Exam 10: Enterprise Resource Planning and Collaboration Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?

(Multiple Choice)
4.8/5
(33)

What is it called when you may use copyrighted material in certain situations-for example, in the creation of new work or, within certain limits, for teaching purposes?

(Multiple Choice)
4.7/5
(37)

_________ are people very knowledgeable about computers who use their knowledge to invade other people's computers.

(Short Answer)
5.0/5
(36)

Information technology monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.

(True/False)
4.9/5
(42)

A(n) _________ is hardware and/or software that guards a private network by analyzing the information leaving and entering the network.

(Short Answer)
4.8/5
(37)

Which of the following is not one of the five steps for creating an information security plan?

(Multiple Choice)
4.9/5
(41)

What is encryption?

(Multiple Choice)
4.8/5
(41)

Organizations should not choose a backup and recovery strategy that is in line with its business goals

(True/False)
4.8/5
(33)

Ethical computer use policy contains general principles to guide computer user behaviour.

(True/False)
4.9/5
(36)

_________ scrambles information into an alternative form that requires a key or password to decrypt the information.

(Short Answer)
4.7/5
(33)

An organization should implement information security lines of defence through _____ first and technology second.

(Short Answer)
4.8/5
(32)

To facilitate information privacy, many countries have established __________________ to protect the collection and sharing of personal information.

(Short Answer)
4.8/5
(38)

What is spam?

(Multiple Choice)
4.7/5
(37)

Spoofing is the forging of the _________ address on an email so that the email message appears to come from someone other than the actual sender.

(Short Answer)
4.9/5
(35)

Trojan-horse virus hides inside other ________, usually as an attachment or a downloadable file.

(Short Answer)
4.8/5
(37)

What is intangible creative work that is embodied in physical form?

(Multiple Choice)
4.8/5
(37)

Identify the differences between an ethical computer use policy and an acceptable computer use policy.

(Essay)
4.8/5
(34)

Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

(True/False)
4.9/5
(34)

What are the principles and standards that guide our behaviour toward other people?

(Multiple Choice)
4.7/5
(47)

________ is a U.S. federal law established in 1998 that applies to collectingpersonal information from American children who are under 13 years of age.

(Multiple Choice)
4.9/5
(35)
Showing 121 - 140 of 200
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)