Exam 5: Security and Controls
Exam 1: Introduction to Ebusiness50 Questions
Exam 2: Internet Business Models and Strategies50 Questions
Exam 3: Evolution and Applications of the Internet50 Questions
Exam 4: Enterprise-Wide and Inter-Enterprise Systems50 Questions
Exam 5: Security and Controls50 Questions
Exam 6: Billing and Payment Systems50 Questions
Exam 7: Supply-Chain Management50 Questions
Exam 8: Eprocurement, Trading Exchanges, and Auctions50 Questions
Exam 9: Customer Relationship Management50 Questions
Exam 10: Business Intelligence50 Questions
Exam 11: E-marketing and Advertising50 Questions
Exam 12: Metrics for Performance Measurement in E-commerce50 Questions
Exam 13: Privacy, Legal, and Taxation Issues in Ecommerce50 Questions
Exam 14: Ecommerce and Small Business50 Questions
Select questions type
Determining the right level of security is a difficult balance. Explain.
Free
(Essay)
4.9/5
(30)
Correct Answer:
Too little security opens the company to attacks, while too much security slows system performance and can impact employee morale and customer satisfaction.
Describe what should be included in end-user computing policy.
Free
(Essay)
4.8/5
(39)
Correct Answer:
The policy should include items such as reminders that users must comply with corporate security policies and procedures, take care of corporate equipment, and use the company's computer resources and information only for authorized business purposes.
It also sets out responsibilities for backing up data, protecting against viruses, keeping passwords secret, and taking other precautions for protecting the privacy of corporate data.
Studies on stock prices of ebusiness entities have shown that security breaches involving access to confidential data and website outages are associated with significant stock price declines.
(True/False)
4.8/5
(26)
Lack of standards, regulations and rules, and support systems are examples of internal risks associated with new business models.
(True/False)
4.8/5
(36)
An access control technique used on the web to prevent unauthorized software from masquerading as a person, presenting a set of distorted squiggly letters and numbers that people can decipher but computers cannot is called ________.
(Multiple Choice)
4.8/5
(36)
More than half the damage suffered in security breaches is caused by:
(Multiple Choice)
4.9/5
(35)
The use of electronic devices attached to transmission lines that can detect and capture data transmissions on those lines is called:
(Multiple Choice)
4.8/5
(37)
An International Development System (IDS) monitors devices and processes for security threats and can alert security personnel of the occurrence of unusual activity as it occurs.
(True/False)
4.9/5
(34)
The annual report of Canadian Tire's financial activities contains a tag containing the time that it was created, modified and moved. This is an example of ________.
(Multiple Choice)
4.7/5
(35)
An employee created a new database system to track promotional materials and linked it into the ERP system. Soon after, the ERP system's inventory module suffered a crash. This crash is likely the result of ________.
(Multiple Choice)
4.9/5
(33)
When logging on to a network server, authentication would mean that:
(Multiple Choice)
4.9/5
(36)
Which of the following would be part of the disaster recovery plan of a company?
(Multiple Choice)
4.8/5
(36)
Logical access controls include locking the door to the server room.
(True/False)
4.9/5
(40)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)