Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Business Driven Information Systems Study Set 5
Exam 9: Enterprise Information Systems: ERP and SCM
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 101
Multiple Choice
Which is a virus that opens a way into the network for future attacks?
Question 102
Multiple Choice
Which of the following is part of the acceptable use policy stipulations?
Question 103
Multiple Choice
What is encryption?
Question 104
Short Answer
A(n)_________ is hardware and/or software that guards a private network by analyzing the information leaving and entering the network.
Question 105
Multiple Choice
Which policy ensures that the users know how to behave at work and that the organization has a published standard through which to deal with user infractions?
Question 106
Short Answer
_________ seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.
Question 107
Short Answer
_________ is unsolicited e-mail.
Question 108
Essay
Describe the relationship between information security policies and an information security plan.
Question 109
Short Answer
ePolicies are policies and procedures that address the ethical use of computers and Internet usage in the ___________ environment.
Question 110
Short Answer
____________ security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
Question 111
Short Answer
__________ is software that comes hidden in free downloadable software and tracks online movements,mines the information stored on a computer,or uses a computer's CPU and storage for some task the user know nothing about.