Exam 10: Enterprise Resource Planning and Collaboration Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which term describes legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident?

(Multiple Choice)
4.7/5
(46)

What is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting?

(Multiple Choice)
4.9/5
(40)

Social engineering means using one's _______ skills to trick people into revealing access credentials or other information valuable to the attacker.

(Short Answer)
4.7/5
(35)

What is the most costly and intrusive form of authentication?

(Multiple Choice)
4.9/5
(35)

_______________ is software to generate ads that installs itself on a computer when a person downloads some other program from the Internet.

(Short Answer)
4.9/5
(39)

Which of the following is not considered an ePolicy?

(Multiple Choice)
4.8/5
(30)

Which of the following does a firewall perform?

(Multiple Choice)
4.8/5
(36)

Describe the relationships and differences between hackers and viruses.

(Essay)
4.8/5
(43)

What are the technologies available to help prevent and build resistance to attacks?

(Multiple Choice)
4.7/5
(37)

List and describe the three primary security areas.

(Essay)
4.8/5
(31)

Discuss the reasons why privacy issues lose trust for e-businesses.

(Essay)
4.9/5
(41)

___________ attack computer systems by transmitting a virus hoax, with a real virus attached.

(Short Answer)
5.0/5
(32)

What is social engineering?

(Multiple Choice)
4.9/5
(47)

Describe the relationship between ethics and privacy.

(Essay)
4.9/5
(32)

The biggest issue surrounding information security is a technical issue.

(True/False)
4.9/5
(31)

Tokens are small electronic devices that change user passwords __________.

(Short Answer)
4.9/5
(35)

Briefly detail what information privacy is and the differences in privacy legislation among Europe, US, and Canada.

(Essay)
4.8/5
(43)

What is a separate and fully equipped facility where the company can move immediately after a disaster and resume business?

(Multiple Choice)
4.9/5
(31)

What is software that is manufactured to look like the real thing and sold as such?

(Multiple Choice)
4.8/5
(28)

What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?

(Multiple Choice)
4.9/5
(35)
Showing 41 - 60 of 200
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)