Exam 9: Enterprise Information Systems: ERP and SCM

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Obtain ___________ support is the last step for creating an information security plan.

(Short Answer)
4.8/5
(44)

Which policy typically contains a nonrepudiation clause?

(Multiple Choice)
4.8/5
(37)

What is intangible creative work that is embodied in physical form?

(Multiple Choice)
4.9/5
(37)

A(n)_________ is software written with malicious intent to cause annoyance or damage.

(Short Answer)
4.9/5
(34)

Which of the following describes ePolicies?

(Multiple Choice)
4.8/5
(41)

Describe the relationship between an e-mail privacy policy and in Internet use policy.

(Essay)
4.8/5
(37)

The purpose of ______________ is to provide Canadians with a right of privacy with respect to how their personal information is collected,used,or disclosed by an organization.

(Short Answer)
4.7/5
(33)

The _________ act restricts what information the federal government can collect.

(Short Answer)
4.9/5
(31)

The purpose of PIPEDA is to provide Europeans with a right of privacy with respect to how their personal information is collected,used,or disclosed by an organization.

(True/False)
4.9/5
(45)

What is the ideal type of decisions for people in an organization to make?

(Multiple Choice)
4.9/5
(39)

How individuals behave toward each other,how they handle information,computer technologies,and information systems,are largely influenced by people's ________________.

(Short Answer)
4.8/5
(38)

___________ is a method for confirming users' identities.

(Short Answer)
4.8/5
(35)

The most common type of defence within detection and response technologies is _________ software.

(Short Answer)
4.8/5
(39)

Which of the following does a firewall perform?

(Multiple Choice)
4.8/5
(30)

What is the legal protection afforded an expression of an idea,such as a song,video game,and some types of proprietary documents?

(Multiple Choice)
4.8/5
(39)

Ethical concerns over employee monitoring occurs when the monitoring is unprecedented or overly intrusive

(True/False)
4.9/5
(34)

What floods a Web site with so many requests for service that it slows down or crashes the site?

(Multiple Choice)
4.9/5
(44)

Who are hackers with criminal intent?

(Multiple Choice)
5.0/5
(44)

_________ is a contractual stipulation to ensure that e-business participants do not deny their online actions.

(Short Answer)
4.8/5
(41)

________________ key logger is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard.

(Short Answer)
4.9/5
(37)
Showing 121 - 140 of 171
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)