Potential security issues caused by human error

Assignment Help Project Management
Reference no: EM133546974

Questions

1. Which of the following is true of using data from ERP systems to make decisions?

• The process is prone to error since big data is often unreliable.
• Data-driven decision making eliminates the risk of making poor decisions.
• Decision paralysis can be lessened by removing limits and rules for using data.
• The process is subject to bias because design decisions are made by humans.

2. Which of the following is an example of information (as opposed to data)?

• The distribution of prices of cars at a car dealership
• The number of people who bought cars on Thursday
• The name of a person who bought a car
• The price of a new car

3. Why is it important to determine who needs access to information in an ERP system?

• The information shared with different parties will vary.
• Sharing information with the appropriate stakeholders helps gain trust and buy-in.
• It is necessary for establishing security features.
• All of the above

4. Which of the following is true about sharing data with external partners?

• The easier it is to exchange relevant data, the more time you can spend interpreting and acting on the information.
• The more data you share, the more there is to sift through, and the longer it takes to make decisions.
• Sharing data with external partners is risky, since they will often not reciprocate.
• Data should be limited and available only upon request.

5. Which of the following is true of the FAIR framework?

• There is typically much work to do to align with FAIR even after implementing an ERP system.
• It discourages the use of external data sources because they may not comply with a company's data strategy.
• It governs how both humans and computers can access data and use it to make decisions.
• Most organizations find it effective to adopt just one or two of the FAIR principles rather than implementing all at once.

6. Data and business analytics skills are most valuable when analysts know how to ________.

• Work with increasingly large data sets
• Utilize multiple powerful software programs
• Uncover and convey a meaningful story behind the data
• Create general reports that work for any audience

7. The main challenge companies face during ERP implementation is a lack of _________.

• Feedback from users
• Training and employee guidance
• High-quality data
• Testing and process reengineering

8. How does using an ERP system generate better KPI measurements?

• ERP systems recommend which KPIs are most important to compute for your company.
• The same KPIs can be used for every business function by sharing them through the ERP system.
• Heightened security practices in an ERP system can prevent outside systems from viewing or replicating confidential company data and KPIs.
• Each component in a KPI formula is generated from ERP outputs, providing one single source of
truth for computing metrics.

9. As a data analyst, which of the following approaches would be most successful when giving a report to an executive officer?

• Refrain from directly suggesting actions to take since you are not a decision maker yourself.
• Present all analysis in depth, with detailed explanation of methods and findings.
• Summarize your findings in a face-to-face meeting rather than providing a written report that the executive might not have time to read.
• Include an executive summary for quick reference of the problem and your recommendations.

10. Which of the following is a benefit of edge computing?

• There is less data available per user, which improves processing speeds and user experience.
• No user can access data without signing off with another colleague, improving system integrity.
• Users receive expanded access to data in a secure setting.
• It benefits small businesses that have a limited budget for security features.

11. What is the best defense against phishing attacks?

• Two-factor authentication
• Education on how to identify and deal with fraudulent emails
• Backing up data frequently to an external location
• Policies that require users to create strong passwords and change them frequently

12. How could sharing user accounts put an ERP system at risk?

• It can result in federal fines and punishment.
• It can bypass the segregation of duties and give someone access to information they were not meant to have.
• It can encourage people to send personal communications while at work.
• It can compromise the speed and data handling ability of the system if multiple people are logging in under one account.

13. Which of the following are potential security problems caused by a network administrator? (Select all that apply.)

• Frequent patch updates
• Too much reliance on technology
• Inadequate disaster recovery practices
• Poor password management

14. Good ERP security is primarily about:

• Preventing threats and being prepared for disaster
• Increasing the bottom line
• Ensuring the integrity of data and trust of stakeholders
• Earning a stamp of approval from companies in the industry

15. Why is it important to implement segregation of duties in an ERP system?

• To prevent users from making errors in their functional areas
• To put a fence around the system for protection from outsiders
• To ensure the integrity of transactions and data and protect against fraud
• To cross-train employees in different departments

16. What is the weakest link in the technology security chain?

• Firewalls
• The network administrator
• The ERP user
• Individual ERP modules

17. Which of the following are potential security issues caused by human error? (Select all that apply.)

• Data breaches
• Phishing attacks
• Sharing accounts
• Poor password management

18. Which of the following is true about passwords?

• Two-factor authentication requires using a separate device to access an account rather than using a password.
• It's generally recommended to keep your passwords simple and written down in a visible location so that you can remember them.
• They will soon be eliminated altogether because they are ineffective for account security.
• IT security teams often provide policies or guidance on creating and changing passwords for better security.

