What is the length of time it takes to correct a website vulnerability?
100
A structured approach to manage It value, alignment, security, availability, complexity and regulatory compliance.
What is IT Governance?
100
This integrates marketing, sales, customer service and technical sales support.
What is Customer Relationship Management?
100
A visualization tool that allows real time configurable indicators that support drill down research across platforms.
What are digital dashboards? (or the key features of dashboards)
200
This is determined by the type of company, the number of users, the type of access needed, the number of modules involved, whether the solution will be developed internally, and how much customization is needed.
What is the cost of an ERP system?
200
These should change every 30 days and have a minimum of 8 characters that include alphanumeric, upper case, lower case, and special characters.
What are strong password authorization systems?
200
This involves understanding the risk context, identifying risks, assessing risks, mitigating risks with controls consistent with your risk appetite, and then continuously monitoring and improving the entire system.
What is the process of ISO 31000?
200
There are operational, analytical, collaborative, intelligence, and geographical modules available.
What are the different types of CRM?
200
Strategic, operational, and analytical are three of these.
What are the types of digital dashboards?
300
55% of all ERP projects
How often are there ERP implementation delays?
300
Physical, natural, hardware, software, storage, communications, and humans
What are the main weak points of risk vulnerability in accounting information systems?
300
Meeting stakeholder needs, managing IT end to end, using a single integrated framework and a holistic approach, and separating IT governance from IT management.
What are the COBIT 5 principles?
300
Reduced costs, increased sales, and increased customer satisfaction are some of these
What are the benefits of CRM?
300
Similarity, proximity, closure, continuity, and focal point are some of these.
What are the considerations for your dashboard blueprint/brand?
400
These include cultural readiness and a clear vision of the scope of the ERP project.
What are some of the keys to successful implementation?
400
Expected value, Livermore, and Stochastic dominance are three of these.
What are quantitative IT risk analysis methods?
400
The international standard for information security
What is ISO 27002?
400
Salesforce, SAP, Oracle, and Microsoft Dynamics
Who are the leading CRM vendors?
400
Marketing, Sales, Customer Service, Product Development and Human Resources are some of these.
Which departments/functions are using social media the most?
500
These include cloud based, social media and mobile device integration, and two tiers.
What are ERP industry trends?
500
Dual key cryptography systems where one key is a public key that is shared with others and the other key is a private key.
What are asymmetric cryptography systems?
500
Understanding and segregating the roles and responsibilities of information security, in house, as well as working remotely or on mobile devices
What is section 6 of ISO 27002 concerned with?
500
39% of all implementations have a positive return
What is the performance record of CRMs? (or something like that)
500
Secure authentication, ability to track, lock, and wipe are some of these
What are the security strategies for mobile device asset use?