viruses, worms, and Trojan horses?

(Multiple Choice)
4.8/5
(46)

If an organization were to have only one policy, which one would it want?

(Multiple Choice)
4.7/5
(42)

What is a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing?

(Multiple Choice)
4.8/5
(34)

What type of backup strategy would you recommend to an organization that deals with large volumes of critical information?

(Multiple Choice)
5.0/5
(31)

What is a separate facility that does not have any computer equipment, but is a place where employees can move after the disaster?

(Multiple Choice)
4.9/5
(36)

Surprisingly, the biggest issue surrounding information security is not a technical issue, but a(n) _____________ issue.

(Short Answer)
4.9/5
(42)

Employee monitoring policies explicitly state how, when, and where the company monitors its employees.

(True/False)
4.9/5
(36)

Which of the following is not a part of the email privacy policy stipulations?

(Multiple Choice)
4.8/5
(40)

How individuals behave toward each other, how they handle information, computer technologies, and information systems, are largely influenced by people's ________________.

(Short Answer)
4.8/5
(38)

To facilitate information privacy, many countries have abolished legislation to protect the collection and sharing of personal information.

(True/False)
4.8/5
(32)

Describe the relationship between information security policies and an information security plan.

(Essay)
4.9/5
(35)

Surprisingly, the biggest issue surrounding information security is not a technical issue, but a people issue.

(True/False)
4.8/5
(40)

Who are hackers with criminal intent?

(Multiple Choice)
4.8/5
(41)

Describe authentication and the most secure type of authentication.

(Essay)
4.8/5
(34)

Which of the following is a program or device that can monitor data travelling over a network?

(Multiple Choice)
4.8/5
(41)

Explain how HIPAA protects individual's health records?

(Essay)
4.7/5
(45)
Showing 1 - 20 of 200
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)