Exam 9: Enterprise Information Systems: ERP and SCM

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which is a virus that opens a way into the network for future attacks?

(Multiple Choice)
4.7/5
(34)

Which of the following is part of the acceptable use policy stipulations?

(Multiple Choice)
4.9/5
(36)

What is encryption?

(Multiple Choice)
4.9/5
(32)

A(n)_________ is hardware and/or software that guards a private network by analyzing the information leaving and entering the network.

(Short Answer)
4.7/5
(33)

Which policy ensures that the users know how to behave at work and that the organization has a published standard through which to deal with user infractions?

(Multiple Choice)
4.8/5
(46)

_________ seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.

(Short Answer)
4.9/5
(26)

_________ is unsolicited e-mail.

(Short Answer)
4.8/5
(35)

Describe the relationship between information security policies and an information security plan.

(Essay)
4.8/5
(35)

ePolicies are policies and procedures that address the ethical use of computers and Internet usage in the ___________ environment.

(Short Answer)
4.7/5
(32)

____________ security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

(Short Answer)
4.8/5
(35)

__________ is software that comes hidden in free downloadable software and tracks online movements,mines the information stored on a computer,or uses a computer's CPU and storage for some task the user know nothing about.

(Short Answer)
4.7/5
(41)

The Trojan-horse virus hides inside other software,usually as an attachment or a downloadable file.

(True/False)
4.9/5
(27)

Summarize the different monitoring technologies and explain the importance of an employee monitoring policy

(Essay)
4.7/5
(39)

Which of the following is/are covered by Canada's Privacy Act:

(Multiple Choice)
4.9/5
(40)

Denial-of-service attack (DoS)_______________ a Web site with so many requests for service that it slows down or crashes the site.

(Short Answer)
4.9/5
(35)

The gist of the 10 Guiding Principles of PIPEDA for Organizations can be remembered as the 3Cs: Consent,Choice,and __________.

(Short Answer)
4.8/5
(35)

Opt-in implies that the customers will only be contacted if they agreed to receive promotions and marketing material.

(True/False)
4.8/5
(38)

Describe the relationships and differences between hackers and viruses.

(Essay)
4.8/5
(37)

___________ attack computer systems by transmitting a virus hoax,with a real virus attached.

(Short Answer)
4.9/5
(39)

____________ are the principles and standards that guide our behaviour toward other people.

(Short Answer)
4.8/5
(40)
Showing 101 - 120 of 171
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)