Exam 9: Enterprise Information Systems: ERP and SCM

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is a policy that a user must agree to follow in order to be provided access to a network or to the Internet?

(Multiple Choice)
4.9/5
(30)

A(n)__________ use policy contains general principles to guide the proper use of the Internet.

(Short Answer)
4.8/5
(32)

What is a program,when installed on a computer,records every keystroke and mouse click?

(Multiple Choice)
4.9/5
(37)

What was the primary problem Saab encountered with one of its marketing companies?

(Multiple Choice)
4.9/5
(45)

Which of the following is not one of the five steps for creating an information security plan?

(Multiple Choice)
4.9/5
(49)

Identify the differences between an ethical computer use policy and an acceptable computer use policy.

(Essay)
4.8/5
(44)

Information technology monitoring tracks people's activities by such measures as number of keystrokes,error rate,and number of transactions processed.

(True/False)
4.9/5
(36)

Information technology _________ is tracking people's activities by such measures as number of keystrokes,error rate,and number of transactions processed.

(Short Answer)
4.8/5
(35)

Which of the following is not one of the three primary information security areas?

(Multiple Choice)
4.8/5
(30)

Which term describes legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident?

(Multiple Choice)
4.7/5
(36)

A(n)___________ privacy policy contains general principles regarding information privacy.

(Short Answer)
4.9/5
(46)

Which of the following represents the classic example of unintentional information reuse?

(Multiple Choice)
4.9/5
(42)

What is a method for confirming users' identities?

(Multiple Choice)
5.0/5
(35)

What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information?

(Multiple Choice)
4.9/5
(33)

The pre-cursor to the Personal Information Protection and Electronic Documents Act (PIPEDA)was the _____________ Act.

(Short Answer)
4.9/5
(32)

___________ diving is a form of social engineering when a hacker looks through people's trash to find personal information.

(Short Answer)
4.7/5
(50)

Breaches in information privacy occur when proper disclosure of personal information are made.

(True/False)
4.7/5
(41)

What includes a variety of threats such as viruses,worms,and Trojan horses?

(Multiple Choice)
4.8/5
(34)

Key logger or key trapper software is a __________ that when installed on a computer,records every keystroke and mouse click.

(Short Answer)
5.0/5
(48)

Describe the relationship between ethics and privacy.

(Essay)
4.9/5
(39)
Showing 41 - 60 of 171
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)