Exam 10: Enterprise Resource Planning and Collaboration Systems
Exam 1: Information Systems in Business160 Questions
Exam 2: Strategic Decision Making126 Questions
Exam 3: E-Business155 Questions
Exam 4: Ethics and Information Security140 Questions
Exam 5: It Architectures171 Questions
Exam 6: Databases and Data Warehouses87 Questions
Exam 7: Networks, Telecommunications, and Wireless Computing131 Questions
Exam 8: Supply Chain Management92 Questions
Exam 9: Customer Relationship Management110 Questions
Exam 10: Enterprise Resource Planning and Collaboration Systems200 Questions
Exam 11: Business Basics146 Questions
Exam 12: Business Process61 Questions
Select questions type
Distributed denial-of-service attack (DDoS) attacks from multiple __________ that flood a website with so many requests for service that it slows down or crashes.
(Short Answer)
4.9/5
(39)
Describe the important ethical concepts stemming from information technology.
(Essay)
4.8/5
(28)
Organizations should choose a(n) _________________ and recovery strategy that is in line with its business goals
(Short Answer)
4.9/5
(32)
A(n) ____________ computer use policy contains general principles to guide computer user behaviour.
(Short Answer)
4.9/5
(39)
Ethical concerns over employee monitoring occurs when the monitoring is unprecedented or overly intrusive.
(True/False)
4.9/5
(44)
If there is a security breech on your organizational information systems, which information security area is best suited to handle the breech?
(Multiple Choice)
4.7/5
(35)
_________ implies that contact will be made with only the people who had agreed to receive promotions and marketing materials.
(Short Answer)
4.8/5
(38)
The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file.
(True/False)
4.9/5
(36)
The biggest issue surrounding information security is the technical issue, i.e. technical safeguards to information.
(True/False)
4.9/5
(41)
_________ have philosophical and political reasons for breaking into systems and will often deface the website as a protest.
(Short Answer)
4.9/5
(31)
What is a type of virus that spreads itself, not just from file to file, but also from computer to computer?
(Multiple Choice)
4.8/5
(36)
What floods a Web site with so many requests for service that it slows down or crashes the site?
(Multiple Choice)
4.8/5
(38)
Fault tolerance is a computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service. Fault tolerance can be provided with software, or embedded in hardware, or provided by some combination
(True/False)
4.8/5
(39)
_________ filtering occurs when an organization uses software that filters content to prevent the transmission of unauthorized information.
(Short Answer)
4.7/5
(33)
What is the unauthorized use, duplication, distribution, or sale of copyrighted software?
(Multiple Choice)
4.9/5
(36)
The _______ of Death is a common type of DDoS and occurs when thousands of computers try to access a website at the same time, overloading it and shutting it down.
(Short Answer)
4.8/5
(42)
Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?
(Multiple Choice)
4.9/5
(42)
Developing the information security policies is the ________________ step for creating an information security plan.
(Short Answer)
4.9/5
(33)
Information privacy is about the prevention of collecting and sharing personal information.
(True/False)
4.7/5
(35)
Showing 81 - 100 of 200
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)