IFSM300 Quiz 6 Latest 2020 November

Question

Dot Image

IFSM300 Information systems in Organization

Quiz 6

Question 1          Which of the following types of enterprise applications focuses on customers?

SCM

CRM

ERP

Question 2Which of the following is described as the assurance that the information being accessed has not been altered and truly represents what is intended?

Correctness

Completeness

Integrity

Assurance

Question 3True or false:  An Intrusion Detection System (IDS), in and of itself, does not add any additional security.

                True

                False

Question 4          The characteristics of an ERP include:  (select all that apply)

Consistent look and feel

Real-time operation and processing of data and transactions

Enterprise-wide integration

A common database

Question 5          Which of the following is the process of encoding data upon its transmission or storage so that only authorized individuals can read it?

None of these.

Secret code

Encryption

Public key infrastructure

Question 6          Which of the following types of enterprise systems deal with managing vendors?

SCM

CRM

ERP

Question 7Which of the following is used to ensure that the person accessing a system is, indeed, who they present themselves to be?

Encryption

User identification

Authentication

Authorization

Question 8          Which of the following is not true about firewalls?

They only filter data packets coming into the network or system.

They can be a hardware device.

They can be software.

They filter data packets based on a set of rules.

Question 9          ERP implementations can fail due to many factors.  Some of these are:   (select all that apply)

selecting the wrong ERP

employee resistance

customizing the ERP

lack of common data definitions

Question 10        Which of the following make up the security triad?

Privacy, Confidentiality, Integrity

Confidentiality, Integrity, Availability

Integrity, Privacy, Accuracy

Confidentiality, Integrity, Accuracy

Question 11        True or False: The recommended way to implement an ERP system is to modify the software so that it functions in the way that the organization conducts the process.

                True

                False

Question 12        Which of the following is one of the most common ways thieves steal corporate information?

using employees’ computers while they are away from their desks

using employees’ personal computers at their residences

stealing employee laptops while employees are traveling

breaking into the data center building

Question 13        Which of the following types of enterprise applications is the most comprehensive in terms of areas of the business it supports?

SCM

ERP

CRM

Question 14        When looking to secure information resources, organizations must balance the need for security with which of the following?

the customers’ expectation that their data will be protected

the potential damage to the company’ reputation if the data is stolen

the users’ need to effectively access and use these resources

the cost of replacing the data if it is stolen

Question 15        Which of the following should be included in a good backup plan?  (select all that apply)

a full inventory of all of the information that needs to be backed up

Regular backups of all data

Offsite storage of backup data sets

Test of data restoration

Having Trouble Meeting Your Deadline?

Get your assignment on IFSM300 Quiz 6 Latest 2020 November completed on time. avoid delay and – ORDER NOW

Dot Image

Order Solution Now

Similar Posts