Potential security issues caused by human error

Assignment Help Project Management
Reference no: EM133546974

Questions

1. Which of the following is true of using data from ERP systems to make decisions?

• The process is prone to error since big data is often unreliable.
• Data-driven decision making eliminates the risk of making poor decisions.
• Decision paralysis can be lessened by removing limits and rules for using data.
• The process is subject to bias because design decisions are made by humans.

2. Which of the following is an example of information (as opposed to data)?

• The distribution of prices of cars at a car dealership
• The number of people who bought cars on Thursday
• The name of a person who bought a car
• The price of a new car

3. Why is it important to determine who needs access to information in an ERP system?

• The information shared with different parties will vary.
• Sharing information with the appropriate stakeholders helps gain trust and buy-in.
• It is necessary for establishing security features.
• All of the above

4. Which of the following is true about sharing data with external partners?

• The easier it is to exchange relevant data, the more time you can spend interpreting and acting on the information.
• The more data you share, the more there is to sift through, and the longer it takes to make decisions.
• Sharing data with external partners is risky, since they will often not reciprocate.
• Data should be limited and available only upon request.

5. Which of the following is true of the FAIR framework?

• There is typically much work to do to align with FAIR even after implementing an ERP system.
• It discourages the use of external data sources because they may not comply with a company's data strategy.
• It governs how both humans and computers can access data and use it to make decisions.
• Most organizations find it effective to adopt just one or two of the FAIR principles rather than implementing all at once.

6. Data and business analytics skills are most valuable when analysts know how to ________.

• Work with increasingly large data sets
• Utilize multiple powerful software programs
• Uncover and convey a meaningful story behind the data
• Create general reports that work for any audience

7. The main challenge companies face during ERP implementation is a lack of _________.

• Feedback from users
• Training and employee guidance
• High-quality data
• Testing and process reengineering

8. How does using an ERP system generate better KPI measurements?

• ERP systems recommend which KPIs are most important to compute for your company.
• The same KPIs can be used for every business function by sharing them through the ERP system.
• Heightened security practices in an ERP system can prevent outside systems from viewing or replicating confidential company data and KPIs.
• Each component in a KPI formula is generated from ERP outputs, providing one single source of
truth for computing metrics.

9. As a data analyst, which of the following approaches would be most successful when giving a report to an executive officer?

• Refrain from directly suggesting actions to take since you are not a decision maker yourself.
• Present all analysis in depth, with detailed explanation of methods and findings.
• Summarize your findings in a face-to-face meeting rather than providing a written report that the executive might not have time to read.
• Include an executive summary for quick reference of the problem and your recommendations.

10. Which of the following is a benefit of edge computing?

• There is less data available per user, which improves processing speeds and user experience.
• No user can access data without signing off with another colleague, improving system integrity.
• Users receive expanded access to data in a secure setting.
• It benefits small businesses that have a limited budget for security features.

11. What is the best defense against phishing attacks?

• Two-factor authentication
• Education on how to identify and deal with fraudulent emails
• Backing up data frequently to an external location
• Policies that require users to create strong passwords and change them frequently

12. How could sharing user accounts put an ERP system at risk?

• It can result in federal fines and punishment.
• It can bypass the segregation of duties and give someone access to information they were not meant to have.
• It can encourage people to send personal communications while at work.
• It can compromise the speed and data handling ability of the system if multiple people are logging in under one account.

13. Which of the following are potential security problems caused by a network administrator? (Select all that apply.)

• Frequent patch updates
• Too much reliance on technology
• Inadequate disaster recovery practices
• Poor password management

14. Good ERP security is primarily about:

• Preventing threats and being prepared for disaster
• Increasing the bottom line
• Ensuring the integrity of data and trust of stakeholders
• Earning a stamp of approval from companies in the industry

15. Why is it important to implement segregation of duties in an ERP system?

• To prevent users from making errors in their functional areas
• To put a fence around the system for protection from outsiders
• To ensure the integrity of transactions and data and protect against fraud
• To cross-train employees in different departments

16. What is the weakest link in the technology security chain?

• Firewalls
• The network administrator
• The ERP user
• Individual ERP modules

17. Which of the following are potential security issues caused by human error? (Select all that apply.)

• Data breaches
• Phishing attacks
• Sharing accounts
• Poor password management

18. Which of the following is true about passwords?

• Two-factor authentication requires using a separate device to access an account rather than using a password.
• It's generally recommended to keep your passwords simple and written down in a visible location so that you can remember them.
• They will soon be eliminated altogether because they are ineffective for account security.
• IT security teams often provide policies or guidance on creating and changing passwords for better security.

