Exam 9: Enterprise Information Systems: ERP and SCM

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_________ implies that contact will be made with only the people who had agreed to receive promotions and marketing materials.

(Short Answer)
4.8/5
(32)

What is the policy that contains general principles to guide computer user behaviour?

(Multiple Choice)
4.8/5
(45)

Explain how HIPAA protects individual's health records?

(Essay)
4.8/5
(31)

How individuals behave toward each other,how they handle information,computer technologies,and information systems,are largely influenced by people's ethics.

(True/False)
5.0/5
(37)

Information privacy is about the prevention of collecting and sharing personal information.

(True/False)
4.9/5
(38)

___________ is a US federal law established in 1998 that applies to the collection of personal information from American children who are under 13 years of age.

(Short Answer)
5.0/5
(35)

Which of the following is a program or device that can monitor data traveling over a network?

(Multiple Choice)
4.8/5
(43)

Distributed denial-of-service attack (DDoS)attacks from multiple __________ that flood a Web site with so many requests for service that it slows down or crashes.

(Short Answer)
4.9/5
(41)

A(n)____________ computer use policy contains general principles to guide computer user behaviour.

(Short Answer)
4.9/5
(32)

Which of the following authentication methods is 100 percent accurate?

(Multiple Choice)
5.0/5
(39)

Which of the following is not included in the four quadrants of ethical and legal behaviour?

(Multiple Choice)
4.7/5
(30)

Surprisingly,the biggest issue surrounding information security is not a people issue,but a technical issue.

(True/False)
5.0/5
(38)

Which of the following can be completed by encryption?

(Multiple Choice)
4.8/5
(34)

Employee ________________ policies explicitly state how,when,and where the company monitors its employees.

(Short Answer)
4.8/5
(41)

Explain the statement "information has no ethics."

(Essay)
4.8/5
(39)

A(n)information security ____________ details how an organization will implement the information security policies.

(Short Answer)
4.9/5
(31)

What identifies the rules required to maintain information security?

(Multiple Choice)
4.9/5
(35)

What is the right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent?

(Multiple Choice)
4.7/5
(35)

What is a contractual stipulation that ensures that e-business participants do not deny their online actions?

(Multiple Choice)
4.8/5
(41)

Which of the following describes privacy?

(Multiple Choice)
4.8/5
(43)
Showing 21 - 40 of 171
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)