Exam 27: Data Breaches

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following should be done by employees to protect against data breaches?

(Multiple Choice)
4.7/5
(39)

Despite data breach, organizations should refrain from informing their users immediately as it will lead to mass user defection.

(True/False)
4.8/5
(36)

Performing a walkthrough should be done as part of a business continuity planning session.

(True/False)
4.8/5
(36)

The first step in protecting oneself from data breaches is ________.

(Multiple Choice)
4.8/5
(43)

It is easy for organizations to prepare a list of countermeasures against many different types of attacks and take appropriate measures accordingly.

(True/False)
4.8/5
(43)

________ are software or procedures used to prevent an information security attack.

(Multiple Choice)
4.8/5
(39)

An exploit is a type of attack vector used by hackers.

(True/False)
4.7/5
(31)

What was one major change that happen in business because of the Target breach?

(Multiple Choice)
4.8/5
(45)

Organizations need to understand the body of regulatory law relative to the type of information they store because they will be held accountable for implementing those standards.

(True/False)
4.8/5
(38)

All of these are PCI DSS requirements EXCEPT ________.

(Multiple Choice)
4.9/5
(45)

A student at the MSA University hacked into the university's official Web site and stole some confidential information about the scholarship program. This incident is an example of ________.

(Multiple Choice)
4.9/5
(33)

Executives, managers, and all systems personnel of an organization discuss the actions to be taken by each employee in case a data breach occurs. They identify areas that would need immediate attention and assign specific responsibilities to each employee. The employees of the organization are performing a(n) ________.

(Multiple Choice)
4.9/5
(32)

________ refers to the process of placing a small charge on a credit card to ensure it is working.

(Multiple Choice)
4.9/5
(34)

The purpose of a business continuity planning session in an organization is to ________.

(Multiple Choice)
4.8/5
(41)

Which of the following regulatory laws requires data protection for financial institutions?

(Multiple Choice)
4.8/5
(47)

Why should organizations respond quickly to data breaches?

(Essay)
4.8/5
(37)

Which of the following is a best practice for notifying users of a data breach?

(Multiple Choice)
4.9/5
(42)

What are countermeasures? Why is it important for organizations to implement countermeasures?

(Essay)
4.7/5
(35)

Internal employees can steal data more easily than external hackers.

(True/False)
4.8/5
(30)

Explain how hackers use information stolen from data breaches for credit card forgery.

(Essay)
4.9/5
(34)
Showing 41 - 60 of 65
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)