According to your text, what should companies do to guard against a breach of security in their CRM systems?
A. Install powerful firewalls to protect customer data.
B. Only allow CRM data to be shared with company affiliates.
C. Rely on cloud computing applications instead.
D. Rely on government laws to catch hackers.
E. Store credit card numbers only for the purpose of customer orders.
Answer: A
You might also like to view...
According to Worth, MOST nonprofits ______ lobby.
A. do not B. actively C. criticize D. encourage
Which sentence uses correct capitalization?
A) Because Katrina did not receive her IRS form 1099 on time, she filed her Federal income taxes late. B) Because Katrina did not receive her IRS form 1099 on time, she filed her federal income taxes late. C) Because Katrina did not receive her IRS Form 1099 on time, she filed her federal income taxes late.
Mitchell Finnigan runs the marketing department of a large electronics firm. This firm operates in an extremely competitive business environment. Mitchell wants to ensure that he is involved in all the daily decisions and that there is a clear chain of communication between himself and his marketing employees. He believes that his extensive marketing experience makes him the best person for making all the major marketing decisions. Mitchell believes all employees should act together as a cohesive unit and know their roles. Under Mitchell Finnigan, the marketing department most likely has a _______________ structure.
A. decentralized B. informal C. demoralizing D. opportunistic E. centralized
The Project Workbook is an offline or hard-copy repository for all project correspondence, inputs, outputs, deliverables, procedures, and standards that is used for performing project audits, orienting new team members, communicating with management
and customers, identifying future projects, and performing post-project reviews. Indicate whether the statement is true or false