Exam 9: Enterprise Information Systems: ERP and SCM
Exam 1: Business Information Systems146 Questions
Exam 2: A Brave New Connected World104 Questions
Exam 3: E-Business and Mobile Business182 Questions
Exam 4: Decisions and Processes127 Questions
Exam 5: Technical Fundamentals89 Questions
Exam 6: Systems Development and Project Management107 Questions
Exam 7: Enterprise Architecture and Security140 Questions
Exam 8: Quality Data and Business Intelligence132 Questions
Exam 9: Enterprise Information Systems: ERP and SCM171 Questions
Exam 10: Enterprise Information Systems: CRM and Collaboration Systems147 Questions
Exam 11: Ethics,Privacy,Social Media and Future Trends85 Questions
Exam 12: About the Modules74 Questions
Select questions type
If there is a security breech on your organizational information systems,which information security area is best suited to handle the breech?
(Multiple Choice)
4.9/5
(36)
Content filtering,_________,and firewalls are the three types of prevention and resistance technologies.
(Short Answer)
4.8/5
(37)
Which of the following is not one of the 10 Guiding principals of PIPEDA for organizations:
(Multiple Choice)
4.9/5
(34)
Malicious code includes a variety of threats such as ______________,worms,and Trojan horses.
(Short Answer)
4.7/5
(43)
What attacks computer systems by transmitting a virus hoax,with a real virus attached?
(Multiple Choice)
4.9/5
(40)
Which policy contains general principles regarding information privacy?
(Multiple Choice)
4.8/5
(36)
Tokens are small electronic devices that change user passwords __________.
(Short Answer)
4.8/5
(39)
_________ have philosophical and political reasons for breaking into systems and will often deface the Web site as a protest.
(Short Answer)
4.7/5
(40)
What is the most costly and intrusive form of authentication?
(Multiple Choice)
4.7/5
(41)
Breaches in information ________________ occur when improper disclosure of personal information are made.
(Short Answer)
4.8/5
(40)
Intrusion detection software (IDS)searches out patterns in information and network traffic to indicate __________ and quickly respond to prevent any harm.
(Short Answer)
4.9/5
(39)
_________ hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes.
(Short Answer)
4.7/5
(37)
What are the principles and standards that guide our behaviour toward other people?
(Multiple Choice)
4.9/5
(35)
Surprisingly,the biggest issue surrounding information security is not a technical issue,but a _____________ issue.
(Short Answer)
4.9/5
(44)
Information security policies detail how an organization will implement the information security plan.
(True/False)
4.9/5
(40)
Ethical computer use policy contains general principles to guide computer user behaviour.
(True/False)
4.7/5
(41)
What is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard?
(Multiple Choice)
4.9/5
(45)
Showing 141 - 160 of 171
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)