Exam 10: Enterprise Resource Planning and Collaboration Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Content filtering, _________, and firewalls are the three types of prevention and resistance technologies.

(Short Answer)
4.8/5
(39)

A(n) _______ is a program or device that can monitor data travelling over a network.

(Short Answer)
4.7/5
(31)

An organization should implement information security lines of defence through people first and _______ next.

(Short Answer)
4.8/5
(34)

The pre-cursor to the Personal Information Protection and Electronic Documents Act (PIPEDA) was the _____________ Act.

(Short Answer)
4.8/5
(33)

_________ is an anti-spamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

(Multiple Choice)
4.8/5
(37)

________ protects individual's health records.

(Multiple Choice)
4.9/5
(34)

_____________ is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents.

(Short Answer)
4.7/5
(42)

Breaches in information ________________ occur when improper disclosure of personal information are made.

(Short Answer)
4.8/5
(35)

Which of the following is not one of the three primary information security areas?

(Multiple Choice)
4.9/5
(32)

A(n) ______________ site is a separate facility that does not have any computer equipment, but is a place where employees can move after the disaster.

(Short Answer)
4.8/5
(41)

What is a policy that a user must agree to follow in order to be provided access to a network or to the Internet?

(Multiple Choice)
4.9/5
(45)

_______________ is a hacker with criminal intent.

(Short Answer)
4.8/5
(40)

Which of the following can be completed by encryption?

(Multiple Choice)
4.8/5
(37)

Which policy is it common practice for many businesses and educational facilities to require employees or students to sign before being granted a network ID?

(Multiple Choice)
4.8/5
(41)

What is a small file deposited on a hard drive by a website containing information about customers and their Web activities?

(Multiple Choice)
4.9/5
(33)

Summarize the five steps to creating an information security plan.

(Essay)
4.8/5
(37)

Employee ________________ policies explicitly state how, when, and where the company monitors its employees.

(Short Answer)
4.9/5
(48)

___________ is a US federal law established in 1998 that applies to the collection of personal information from American children who are under 13 years of age.

(Short Answer)
4.9/5
(37)

___________ is a method for confirming users' identities.

(Short Answer)
4.8/5
(40)

Which policy details the extent to which email messages may be read by others?

(Multiple Choice)
4.8/5
(28)
Showing 181 - 200 of 200
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)