19. Sending fraudulent emails that look like they come from legitimate senders to get the user to divulge passwords or other personal information is known as _________.

• Lancing
• Spying
• Phishing
• Hunting

20. Responsible patch management includes ____________.

• Avoiding installation of new patches
• Notification of all users in the company when any update takes place
• Regular and timely updates
• Installing updates only during working hours

21. Who is responsible for implementing appropriate backup, restore, and disaster recovery practices?

• The system administrator or IT team
• Each ERP user
• The HR department
• The CEO

22. Endpoint security refers to __________.

• Antivirus software
• Providing users access to only those functions they need to perform their job
• Putting up a fence around network access points to secure the system
• Requiring users to have a strong password

23. Which ERP environment provides the greatest control over security features?

• On-premises
• Cloud
• Hybrid
• None of the above

24. What is data localization?

• Translation of databases and spreadsheets into different languages for different audiences
• Making copies of data in multiple locations for modification and use in various ways
• Storage of data on the premises of a company rather than in a cloud
• A regulatory requirement in some countries that data a company has collected from and about their citizens must remain stored within the boundaries of that country

25. What lesson can be learned from Kronos's ERP security breach?

• The segregation of duties provides an important check on greed and abuses of power.
• There is no way to completely ensure the security of your employees' data.
• Third-party systems that affect the integrity of an ERP system should also be monitored for security issues.
• Everyone within the organization is a partner in maintaining ERP system security.

Reference no: EM133546974

Questions Cloud

Interpret various types of project analysis : How would one interpret the various types of project analysis which consist of ongoing project risk analysis, project cost analysis, workload analysis
What is difference between objectives and key results : In the OKR goal-setting framework, what is the difference between objectives and key results? What are the three parts of an executive summary?
Established the controlled unclassified information program : Established the controlled unclassified information(CUI) program to manage information that requires safeguarding or dissemination controls.
Why teamwork and collaboration among co-workers : What is one reason why you think Katherine broke up the teams in her division? What are two reasons why teamwork and collaboration among co-workers
Potential security issues caused by human error : Which of the following is true of using data from ERP systems to make decisions? Which of the following are potential security issues caused by human error?
Greg brenneman and william bratton engaged in focused leader : Evaluate the extent to which Greg Brenneman and William Bratton engaged in focused leadership and what areas they could improve.
Which category of expenses is subject to property taxes : What is the primary driver when budgeting CapEx? Which category of expenses is subject to property taxes?
Agility is crucial to customer-focused strategies : Agility is a term that is commonly used to characterize flexibility and short cycle times. Agility is crucial to customer-focused strategies
Prepare the activity cost estimates : Which of the following is the best rationale a project manager to use to convince management to allow the project team to prepare the activity cost estimates.

Reviews

Write a Review

Project Management Questions & Answers

  Describe the project managers role in monitoring tasks

Describe the project manager's role in monitoring tasks. Describe the project manager's role in preparing for project closure.

  How many facings should southern fresh allocate

How many facings should Southern Fresh allocate to Hot Bull corn chips? - How many facings are needed to achieve a 98.75 percent in-stock probability?

  What are some specific things you can implement to enhance

Marie Scheegans highlight three benefits of making connections in the workplace. What are these, and what are some specific things you can implement to enhance

  Discuss three major project management techniques

Discuss three major project management techniques you learned from this course. Please explain how you would apply this concept

  When does the out-of-control behavior occur

What is the appropriate control chart that can be used by the quality engineer and determine the control limits (show your calculations)

  How to develop a responsibility assignment matrix

How to Develop a Responsibility Assignment Matrix (Links to an external site.). Project Communications: A Plan for Getting Your Message Across (Links to an external site.)

  Determining a project management process

The Keflavik Paper Company is a case with a problem in determining a project management process for new product development.

  Infrastructure for planned-learning and selectionist project

Organizations use managerial systems to help project teams collaborate to work through unforeseeable uncertainty. Using a project from your local community or state, determine how you would respond to the discussion below (be sure to reference you..

  Increasing numbers of abortion cases today

What are the social and economic factors that lead to increasing numbers of Abortion cases today?

  Cognitive ability tests are predictor of job performance

Cognitive ability tests are one of the best predictors of job performance, yet they have substantial adverse impact against minorities. Do you think it’s fair to use such tests? Why or why not?

  Prepare a stakeholder analysis

Prepare a stakeholder analysis, RACI chart and sow analysis with good templates and complete work on Fidget spinner.

  What is annual demand for a single item d

A production process is used to produce 20 different items, under intermittent batch production.  When inventory or projected inventory of an item drops to a certain level, a production order is released for Q units of that item.  Because product dem..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd