Exam 10: Enterprise Resource Planning and Collaboration Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Obtaining ___________ support is the last step for creating an information security plan.

(Short Answer)
4.8/5
(36)

Breaches in information privacy occur when proper disclosure of personal information are made.

(True/False)
4.8/5
(30)

What is a contractual stipulation that ensures that e-business participants do not deny their online actions?

(Multiple Choice)
4.9/5
(37)

_________ seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.

(Short Answer)
4.8/5
(30)

Where do organizations typically place firewalls?

(Multiple Choice)
4.8/5
(42)

What is the recommended way to implement information security lines of defence?

(Multiple Choice)
4.8/5
(46)

A(n) __________ use policy is a policy that a user must agree to follow in order to be provided access to a network or to the Internet.

(Short Answer)
4.9/5
(43)

Intrusion detection software (IDS) searches out patterns in information and network traffic to indicate __________ and quickly respond to prevent any harm.

(Short Answer)
4.9/5
(41)

How individuals behave toward each other, how they handle information, computer technologies, and information systems, are largely influenced by people's ethics.

(True/False)
4.9/5
(43)

What is failover?

(Multiple Choice)
4.8/5
(34)

Which of the following authentication methods is 100 percent accurate?

(Multiple Choice)
4.8/5
(28)

Which of the following describes confidentiality?

(Multiple Choice)
4.7/5
(36)

_________ is unsolicited email.

(Short Answer)
4.8/5
(36)

Which of the following describes ePolicies?

(Multiple Choice)
4.9/5
(44)

Which of the following is not one of the 10 guiding principles of PIPEDA for organizations:

(Multiple Choice)
4.8/5
(45)

What is identity theft?

(Multiple Choice)
4.9/5
(33)

____________ are the principles and standards that guide our behaviour toward other people.

(Short Answer)
4.8/5
(33)

Canada's privacy laws follow very closely to the:

(Multiple Choice)
4.8/5
(34)

____________ is the identification of a user based on a physical characteristic.

(Short Answer)
4.9/5
(35)

_________ programs are viruses that open a way into the network for future attacks.

(Short Answer)
4.9/5
(36)
Showing 161 - 180 of 200
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)