Exam 9: Enterprise Information Systems: ERP and SCM

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Information security ______________ identify the rules required to maintain information security.

(Short Answer)
4.8/5
(41)

If an organization were to have only one policy,which one would it want?

(Multiple Choice)
4.7/5
(34)

What is software that is manufactured to look like the real thing and sold as such?

(Multiple Choice)
4.8/5
(41)

Which of the following is not one of the six principles for ethical information management according to CIO magazine?

(Multiple Choice)
4.8/5
(42)

Canada's privacy laws follow very closely to the:

(Multiple Choice)
4.8/5
(34)

Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?

(Multiple Choice)
4.9/5
(34)

____________ is the identification of a user based on a physical characteristic.

(Short Answer)
4.9/5
(41)

Which of the following describes information technology monitoring?

(Multiple Choice)
4.7/5
(29)

The _______ of Death is a common type of DDoS and occurs when thousands of computers try to access a Web site at the same time,overloading it and shutting it down.

(Short Answer)
4.9/5
(40)

What is a device that is around the same size as a credit card,containing embedded technologies that can store information and small amounts of software to perform some limited processing?

(Multiple Choice)
4.8/5
(33)

_________ filtering occurs when an organization uses software that filters content to prevent the transmission of unauthorized information.

(Short Answer)
4.8/5
(32)

What is a small file deposited on a hard drive by a Web site containing information about customers and their Web activities?

(Multiple Choice)
4.8/5
(34)

What are the technologies available to help prevent and build resistance to attacks?

(Multiple Choice)
5.0/5
(44)

What is it called when you may use copyrighted material in certain situations-for example,in the creation of new work or,within certain limits,for teaching purposes?

(Multiple Choice)
4.8/5
(38)

Which policy is it common practice for many businesses and educational facilities to require employees or students to sign before being granted a network ID?

(Multiple Choice)
4.9/5
(40)

Employee monitoring policies explicitly state how,when,and where the company monitors its employees.

(True/False)
4.8/5
(36)

Describe authentication and the most secure type of authentication.

(Essay)
4.9/5
(40)

A(n)_________ is a type of virus that spreads itself,not only from file to file,but also from computer to computer.

(Short Answer)
5.0/5
(43)

What is one of the major problems with e-mail?

(Multiple Choice)
4.8/5
(39)

Confidentiality is the right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent.

(True/False)
4.8/5
(34)
Showing 81 - 100 of 171
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)