Fill This Form To Receive Instant Help
Homework answers / question archive / IFSM 300 Quiz 6 Question 1 True or false: An Intrusion Detection System (IDS), in and of itself, does not add any additional security
IFSM 300 Quiz 6
Question 1 |
True or false: An Intrusion Detection System (IDS), in and of itself, does not add any additional security.
True |
||
False |
Which of the following is described as the assurance that the information being accessed has not been altered and truly represents what is intended?
Question 2 |
|
Assurance |
|
Integrity |
|
Correctness |
|
Completeness |
Question 3 |
Which of the following is not true about firewalls?
|
They can be a hardware device. |
|
They filter data packets based on a set of rules. |
|
They only filter data packets coming into the network or system. |
|
They can be software. |
When looking to secure information resources, organizations must balance the need for security with which of the following?
Question 4 |
|
the cost of replacing the data if it is stolen |
|
the customers' expectation that their data will be protected |
|
the potential damage to the company' reputation if the data is stolen |
|
the users’ need to effectively access and use these resources |
Question 5 |
|
ERP |
|
SCM |
|
CRM |
Question 6 |
|
a full inventory of all of the information that needs to be backed up |
|
Regular backups of all data |
|
Offsite storage of backup data sets |
|
Test of data restoration |
Question 7 |
True |
||
False |
Question 8 |
|
selecting the wrong ERP |
|
customizing the ERP |
|
employee resistance |
|
lack of common data definitions |
Question 9 |
Which of the following is the process of encoding data upon its transmission or storage so that only authorized individuals can read it?
|
Public key infrastructure |
|
Secret code |
|
Encryption |
|
None of these. |
Question 10 |
Which of the following is used to ensure that the person accessing a system is, indeed, who they present themselves to be?
|
Authentication |
|
Authorization |
|
Encryption |
|
User identification |
Which of the following types of enterprise applications is the most comprehensive in terms of areas of the business it supports?
Question 11 |
|
ERP |
|
SCM |
|
CRM |
Question 12 |
|
A common database |
|
Enterprise-wide integration |
|
Real-time operation and processing of data and transactions |
|
Consistent look and feel |
Question 13 |
|
Confidentiality, Integrity, Accuracy |
|
Privacy, Confidentiality, Integrity |
|
Confidentiality, Integrity, Availability |
|
Integrity, Privacy, Accuracy |
Question 14 |
|
using employees' computers while they are away from their desks |
|
breaking into the data center building |
|
stealing employee laptops while employees are traveling |
|
using employees' personal computers at their residences |
Question 15 |
Which of the following types of enterprise systems deal with managing vendors?
|
ERP |
|
SCM |
|
CRM |
Already member? Sign In