Question 1 (1 point)
Which of the following is used to ensure that the person accessing a system
is, indeed, who they present themselves to be?
Question 1 options:
Encryption
Authorization
Authentication
User identification
Question 2 (1 point)
True or false: An Intrusion Detection System (IDS), in and of itself, does not
add any additional security.
Question 2 options:
True
False
Question 3 (1 point)
Which of the following types of enterprise applications focuses on
customers?
Question 3 options:
SCM
ERP
CRM
, Question 4 (1 point)
Which of the following types of enterprise applications is the most
comprehensive in terms of areas of the business it supports?
Question 4 options:
SCM
CRM
ERP
Question 5 (1 point)
The characteristics of an ERP include: (select all that apply)
Question 5 options:
Enterprise-wide integration
Real-time operation and processing of data and transactions
A common database
Consistent look and feel
Question 6 (1 point)
Which of the following is the process of encoding data upon its transmission
or storage so that only authorized individuals can read it?
Question 6 options:
Public key infrastructure
None of these.
Secret code
Encryption