Exam 9: Enterprise Information Systems: ERP and SCM

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Spoofing is the forging of the _________ address on an e-mail so teat the e-mail message appears to come from someone other than the actual sender.

(Short Answer)
4.9/5
(43)

_______________ kiddies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.

(Short Answer)
4.8/5
(36)

What is the identification of a user based on a physical characteristic,such as a fingerprint,iris,face,voice,or handwriting?

(Multiple Choice)
4.8/5
(26)

_________ programs are viruses that open a way into the network for future attacks.

(Short Answer)
4.8/5
(39)

Which of the following is not one of the top 10 questions managers should ask regarding information security?

(Multiple Choice)
4.9/5
(39)

What is social engineering?

(Multiple Choice)
4.9/5
(37)

What is the forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender?

(Multiple Choice)
4.9/5
(43)

Describe the important ethical concepts stemming from information technology.

(Essay)
4.8/5
(30)

Social engineering means using one's _______ skills to trick people into revealing access credentials or other information valuable to the attacker.

(Short Answer)
4.8/5
(38)

List and describe the three primary security areas.

(Essay)
4.9/5
(29)

Which of the following represents the estimated percentage that spam accounts for in an organizations' e-mail traffic?

(Multiple Choice)
4.9/5
(32)
Showing 161 - 171 of 171
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)