Why Choose Us?
0% AI Guarantee
Human-written only.
24/7 Support
Anytime, anywhere.
Plagiarism Free
100% Original.
Expert Tutors
Masters & PhDs.
100% Confidential
Your privacy matters.
On-Time Delivery
Never miss a deadline.
IFSM 300 Quiz 6 Question 1 True or false: An Intrusion Detection System (IDS), in and of itself, does not add any additional security
IFSM 300 Quiz 6
| Question 1 |
True or false: An Intrusion Detection System (IDS), in and of itself, does not add any additional security.
|
True |
||
|
False |
Which of the following is described as the assurance that the information being accessed has not been altered and truly represents what is intended?
| Question 2 |
|
|
Assurance |
|
|
Integrity |
|
|
Correctness |
|
|
Completeness |
| Question 3 |
Which of the following is not true about firewalls?
|
|
They can be a hardware device. |
|
|
They filter data packets based on a set of rules. |
|
|
They only filter data packets coming into the network or system. |
|
|
They can be software. |
When looking to secure information resources, organizations must balance the need for security with which of the following?
| Question 4 |
|
|
the cost of replacing the data if it is stolen |
|
|
the customers' expectation that their data will be protected |
|
|
the potential damage to the company' reputation if the data is stolen |
|
|
the users’ need to effectively access and use these resources |
Which of the following types of enterprise applications focuses on customers?
| Question 5 |
|
|
ERP |
|
|
SCM |
|
|
CRM |
Which of the following should be included in a good backup plan? (select all that apply)
| Question 6 |
|
|
a full inventory of all of the information that needs to be backed up |
|
|
Regular backups of all data |
|
|
Offsite storage of backup data sets |
|
|
Test of data restoration |
True or False: The recommended way to implement an ERP system is to modify the software so that it functions in the way that the organization conducts the process.
| Question 7 |
|
True |
||
|
False |
ERP implementations can fail due to many factors. Some of these are: (select all that apply)
| Question 8 |
|
|
selecting the wrong ERP |
|
|
customizing the ERP |
|
|
employee resistance |
|
|
lack of common data definitions |
| Question 9 |
Which of the following is the process of encoding data upon its transmission or storage so that only authorized individuals can read it?
|
|
Public key infrastructure |
|
|
Secret code |
|
|
Encryption |
|
|
None of these. |
| Question 10 |
Which of the following is used to ensure that the person accessing a system is, indeed, who they present themselves to be?
|
|
Authentication |
|
|
Authorization |
|
|
Encryption |
|
|
User identification |
Which of the following types of enterprise applications is the most comprehensive in terms of areas of the business it supports?
| Question 11 |
|
|
ERP |
|
|
SCM |
|
|
CRM |
The characteristics of an ERP include: (select all that apply)
| Question 12 |
|
|
A common database |
|
|
Enterprise-wide integration |
|
|
Real-time operation and processing of data and transactions |
|
|
Consistent look and feel |
Which of the following make up the security triad?
| Question 13 |
|
|
Confidentiality, Integrity, Accuracy |
|
|
Privacy, Confidentiality, Integrity |
|
|
Confidentiality, Integrity, Availability |
|
|
Integrity, Privacy, Accuracy |
| Question 14 |
|
|
using employees' computers while they are away from their desks |
|
|
breaking into the data center building |
|
|
stealing employee laptops while employees are traveling |
|
|
using employees' personal computers at their residences |
| Question 15 |
Which of the following types of enterprise systems deal with managing vendors?
|
|
ERP |
|
|
SCM |
|
|
CRM |
Expert Solution
| Question 1 | 1 / 1 point |
True or false: An Intrusion Detection System (IDS), in and of itself, does not add any additional security.
|
True |
||
|
False |
| Question 2 | 1 / 1 point |
Which of the following is described as the assurance that the information being accessed has not been altered and truly represents what is intended?
|
Assurance |
|
|
Integrity |
|
|
Correctness |
|
|
Completeness |
| Question 3 | 1 / 1 point |
Which of the following is not true about firewalls?
|
They can be a hardware device. |
|
|
They filter data packets based on a set of rules. |
|
|
They only filter data packets coming into the network or system. |
|
|
They can be software. |
| Question 4 | 1 / 1 point |
When looking to secure information resources, organizations must balance the need for security with which of the following?
|
the cost of replacing the data if it is stolen |
|
|
the customers' expectation that their data will be protected |
|
|
the potential damage to the company' reputation if the data is stolen |
|
|
the users’ need to effectively access and use these resources |
| Question 5 | 1 / 1 point |
Which of the following types of enterprise applications focuses on customers?
|
ERP |
|
|
SCM |
|
|
CRM |
| Question 6 | 1 / 1 point |
Which of the following should be included in a good backup plan? (select all that apply)
|
a full inventory of all of the information that needs to be backed up |
|
|
Regular backups of all data |
|
|
Offsite storage of backup data sets |
|
|
Test of data restoration |
| Question 7 | 1 / 1 point |
True or False: The recommended way to implement an ERP system is to modify the software so that it functions in the way that the organization conducts the process.
|
True |
||
|
False |
| Question 8 | 1 / 1 point |
ERP implementations can fail due to many factors. Some of these are: (select all that apply)
|
selecting the wrong ERP |
|
|
customizing the ERP |
|
|
employee resistance |
|
|
lack of common data definitions |
| Question 9 | 1 / 1 point |
Which of the following is the process of encoding data upon its transmission or storage so that only authorized individuals can read it?
|
Public key infrastructure |
|
|
Secret code |
|
|
Encryption |
|
|
None of these. |
| Question 10 | 1 / 1 point |
Which of the following is used to ensure that the person accessing a system is, indeed, who they present themselves to be?
|
Authentication |
|
|
Authorization |
|
|
Encryption |
|
|
User identification |
| Question 11 | 1 / 1 point |
Which of the following types of enterprise applications is the most comprehensive in terms of areas of the business it supports?
|
ERP |
|
|
SCM |
|
|
CRM |
| Question 12 | 1 / 1 point |
The characteristics of an ERP include: (select all that apply)
|
A common database |
|
|
Enterprise-wide integration |
|
|
Real-time operation and processing of data and transactions |
|
|
Consistent look and feel |
| Question 13 | 1 / 1 point |
Which of the following make up the security triad?
|
Confidentiality, Integrity, Accuracy |
|
|
Privacy, Confidentiality, Integrity |
|
|
Confidentiality, Integrity, Availability |
|
|
Integrity, Privacy, Accuracy |
| Question 14 | 1 / 1 point |
Which of the following is one of the most common ways thieves steal corporate information?
|
using employees' computers while they are away from their desks |
|
|
breaking into the data center building |
|
|
stealing employee laptops while employees are traveling |
|
|
using employees' personal computers at their residences |
| Question 15 | 1 / 1 point |
Which of the following types of enterprise systems deal with managing vendors?
|
ERP |
|
|
SCM |
|
|
CRM |
Archived Solution
You have full access to this solution. To save a copy with all formatting and attachments, use the button below.
For ready-to-submit work, please order a fresh solution below.





