Exam 9: Enterprise Information Systems: ERP and SCM
Exam 1: Business Information Systems146 Questions
Exam 2: A Brave New Connected World104 Questions
Exam 3: E-Business and Mobile Business182 Questions
Exam 4: Decisions and Processes127 Questions
Exam 5: Technical Fundamentals89 Questions
Exam 6: Systems Development and Project Management107 Questions
Exam 7: Enterprise Architecture and Security140 Questions
Exam 8: Quality Data and Business Intelligence132 Questions
Exam 9: Enterprise Information Systems: ERP and SCM171 Questions
Exam 10: Enterprise Information Systems: CRM and Collaboration Systems147 Questions
Exam 11: Ethics,Privacy,Social Media and Future Trends85 Questions
Exam 12: About the Modules74 Questions
Select questions type
What is a policy that a user must agree to follow in order to be provided access to a network or to the Internet?
(Multiple Choice)
4.9/5
(30)
A(n)__________ use policy contains general principles to guide the proper use of the Internet.
(Short Answer)
4.8/5
(32)
What is a program,when installed on a computer,records every keystroke and mouse click?
(Multiple Choice)
4.9/5
(37)
What was the primary problem Saab encountered with one of its marketing companies?
(Multiple Choice)
4.9/5
(45)
Which of the following is not one of the five steps for creating an information security plan?
(Multiple Choice)
4.9/5
(49)
Identify the differences between an ethical computer use policy and an acceptable computer use policy.
(Essay)
4.8/5
(44)
Information technology monitoring tracks people's activities by such measures as number of keystrokes,error rate,and number of transactions processed.
(True/False)
4.9/5
(36)
Information technology _________ is tracking people's activities by such measures as number of keystrokes,error rate,and number of transactions processed.
(Short Answer)
4.8/5
(35)
Which of the following is not one of the three primary information security areas?
(Multiple Choice)
4.8/5
(30)
Which term describes legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident?
(Multiple Choice)
4.7/5
(36)
A(n)___________ privacy policy contains general principles regarding information privacy.
(Short Answer)
4.9/5
(46)
Which of the following represents the classic example of unintentional information reuse?
(Multiple Choice)
4.9/5
(42)
What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information?
(Multiple Choice)
4.9/5
(33)
The pre-cursor to the Personal Information Protection and Electronic Documents Act (PIPEDA)was the _____________ Act.
(Short Answer)
4.9/5
(32)
___________ diving is a form of social engineering when a hacker looks through people's trash to find personal information.
(Short Answer)
4.7/5
(50)
Breaches in information privacy occur when proper disclosure of personal information are made.
(True/False)
4.7/5
(41)
What includes a variety of threats such as viruses,worms,and Trojan horses?
(Multiple Choice)
4.8/5
(34)
Key logger or key trapper software is a __________ that when installed on a computer,records every keystroke and mouse click.
(Short Answer)
5.0/5
(48)
Showing 41 - 60 of 171
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)