Which of the following types of enterprise applications focuses on customers?
Question 1 Which of the following types of enterprise applications focuses on customers?
SCM
CRM
ERP
Question 2Which of the following is described as the assurance that the information being accessed has not been altered and truly represents what is intended?
Correctness
Completeness
Integrity
Assurance
Question 3True or false: An Intrusion Detection System (IDS), in and of itself, does not add any additional security.
True
False
Question 4 The characteristics of an ERP include: (select all that apply)
Consistent look and feel
Real-time operation and processing of data and transactions
Enterprise-wide integration
A common database
Question 5 Which of the following is the process of encoding data upon its transmission or storage so that only authorized individuals can read it?
None of these.
Secret code
Encryption
Public key infrastructure
Question 6 Which of the following types of enterprise systems deal with managing vendors?
SCM
CRM
ERP
Question 7Which of the following is used to ensure that the person accessing a system is, indeed, who they present themselves to be?
Encryption
User identification
Authentication
Authorization
Question 8 Which of the following is not true about firewalls?
They only filter data packets coming into the network or system.
They can be a hardware device.
They can be software.
They filter data packets based on a set of rules.
Question 9 ERP implementations can fail due to many factors. Some of these are: (select all that apply)
selecting the wrong ERP
employee resistance
customizing the ERP
lack of common data definitions
Question 10 Which of the following make up the security triad?
Privacy, Confidentiality, Integrity
Confidentiality, Integrity, Availability
Integrity, Privacy, Accuracy
Confidentiality, Integrity, Accuracy
Question 11 True or False: The recommended way to implement an ERP system is to modify the software so that it functions in the way that the organization conducts the process.
True
False
Question 12 Which of the following is one of the most common ways thieves steal corporate information?
using employees’ computers while they are away from their desks
using employees’ personal computers at their residences
stealing employee laptops while employees are traveling
breaking into the data center building
Question 13 Which of the following types of enterprise applications is the most comprehensive in terms of areas of the business it supports?
SCM
ERP
CRM
Question 14 When looking to secure information resources, organizations must balance the need for security with which of the following?
the customers’ expectation that their data will be protected
the potential damage to the company’ reputation if the data is stolen
the users’ need to effectively access and use these resources
the cost of replacing the data if it is stolen
Question 15 Which of the following should be included in a good backup plan? (select all that apply)
a full inventory of all of the information that needs to be backed up
Regular backups of all data
Offsite storage of backup data sets
Test of data restoration
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.