Exam 10: Enterprise Resource Planning and Collaboration Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is part of the acceptable use policy stipulations?

(Multiple Choice)
4.7/5
(36)

Which of the following describes privacy?

(Multiple Choice)
4.8/5
(32)

Managing ___________ access to information is a critical piece of the data architecture.

(Short Answer)
4.8/5
(48)

The purpose of PIPEDA is to provide Europeans with a right of privacy with respect to how their personal information is collected, used, or disclosed by an organization.

(True/False)
4.9/5
(38)

Which policy typically contains a nonrepudiation clause?

(Multiple Choice)
4.8/5
(30)

Which of the following describes information technology monitoring?

(Multiple Choice)
4.8/5
(45)

___________-hat hackers break into other people's computer systems and may just look around or may steal and destroy information.

(Short Answer)
4.7/5
(37)

Who breaks into other people's computer systems and just looks around or steals and destroys information?

(Multiple Choice)
4.8/5
(29)

Information security policies detail how an organization will implement the information security plan.

(True/False)
4.8/5
(37)

What attacks computer systems by transmitting a virus hoax, with a real virus attached?

(Multiple Choice)
4.9/5
(33)

What is the ideal type of decisions for people in an organization to make?

(Multiple Choice)
4.9/5
(36)

What is the policy that contains general principles to guide computer user behaviour?

(Multiple Choice)
4.7/5
(37)

_______________ kiddies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.

(Short Answer)
4.9/5
(40)

Which of the following is a type of backup/recovery media?

(Multiple Choice)
4.7/5
(32)

A(n) information security ____________ details how an organization will implement the information security policies.

(Short Answer)
4.8/5
(34)

Define backup and recovery and explain the importance of the disaster recovery cost curve to an organization.

(Essay)
4.9/5
(35)

Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.

(True/False)
4.8/5
(37)

Smart card is a(n) _______ that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing.

(Short Answer)
4.9/5
(41)

What are the policies and procedures that address the ethical use of computers and Internet usage in the business environment?

(Multiple Choice)
4.8/5
(39)

What is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard?

(Multiple Choice)
4.8/5
(34)
Showing 21 - 40 of 200
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)