Exam 9: Enterprise Information Systems: ERP and SCM

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_______________ is software to generate ads that installs itself on a computer when a person downloads some other program from the Internet.

(Short Answer)
4.8/5
(39)

_________ are people very knowledgeable about computers who use their knowledge to invade other people's computers.

(Short Answer)
4.8/5
(40)

Which of the following is an example of acting ethically?

(Multiple Choice)
4.7/5
(40)

What is the unauthorized use,duplication,distribution,or sale of copyrighted software?

(Multiple Choice)
4.8/5
(39)

What is a type of virus that spreads itself,not just from file to file,but also from computer to computer?

(Multiple Choice)
4.8/5
(40)

Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

(True/False)
4.8/5
(36)

A(n)_______ is a program or device that can monitor data traveling over a network.

(Short Answer)
4.8/5
(36)

What is the most secure type of authentication?

(Multiple Choice)
4.7/5
(38)

Which of the following is considered a type of biometrics?

(Multiple Choice)
4.9/5
(41)

Which policy details the extent to which e-mail messages may be read by others?

(Multiple Choice)
4.8/5
(28)

Trojan-horse virus hides inside other ________,usually as an attachment or a downloadable file.

(Short Answer)
4.7/5
(40)

_______________ is a hacker with criminal intent.

(Short Answer)
4.8/5
(47)

What is the recommended way to implement information security lines of defence?

(Multiple Choice)
4.8/5
(42)

Who finds hacking code on the Internet and click-and-points their way into systems to cause damage or spread viruses?

(Multiple Choice)
4.8/5
(34)

To facilitate information privacy,many countries have abolished legislation to protect the collection and sharing of personal information.

(True/False)
4.8/5
(36)

Tokens are small electronic devices that change user passwordsally.

(True/False)
5.0/5
(35)

Where do organizations typically place firewalls?

(Multiple Choice)
5.0/5
(35)

What are the policies and procedures that address the ethical use of computers and Internet usage in the business environment?

(Multiple Choice)
4.9/5
(35)

Which of the following describes confidentiality?

(Multiple Choice)
4.7/5
(35)

What is spam?

(Multiple Choice)
4.8/5
(31)
Showing 61 - 80 of 171
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)