Exam 9: Enterprise Information Systems: ERP and SCM

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Employee monitoring policies explicitly state how,when,and where the company monitors its employees.

Free
(True/False)
4.9/5
(41)
Correct Answer:
Verified

True

What is one of the guidelines an organization can follow when creating an information privacy policy?

Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
Verified

B

Ethical concerns over ______________ monitoring occurs when the monitoring is unprecedented or overly intrusive

Free
(Short Answer)
4.8/5
(32)
Correct Answer:
Verified

employee

Insiders are illegitimate users who purposely or accidentally misuse their access to the environment to do business.

(True/False)
4.9/5
(41)

Which of the following is not considered an ePolicy?

(Multiple Choice)
4.8/5
(44)

_____________ is the legal protection afforded an expression of an idea,such as a song,video game,and some types of proprietary documents.

(Short Answer)
4.8/5
(30)

Which of the following is not a part of the e-mail privacy policy stipulations?

(Multiple Choice)
4.7/5
(38)

A(n)____________ privacy policy details the extent to which e-mail messages may be read by others.

(Short Answer)
4.8/5
(33)

A(n)__________ use policy is a policy that a user must agree to follow in order to be provided access to a network or to the Internet.

(Short Answer)
4.8/5
(39)

_________ scrambles information into an alternative form that requires a key or password to decrypt the information.

(Short Answer)
4.8/5
(30)

Which of the following is part of the acceptable use policy stipulations?

(Multiple Choice)
4.8/5
(38)

Who breaks into other people's computer systems and just looks around or steals and destroys information?

(Multiple Choice)
4.8/5
(38)

To facilitate information privacy,many countries have established __________________ to protect the collection and sharing of personal information.

(Short Answer)
4.8/5
(37)

According to the ethical computer use policy,users should be ______________ of the rules and,by agreeing to use the system on that basis,_______________ to abide by the rules.

(Multiple Choice)
4.7/5
(36)

Smart card is a(n)_______ that is around the same size as a credit card,containing embedded technologies that can store information and small amounts of software to perform some limited processing.

(Short Answer)
4.8/5
(38)

Who works at the request of the system owners to find system vulnerabilities and plug the holes?

(Multiple Choice)
4.8/5
(39)

Develop the information security policies is the ________________ step for creating an information security plan.

(Short Answer)
4.9/5
(44)

___________ hat hackers break into other people's computer systems and may just look around or may steal and destroy information.

(Short Answer)
4.9/5
(29)

Which of the following is an effect of employee monitoring?

(Multiple Choice)
4.9/5
(43)

What is the most common type of defence within detection and response technologies?

(Multiple Choice)
4.8/5
(43)
Showing 1 - 20 of 171
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)