Exam 9: Enterprise Information Systems: ERP and SCM
Exam 1: Business Information Systems146 Questions
Exam 2: A Brave New Connected World104 Questions
Exam 3: E-Business and Mobile Business182 Questions
Exam 4: Decisions and Processes127 Questions
Exam 5: Technical Fundamentals89 Questions
Exam 6: Systems Development and Project Management107 Questions
Exam 7: Enterprise Architecture and Security140 Questions
Exam 8: Quality Data and Business Intelligence132 Questions
Exam 9: Enterprise Information Systems: ERP and SCM171 Questions
Exam 10: Enterprise Information Systems: CRM and Collaboration Systems147 Questions
Exam 11: Ethics,Privacy,Social Media and Future Trends85 Questions
Exam 12: About the Modules74 Questions
Select questions type
Information security ______________ identify the rules required to maintain information security.
(Short Answer)
4.8/5
(41)
If an organization were to have only one policy,which one would it want?
(Multiple Choice)
4.7/5
(34)
What is software that is manufactured to look like the real thing and sold as such?
(Multiple Choice)
4.8/5
(41)
Which of the following is not one of the six principles for ethical information management according to CIO magazine?
(Multiple Choice)
4.8/5
(42)
Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?
(Multiple Choice)
4.9/5
(34)
____________ is the identification of a user based on a physical characteristic.
(Short Answer)
4.9/5
(41)
Which of the following describes information technology monitoring?
(Multiple Choice)
4.7/5
(29)
The _______ of Death is a common type of DDoS and occurs when thousands of computers try to access a Web site at the same time,overloading it and shutting it down.
(Short Answer)
4.9/5
(40)
What is a device that is around the same size as a credit card,containing embedded technologies that can store information and small amounts of software to perform some limited processing?
(Multiple Choice)
4.8/5
(33)
_________ filtering occurs when an organization uses software that filters content to prevent the transmission of unauthorized information.
(Short Answer)
4.8/5
(32)
What is a small file deposited on a hard drive by a Web site containing information about customers and their Web activities?
(Multiple Choice)
4.8/5
(34)
What are the technologies available to help prevent and build resistance to attacks?
(Multiple Choice)
5.0/5
(44)
What is it called when you may use copyrighted material in certain situations-for example,in the creation of new work or,within certain limits,for teaching purposes?
(Multiple Choice)
4.8/5
(38)
Which policy is it common practice for many businesses and educational facilities to require employees or students to sign before being granted a network ID?
(Multiple Choice)
4.9/5
(40)
Employee monitoring policies explicitly state how,when,and where the company monitors its employees.
(True/False)
4.8/5
(36)
A(n)_________ is a type of virus that spreads itself,not only from file to file,but also from computer to computer.
(Short Answer)
5.0/5
(43)
Confidentiality is the right to be left alone when you want to be,to have control over your own personal possessions,and not to be observed without your consent.
(True/False)
4.8/5
(34)
Showing 81 - 100 of 171
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)