Exam 10: Enterprise Resource Planning and Collaboration Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following represents the classic example of unintentional information reuse?

(Multiple Choice)
4.7/5
(35)

What identifies the rules required to maintain information security?

(Multiple Choice)
4.9/5
(27)

Key logger or key trapper software is a(n) __________ that when installed on a computer, records every keystroke and mouse click.

(Short Answer)
4.7/5
(34)

According to the ethical computer use policy, users should be ______________ of the rules and, by agreeing to use the system on that basis, _______________ to abide by the rules.

(Multiple Choice)
4.8/5
(37)

What is the most secure type of authentication?

(Multiple Choice)
4.8/5
(39)

_________ is a contractual stipulation to ensure that e-business participants do not deny their online actions.

(Short Answer)
4.8/5
(40)

Malicious code includes a variety of threats such as ______________, worms, and Trojan horses.

(Short Answer)
4.9/5
(39)

The gist of the 10 Guiding Principles of PIPEDA for organizations can be remembered as the 3Cs: consent, choice, and __________.

(Short Answer)
4.8/5
(44)

Summarize the different monitoring technologies and explain the importance of an employee monitoring policy.

(Essay)
4.8/5
(37)

Workplace MIS _________ is tracking people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.

(Short Answer)
4.8/5
(41)

What is fault tolerance?

(Multiple Choice)
4.9/5
(35)

What is a program, when installed on a computer, records every keystroke and mouse click?

(Multiple Choice)
4.9/5
(43)

_________-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.

(Short Answer)
4.9/5
(35)

An organization should implement information security lines of defence through people first and technology second.

(True/False)
4.9/5
(40)

What is one of the major problems with email?

(Multiple Choice)
4.8/5
(36)

Which is a virus that opens a way into the network for future attacks?

(Multiple Choice)
4.8/5
(38)

__________ is software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer's CPU and storage for some task the user know nothing about.

(Short Answer)
4.9/5
(42)

________________ key logger is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard.

(Short Answer)
4.9/5
(37)

What is the most common type of defence within detection and response technologies?

(Multiple Choice)
5.0/5
(37)

Denial-of-service attack (DoS) _______________ a website with so many requests for service that it slows down or crashes the site.

(Short Answer)
4.8/5
(37)
Showing 141 - 160 of 200
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)