Exam 10: Enterprise Resource Planning and Collaboration Systems
Exam 1: Information Systems in Business160 Questions
Exam 2: Strategic Decision Making126 Questions
Exam 3: E-Business155 Questions
Exam 4: Ethics and Information Security140 Questions
Exam 5: It Architectures171 Questions
Exam 6: Databases and Data Warehouses87 Questions
Exam 7: Networks, Telecommunications, and Wireless Computing131 Questions
Exam 8: Supply Chain Management92 Questions
Exam 9: Customer Relationship Management110 Questions
Exam 10: Enterprise Resource Planning and Collaboration Systems200 Questions
Exam 11: Business Basics146 Questions
Exam 12: Business Process61 Questions
Select questions type
Which term describes legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident?
(Multiple Choice)
4.7/5
(46)
What is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting?
(Multiple Choice)
4.9/5
(40)
Social engineering means using one's _______ skills to trick people into revealing access credentials or other information valuable to the attacker.
(Short Answer)
4.7/5
(35)
What is the most costly and intrusive form of authentication?
(Multiple Choice)
4.9/5
(35)
_______________ is software to generate ads that installs itself on a computer when a person downloads some other program from the Internet.
(Short Answer)
4.9/5
(39)
Describe the relationships and differences between hackers and viruses.
(Essay)
4.8/5
(43)
What are the technologies available to help prevent and build resistance to attacks?
(Multiple Choice)
4.7/5
(37)
___________ attack computer systems by transmitting a virus hoax, with a real virus attached.
(Short Answer)
5.0/5
(32)
The biggest issue surrounding information security is a technical issue.
(True/False)
4.9/5
(31)
Tokens are small electronic devices that change user passwords __________.
(Short Answer)
4.9/5
(35)
Briefly detail what information privacy is and the differences in privacy legislation among Europe, US, and Canada.
(Essay)
4.8/5
(43)
What is a separate and fully equipped facility where the company can move immediately after a disaster and resume business?
(Multiple Choice)
4.9/5
(31)
What is software that is manufactured to look like the real thing and sold as such?
(Multiple Choice)
4.8/5
(28)
What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?
(Multiple Choice)
4.9/5
(35)
Showing 41 - 60 of 200
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)