Exam 9: Enterprise Information Systems: ERP and SCM

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

If there is a security breech on your organizational information systems,which information security area is best suited to handle the breech?

(Multiple Choice)
4.9/5
(36)

What is identity theft?

(Multiple Choice)
4.8/5
(43)

Content filtering,_________,and firewalls are the three types of prevention and resistance technologies.

(Short Answer)
4.8/5
(37)

Which of the following is not one of the 10 Guiding principals of PIPEDA for organizations:

(Multiple Choice)
4.9/5
(34)

Malicious code includes a variety of threats such as ______________,worms,and Trojan horses.

(Short Answer)
4.7/5
(43)

What attacks computer systems by transmitting a virus hoax,with a real virus attached?

(Multiple Choice)
4.9/5
(40)

Which policy contains general principles regarding information privacy?

(Multiple Choice)
4.8/5
(36)

Tokens are small electronic devices that change user passwords __________.

(Short Answer)
4.8/5
(39)

_________ have philosophical and political reasons for breaking into systems and will often deface the Web site as a protest.

(Short Answer)
4.7/5
(40)

Discuss the reasons why privacy issues lose trust for e-businesses.

(Essay)
4.9/5
(41)

What is the most costly and intrusive form of authentication?

(Multiple Choice)
4.7/5
(41)

Breaches in information ________________ occur when improper disclosure of personal information are made.

(Short Answer)
4.8/5
(40)

Intrusion detection software (IDS)searches out patterns in information and network traffic to indicate __________ and quickly respond to prevent any harm.

(Short Answer)
4.9/5
(39)

_________ hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.

(Short Answer)
4.7/5
(37)

What are the principles and standards that guide our behaviour toward other people?

(Multiple Choice)
4.9/5
(35)

Surprisingly,the biggest issue surrounding information security is not a technical issue,but a _____________ issue.

(Short Answer)
4.9/5
(44)

Information security policies detail how an organization will implement the information security plan.

(True/False)
4.9/5
(40)

Summarize the five steps to creating an information security plan.

(Essay)
4.8/5
(45)

Ethical computer use policy contains general principles to guide computer user behaviour.

(True/False)
4.7/5
(41)

What is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard?

(Multiple Choice)
4.9/5
(45)
Showing 141 - 160 of 171
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)