IFSM 300 IFSM300 WEEK 6 QUIZ RESULTS (2020) - UMUC
UMUC IFSM 300 Week 6 Quiz Results (2020)
Question 11 / 1 point
Which of the following should be included in a good backup plan? (select all that apply)
A full inventory of all of the information that needs to be backed up
Regular backups of all data
Offsite storage of backup data sets
Test of data restoration
Question 21 / 1 point
Which of the following is described as the assurance that the information being accessed has not been altered and truly represents what is intended?
Correctness
Completeness
Integrity
Assurance
Question 31 / 1 point
ERP implementations can fail due to many factors. Some of these are: (select all that apply)
Selecting the wrong ERP
Customizing the ERP
Employee resistance
Lack of common data definitions
Question 41 / 1 point
Which of the following is the process of encoding data upon its transmission or storage so that only authorized individuals can read it?
None of these.
Public key infrastructure
Encryption
Secret code
Question 51 / 1 point
When looking to secure information resources, organizations must balance the need for security with which of the following?
The customers' expectation that their data will be protected
The users’ need to effectively access and use these resources
The cost of replacing the data if it is stolen
The potential damage to the company' reputation if the data is stolen
Question 61 / 1 point
Which of the following types of enterprise applications focuses on customers?
SCM
ERP
CRM
Question 71 / 1 point
Which of the following types of enterprise systems deal with managing vendors?
ERP
SCM
CRM
Question 81 / 1 point
Which of the following is one of the most common ways thieves steal corporate information?
Stealing employee laptops while employees are traveling
Breaking into the data center building
Using employees' computers while they are away from their desks
Using employees' personal computers at their residences
Question 91 / 1 point
Which of the following is used to ensure that the person accessing a system is, indeed, who they present themselves to be?
Authorization
User identification
Authentication
Encryption
Question 101 / 1 point
True or False: The recommended way to implement an ERP system is to modify the software so that it functions in the way that the organization conducts the process.
True
False
Question 111 / 1 point
Which of the following types of enterprise applications is the most comprehensive in terms of areas of the business it supports?
CRM
SCM
ERP
Question 121 / 1 point
The characteristics of an ERP include: (select all that apply)
Consistent look and feel
Real-time operation and processing of data and transactions
A common database
Enterprise-wide integration
Question 131 / 1 point
Which of the following is not true about firewalls?
They only filter data packets coming into the network or system.
They can be a hardware device.
They can be software.
They filter data packets based on a set of rules.
Question 141 / 1 point
Which of the following make up the security triad?
Confidentiality, Integrity, Availability
Privacy, Confidentiality, Integrity
Confidentiality, Integrity, Accuracy
Integrity, Privacy, Accuracy
Question 151 / 1 point
True or false: An Intrusion Detection System (IDS), in and of itself, does not add any additional security.
True
False
Comments
Post a Comment