Exam 10: Enterprise Resource Planning and Collaboration Systems
Exam 1: Information Systems in Business160 Questions
Exam 2: Strategic Decision Making126 Questions
Exam 3: E-Business155 Questions
Exam 4: Ethics and Information Security140 Questions
Exam 5: It Architectures171 Questions
Exam 6: Databases and Data Warehouses87 Questions
Exam 7: Networks, Telecommunications, and Wireless Computing131 Questions
Exam 8: Supply Chain Management92 Questions
Exam 9: Customer Relationship Management110 Questions
Exam 10: Enterprise Resource Planning and Collaboration Systems200 Questions
Exam 11: Business Basics146 Questions
Exam 12: Business Process61 Questions
Select questions type
A(n) _________ is software written with malicious intent to cause annoyance or damage.
(Short Answer)
5.0/5
(40)
A(n) _________ is a type of virus that spreads itself, not only from file to file, but also from computer to computer.
(Short Answer)
4.7/5
(36)
Who works at the request of the system owners to find system vulnerabilities and plug the holes?
(Multiple Choice)
5.0/5
(40)
The _________ Act restricts what information the federal government can collect.
(Short Answer)
4.8/5
(41)
Which of the following is an effect of employee monitoring?
(Multiple Choice)
4.8/5
(33)
A(n) __________ use policy contains general principles to guide the proper use of the Internet.
(Short Answer)
4.8/5
(37)
Surprisingly, the biggest issue surrounding information security is not a people issue, but a technical issue.
(True/False)
4.9/5
(32)
____________ security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
(Short Answer)
4.8/5
(43)
The most common type of defence within detection and response technologies is _________ software.
(Short Answer)
4.7/5
(44)
Who finds hacking code on the Internet and click-and-points their way into systems to cause damage or spread viruses?
(Multiple Choice)
4.7/5
(44)
ePolicies are policies and procedures that address the ethical use of computers and Internet usage in the ___________ environment.
(Short Answer)
4.9/5
(41)
Information security ______________ identify the rules required to maintain information security.
(Short Answer)
4.9/5
(43)
Which of the following is part of the acceptable use policy stipulations?
(Multiple Choice)
4.8/5
(36)
Opt-in implies that the customers will only be contacted if they agreed to receive promotions and marketing material.
(True/False)
4.9/5
(45)
What type of backup strategy would you recommend to an organization that deals with small amounts of non-critical information?
(Multiple Choice)
5.0/5
(35)
A(n) ______________ site is a separate and fully equipped facility where the company can move immediately after a disaster and resume business.
(Short Answer)
4.9/5
(36)
Tokens are small electronic devices that change user passwords automatically.
(True/False)
4.7/5
(43)
Showing 61 - 80 of 200
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)