Exam 10: Enterprise Resource Planning and Collaboration Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n) _________ is software written with malicious intent to cause annoyance or damage.

(Short Answer)
5.0/5
(40)

A(n) _________ is a type of virus that spreads itself, not only from file to file, but also from computer to computer.

(Short Answer)
4.7/5
(36)

Who works at the request of the system owners to find system vulnerabilities and plug the holes?

(Multiple Choice)
5.0/5
(40)

The _________ Act restricts what information the federal government can collect.

(Short Answer)
4.8/5
(41)

Which of the following is an effect of employee monitoring?

(Multiple Choice)
4.8/5
(33)

What is recovery?

(Multiple Choice)
4.9/5
(33)

A(n) __________ use policy contains general principles to guide the proper use of the Internet.

(Short Answer)
4.8/5
(37)

Surprisingly, the biggest issue surrounding information security is not a people issue, but a technical issue.

(True/False)
4.9/5
(32)

____________ security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

(Short Answer)
4.8/5
(43)

The most common type of defence within detection and response technologies is _________ software.

(Short Answer)
4.7/5
(44)

Who finds hacking code on the Internet and click-and-points their way into systems to cause damage or spread viruses?

(Multiple Choice)
4.7/5
(44)

ePolicies are policies and procedures that address the ethical use of computers and Internet usage in the ___________ environment.

(Short Answer)
4.9/5
(41)

Information security ______________ identify the rules required to maintain information security.

(Short Answer)
4.9/5
(43)

Which of the following is part of the acceptable use policy stipulations?

(Multiple Choice)
4.8/5
(36)

Recovery is defined as:

(Multiple Choice)
4.8/5
(36)

Opt-in implies that the customers will only be contacted if they agreed to receive promotions and marketing material.

(True/False)
4.9/5
(45)

Which of the following is considered a type of biometrics?

(Multiple Choice)
5.0/5
(33)

What type of backup strategy would you recommend to an organization that deals with small amounts of non-critical information?

(Multiple Choice)
5.0/5
(35)

A(n) ______________ site is a separate and fully equipped facility where the company can move immediately after a disaster and resume business.

(Short Answer)
4.9/5
(36)

Tokens are small electronic devices that change user passwords automatically.

(True/False)
4.7/5
(43)
Showing 61 - 80 of 200
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)