IFSM 300 IFSM300 WEEK 6 QUIZ RESULTS (2020) - UMUC

 IFSM 300 IFSM300 WEEK 6 QUIZ RESULTS (2020) - UMUC

 

 

 

DOWNLOAD HERE

https://studentoffortunefix.com/collections/papers/products/ifsm-300-ifsm300-week-6-quiz-results-2020-umuc

 

UMUC IFSM 300 Week 6 Quiz Results (2020)

Question 1​​1 / 1 point

Which of the following should be included in a good backup plan?  (select all that apply)

A full inventory of all of the information that needs to be backed up

Regular backups of all data

Offsite storage of backup data sets

Test of data restoration

 

Question 2​​1 / 1 point

Which of the following is described as the assurance that the information being accessed has not been altered and truly represents what is intended?

Correctness

Completeness

Integrity

Assurance

 

Question 3​​1 / 1 point

ERP implementations can fail due to many factors.  Some of these are:   (select all that apply)

Selecting the wrong ERP

Customizing the ERP

Employee resistance

Lack of common data definitions

 

Question 4​​1 / 1 point

Which of the following is the process of encoding data upon its transmission or storage so that only authorized individuals can read it?

None of these.

Public key infrastructure

Encryption

Secret code

 

Question 5​​1 / 1 point

When looking to secure information resources, organizations must balance the need for security with which of the following?

The customers' expectation that their data will be protected

The users’ need to effectively access and use these resources

The cost of replacing the data if it is stolen

The potential damage to the company' reputation if the data is stolen

 

Question 6​​1 / 1 point

Which of the following types of enterprise applications focuses on customers? 

SCM

ERP

CRM

 

Question 7​​1 / 1 point

Which of the following types of enterprise systems deal with managing vendors?

ERP

SCM

CRM

 

Question 8​​1 / 1 point

Which of the following is one of the most common ways thieves steal corporate information?

Stealing employee laptops while employees are traveling

Breaking into the data center building

Using employees' computers while they are away from their desks

Using employees' personal computers at their residences

 

Question 9​​1 / 1 point

Which of the following is used to ensure that the person accessing a system is, indeed, who they present themselves to be?

Authorization

User identification

Authentication

Encryption

 

Question 10​​1 / 1 point

True or False: The recommended way to implement an ERP system is to modify the software so that it functions in the way that the organization conducts the process.

​True

​False

 

Question 11​​1 / 1 point

Which of the following types of enterprise applications is the most comprehensive in terms of areas of the business it supports?

CRM

SCM

ERP

 

Question 12​​1 / 1 point

The characteristics of an ERP include:  (select all that apply)

Consistent look and feel

Real-time operation and processing of data and transactions

A common database

Enterprise-wide integration

 

Question 13​​1 / 1 point

Which of the following is not true about firewalls?

They only filter data packets coming into the network or system.

They can be a hardware device.

They can be software.

They filter data packets based on a set of rules.

 

Question 14​​1 / 1 point

Which of the following make up the security triad?

Confidentiality, Integrity, Availability

Privacy, Confidentiality, Integrity

Confidentiality, Integrity, Accuracy

Integrity, Privacy, Accuracy

 

Question 15​​1 / 1 point

True or false:  An Intrusion Detection System (IDS), in and of itself, does not add any additional security.

​True

​False

 

Comments