19. Sending fraudulent emails that look like they come from legitimate senders to get the user to divulge passwords or other personal information is known as _________.

• Lancing
• Spying
• Phishing
• Hunting

20. Responsible patch management includes ____________.

• Avoiding installation of new patches
• Notification of all users in the company when any update takes place
• Regular and timely updates
• Installing updates only during working hours

21. Who is responsible for implementing appropriate backup, restore, and disaster recovery practices?

• The system administrator or IT team
• Each ERP user
• The HR department
• The CEO

22. Endpoint security refers to __________.

• Antivirus software
• Providing users access to only those functions they need to perform their job
• Putting up a fence around network access points to secure the system
• Requiring users to have a strong password

23. Which ERP environment provides the greatest control over security features?

• On-premises
• Cloud
• Hybrid
• None of the above

24. What is data localization?

• Translation of databases and spreadsheets into different languages for different audiences
• Making copies of data in multiple locations for modification and use in various ways
• Storage of data on the premises of a company rather than in a cloud
• A regulatory requirement in some countries that data a company has collected from and about their citizens must remain stored within the boundaries of that country

25. What lesson can be learned from Kronos's ERP security breach?

• The segregation of duties provides an important check on greed and abuses of power.
• There is no way to completely ensure the security of your employees' data.
• Third-party systems that affect the integrity of an ERP system should also be monitored for security issues.
• Everyone within the organization is a partner in maintaining ERP system security.

Reference no: EM133546974

Questions Cloud

Interpret various types of project analysis : How would one interpret the various types of project analysis which consist of ongoing project risk analysis, project cost analysis, workload analysis
What is difference between objectives and key results : In the OKR goal-setting framework, what is the difference between objectives and key results? What are the three parts of an executive summary?
Established the controlled unclassified information program : Established the controlled unclassified information(CUI) program to manage information that requires safeguarding or dissemination controls.
Why teamwork and collaboration among co-workers : What is one reason why you think Katherine broke up the teams in her division? What are two reasons why teamwork and collaboration among co-workers
Potential security issues caused by human error : Which of the following is true of using data from ERP systems to make decisions? Which of the following are potential security issues caused by human error?
Greg brenneman and william bratton engaged in focused leader : Evaluate the extent to which Greg Brenneman and William Bratton engaged in focused leadership and what areas they could improve.
Which category of expenses is subject to property taxes : What is the primary driver when budgeting CapEx? Which category of expenses is subject to property taxes?
Agility is crucial to customer-focused strategies : Agility is a term that is commonly used to characterize flexibility and short cycle times. Agility is crucial to customer-focused strategies
Prepare the activity cost estimates : Which of the following is the best rationale a project manager to use to convince management to allow the project team to prepare the activity cost estimates.

Reviews

Write a Review

Project Management Questions & Answers

  Create a project schedule and align resources

Create a project schedule and align resources, Analyze project schedule and resource allocation

  Managerial roles and gap analysis

Write a report on Managerial Roles and Gap Analysis

  Questionaire on project management

Questionaire on Project Management

  Describe the market growth rate for product

Describe the market growth rate for product and service.

  Prepare a work plan and project schedule - gantt chart

Design an online system for the human resources department to manage available job positions.

  Project risk management approach

How does a project risk management approach pro-vide an early warning signal for impending problems or issues

  Black-scholes options pricing model

Calculate the payoff and the profits for investments

  Describe the features or characteristics of product

Describe the features or characteristics of your product or service.

  Write paper on inventory management system

Write paper on Inventory Management System.

  Analysis of the overall project risk

Analysis of the overall project risk

  Investment and performance analysis

Evaluate the usefulness of ROCE

  Distribution strategy and project management

Distribution strategy and project management

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd