Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / IFSM 300 Quiz 6 Question 1     True or false:  An Intrusion Detection System (IDS), in and of itself, does not add any additional security

IFSM 300 Quiz 6 Question 1     True or false:  An Intrusion Detection System (IDS), in and of itself, does not add any additional security

Computer Science

IFSM 300 Quiz 6

Question 1    

True or false:  An Intrusion Detection System (IDS), in and of itself, does not add any additional security.

   

True

   

False


Which of the following is described as the assurance that the information being accessed has not been altered and truly represents what is intended?

Question 2    

 

 

Assurance

 

Integrity

 

Correctness

 

Completeness

Question 3    

Which of the following is not true about firewalls?

 

They can be a hardware device.

 

They filter data packets based on a set of rules.

 

They only filter data packets coming into the network or system.

 

They can be software.


When looking to secure information resources, organizations must balance the need for security with which of the following?

Question 4    

 

 

the cost of replacing the data if it is stolen

 

the customers' expectation that their data will be protected

 

the potential damage to the company' reputation if the data is stolen

 

the users’ need to effectively access and use these resources


Which of the following types of enterprise applications focuses on customers? 

Question 5    

 

 

ERP

 

SCM

 

CRM


Which of the following should be included in a good backup plan?  (select all that apply)

Question 6    

 

 

a full inventory of all of the information that needs to be backed up

 

Regular backups of all data

 

Offsite storage of backup data sets

 

Test of data restoration


True or False: The recommended way to implement an ERP system is to modify the software so that it functions in the way that the organization conducts the process.

Question 7    

 

   

True

   

False


ERP implementations can fail due to many factors.  Some of these are:   (select all that apply)

Question 8    

 

 

selecting the wrong ERP

 

customizing the ERP

 

employee resistance

 

lack of common data definitions

Question 9    

Which of the following is the process of encoding data upon its transmission or storage so that only authorized individuals can read it?

 

Public key infrastructure

 

Secret code

 

Encryption

 

None of these.

Question 10    

Which of the following is used to ensure that the person accessing a system is, indeed, who they present themselves to be?

 

Authentication

 

Authorization

 

Encryption

 

User identification


Which of the following types of enterprise applications is the most comprehensive in terms of areas of the business it supports?

Question 11    

 

 

ERP

 

SCM

 

CRM


The characteristics of an ERP include:  (select all that apply)

Question 12    

 

 

A common database

 

Enterprise-wide integration

 

Real-time operation and processing of data and transactions

 

Consistent look and feel


Which of the following make up the security triad?

Question 13    

 

 

Confidentiality, Integrity, Accuracy

 

Privacy, Confidentiality, Integrity

 

Confidentiality, Integrity, Availability

 

Integrity, Privacy, Accuracy

Which of the following is one of the most common ways thieves steal corporate information?

 

Question 14    

 

 

using employees' computers while they are away from their desks

 

breaking into the data center building

 

stealing employee laptops while employees are traveling

 

using employees' personal computers at their residences

Question 15    

Which of the following types of enterprise systems deal with managing vendors?

 

ERP

 

SCM

 

CRM

Option 1

Low Cost Option
Download this past answer in few clicks

9.99 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE