Exam 10: Enterprise Resource Planning and Collaboration Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following are covered by Canada's Privacy Act?

(Multiple Choice)
5.0/5
(44)

Which policy ensures that the users know how to behave at work and that the organization has a published standard through which to deal with user infractions?

(Multiple Choice)
4.9/5
(32)

What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information?

(Multiple Choice)
4.7/5
(45)

Ethical concerns over ______________ monitoring occurs when the monitoring is unprecedented or overly intrusive.

(Short Answer)
4.8/5
(37)

What was the primary problem Saab encountered with one of its marketing companies?

(Multiple Choice)
4.9/5
(33)

Which of the following is an example of acting ethically?

(Multiple Choice)
4.8/5
(35)

Which of the following is not included in the four quadrants of ethical and legal behaviour?

(Multiple Choice)
4.7/5
(39)

Information ethics concerns mainly:

(Multiple Choice)
4.8/5
(37)

____________ is a backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time.

(Short Answer)
4.8/5
(37)

Describe the relationship between an email privacy policy and in Internet use policy.

(Essay)
4.9/5
(36)

What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents?

(Multiple Choice)
4.8/5
(27)

The purpose of ______________ is to provide Canadians with a right of privacy with respect to how their personal information is collected, used, or disclosed by an organization.

(Short Answer)
5.0/5
(42)

What is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent?

(Multiple Choice)
4.8/5
(34)

A(n) ___________ privacy policy contains general principles regarding information privacy.

(Short Answer)
4.9/5
(39)

What does the disaster recovery cost curve chart?

(Multiple Choice)
4.9/5
(32)

What is the primary difference between the different types of backup/recovery media?

(Multiple Choice)
4.9/5
(39)

___________ diving is a form of social engineering when a hacker looks through people's trash to find personal information.

(Short Answer)
4.7/5
(43)

What is a method for confirming users' identities?

(Multiple Choice)
4.8/5
(34)

Which policy contains general principles regarding information privacy?

(Multiple Choice)
4.8/5
(37)

Which of the following is not one of the top 10 questions managers should ask regarding information security?

(Multiple Choice)
4.9/5
(36)
Showing 101 - 120 of 200
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)