Exam 10: Enterprise Resource Planning and Collaboration Systems
Exam 1: Information Systems in Business160 Questions
Exam 2: Strategic Decision Making126 Questions
Exam 3: E-Business155 Questions
Exam 4: Ethics and Information Security140 Questions
Exam 5: It Architectures171 Questions
Exam 6: Databases and Data Warehouses87 Questions
Exam 7: Networks, Telecommunications, and Wireless Computing131 Questions
Exam 8: Supply Chain Management92 Questions
Exam 9: Customer Relationship Management110 Questions
Exam 10: Enterprise Resource Planning and Collaboration Systems200 Questions
Exam 11: Business Basics146 Questions
Exam 12: Business Process61 Questions
Select questions type
Content filtering, _________, and firewalls are the three types of prevention and resistance technologies.
(Short Answer)
4.8/5
(39)
A(n) _______ is a program or device that can monitor data travelling over a network.
(Short Answer)
4.7/5
(31)
An organization should implement information security lines of defence through people first and _______ next.
(Short Answer)
4.8/5
(34)
The pre-cursor to the Personal Information Protection and Electronic Documents Act (PIPEDA) was the _____________ Act.
(Short Answer)
4.8/5
(33)
_________ is an anti-spamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.
(Multiple Choice)
4.8/5
(37)
_____________ is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents.
(Short Answer)
4.7/5
(42)
Breaches in information ________________ occur when improper disclosure of personal information are made.
(Short Answer)
4.8/5
(35)
Which of the following is not one of the three primary information security areas?
(Multiple Choice)
4.9/5
(32)
A(n) ______________ site is a separate facility that does not have any computer equipment, but is a place where employees can move after the disaster.
(Short Answer)
4.8/5
(41)
What is a policy that a user must agree to follow in order to be provided access to a network or to the Internet?
(Multiple Choice)
4.9/5
(45)
Which policy is it common practice for many businesses and educational facilities to require employees or students to sign before being granted a network ID?
(Multiple Choice)
4.8/5
(41)
What is a small file deposited on a hard drive by a website containing information about customers and their Web activities?
(Multiple Choice)
4.9/5
(33)
Employee ________________ policies explicitly state how, when, and where the company monitors its employees.
(Short Answer)
4.9/5
(48)
___________ is a US federal law established in 1998 that applies to the collection of personal information from American children who are under 13 years of age.
(Short Answer)
4.9/5
(37)
Which policy details the extent to which email messages may be read by others?
(Multiple Choice)
4.8/5
(28)
Showing 181 - 200 of 200
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)