Exam 9: Enterprise Information Systems: ERP and SCM
Exam 1: Business Information Systems146 Questions
Exam 2: A Brave New Connected World104 Questions
Exam 3: E-Business and Mobile Business182 Questions
Exam 4: Decisions and Processes127 Questions
Exam 5: Technical Fundamentals89 Questions
Exam 6: Systems Development and Project Management107 Questions
Exam 7: Enterprise Architecture and Security140 Questions
Exam 8: Quality Data and Business Intelligence132 Questions
Exam 9: Enterprise Information Systems: ERP and SCM171 Questions
Exam 10: Enterprise Information Systems: CRM and Collaboration Systems147 Questions
Exam 11: Ethics,Privacy,Social Media and Future Trends85 Questions
Exam 12: About the Modules74 Questions
Select questions type
Employee monitoring policies explicitly state how,when,and where the company monitors its employees.
Free
(True/False)
4.9/5
(41)
Correct Answer:
True
What is one of the guidelines an organization can follow when creating an information privacy policy?
Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
B
Ethical concerns over ______________ monitoring occurs when the monitoring is unprecedented or overly intrusive
Free
(Short Answer)
4.8/5
(32)
Correct Answer:
employee
Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.
(True/False)
4.9/5
(41)
_____________ is the legal protection afforded an expression of an idea,such as a song,video game,and some types of proprietary documents.
(Short Answer)
4.8/5
(30)
Which of the following is not a part of the e-mail privacy policy stipulations?
(Multiple Choice)
4.7/5
(38)
A(n)____________ privacy policy details the extent to which e-mail messages may be read by others.
(Short Answer)
4.8/5
(33)
A(n)__________ use policy is a policy that a user must agree to follow in order to be provided access to a network or to the Internet.
(Short Answer)
4.8/5
(39)
_________ scrambles information into an alternative form that requires a key or password to decrypt the information.
(Short Answer)
4.8/5
(30)
Which of the following is part of the acceptable use policy stipulations?
(Multiple Choice)
4.8/5
(38)
Who breaks into other people's computer systems and just looks around or steals and destroys information?
(Multiple Choice)
4.8/5
(38)
To facilitate information privacy,many countries have established __________________ to protect the collection and sharing of personal information.
(Short Answer)
4.8/5
(37)
According to the ethical computer use policy,users should be ______________ of the rules and,by agreeing to use the system on that basis,_______________ to abide by the rules.
(Multiple Choice)
4.7/5
(36)
Smart card is a(n)_______ that is around the same size as a credit card,containing embedded technologies that can store information and small amounts of software to perform some limited processing.
(Short Answer)
4.8/5
(38)
Who works at the request of the system owners to find system vulnerabilities and plug the holes?
(Multiple Choice)
4.8/5
(39)
Develop the information security policies is the ________________ step for creating an information security plan.
(Short Answer)
4.9/5
(44)
___________ hat hackers break into other people's computer systems and may just look around or may steal and destroy information.
(Short Answer)
4.9/5
(29)
Which of the following is an effect of employee monitoring?
(Multiple Choice)
4.9/5
(43)
What is the most common type of defence within detection and response technologies?
(Multiple Choice)
4.8/5
(43)
Showing 1 - 20 of 171
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)