Exam 9: Enterprise Information Systems: ERP and SCM
Exam 1: Business Information Systems146 Questions
Exam 2: A Brave New Connected World104 Questions
Exam 3: E-Business and Mobile Business182 Questions
Exam 4: Decisions and Processes127 Questions
Exam 5: Technical Fundamentals89 Questions
Exam 6: Systems Development and Project Management107 Questions
Exam 7: Enterprise Architecture and Security140 Questions
Exam 8: Quality Data and Business Intelligence132 Questions
Exam 9: Enterprise Information Systems: ERP and SCM171 Questions
Exam 10: Enterprise Information Systems: CRM and Collaboration Systems147 Questions
Exam 11: Ethics,Privacy,Social Media and Future Trends85 Questions
Exam 12: About the Modules74 Questions
Select questions type
Which is a virus that opens a way into the network for future attacks?
(Multiple Choice)
4.7/5
(34)
Which of the following is part of the acceptable use policy stipulations?
(Multiple Choice)
4.9/5
(36)
A(n)_________ is hardware and/or software that guards a private network by analyzing the information leaving and entering the network.
(Short Answer)
4.7/5
(33)
Which policy ensures that the users know how to behave at work and that the organization has a published standard through which to deal with user infractions?
(Multiple Choice)
4.8/5
(46)
_________ seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.
(Short Answer)
4.9/5
(26)
Describe the relationship between information security policies and an information security plan.
(Essay)
4.8/5
(35)
ePolicies are policies and procedures that address the ethical use of computers and Internet usage in the ___________ environment.
(Short Answer)
4.7/5
(32)
____________ security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
(Short Answer)
4.8/5
(35)
__________ is software that comes hidden in free downloadable software and tracks online movements,mines the information stored on a computer,or uses a computer's CPU and storage for some task the user know nothing about.
(Short Answer)
4.7/5
(41)
The Trojan-horse virus hides inside other software,usually as an attachment or a downloadable file.
(True/False)
4.9/5
(27)
Summarize the different monitoring technologies and explain the importance of an employee monitoring policy
(Essay)
4.7/5
(39)
Which of the following is/are covered by Canada's Privacy Act:
(Multiple Choice)
4.9/5
(40)
Denial-of-service attack (DoS)_______________ a Web site with so many requests for service that it slows down or crashes the site.
(Short Answer)
4.9/5
(35)
The gist of the 10 Guiding Principles of PIPEDA for Organizations can be remembered as the 3Cs: Consent,Choice,and __________.
(Short Answer)
4.8/5
(35)
Opt-in implies that the customers will only be contacted if they agreed to receive promotions and marketing material.
(True/False)
4.8/5
(38)
Describe the relationships and differences between hackers and viruses.
(Essay)
4.8/5
(37)
___________ attack computer systems by transmitting a virus hoax,with a real virus attached.
(Short Answer)
4.9/5
(39)
____________ are the principles and standards that guide our behaviour toward other people.
(Short Answer)
4.8/5
(40)
Showing 101 - 120 of 171
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)