Exam 27: Data Breaches
Exam 1: The Importance of Mis98 Questions
Exam 2: Business Processes, Information Systems, and Information101 Questions
Exam 3: Organizational Strategy, Information Systems, and Competitive Advantage108 Questions
Exam 4: Hardware and Software101 Questions
Exam 5: Database Processing100 Questions
Exam 6: The Cloud85 Questions
Exam 7: Processes, Organizations, and Information Systems95 Questions
Exam 8: Social Media Information Systems113 Questions
Exam 9: Business Intelligence Systems104 Questions
Exam 10: Information Systems Security118 Questions
Exam 11: Information Systems Management90 Questions
Exam 12: Information Systems Development108 Questions
Exam 13: Collaboration Information Systems for Decision Making, Problem Solving, and Project Management58 Questions
Exam 14: Collaborative Information Systems for Student Projects67 Questions
Exam 15: Mobile Systems65 Questions
Exam 16: Introduction to Microsoft Excel 201657 Questions
Exam 17: Database Design51 Questions
Exam 18: Using Microsoft Access 201656 Questions
Exam 19: Using Excel and Access Together55 Questions
Exam 20: Network and Cloud Technology72 Questions
Exam 21: Enterprise Resource Planning Erp Systems60 Questions
Exam 22: Supply Chain Management50 Questions
Exam 23: Enterprise Social Networks and Knowledge Management50 Questions
Exam 24: Database Marketing45 Questions
Exam 25: Reporting Systems and Olap50 Questions
Exam 26: Artificial Intelligence and Automation45 Questions
Exam 27: Data Breaches65 Questions
Exam 28: International Mis56 Questions
Exam 29: Systems Development Project Management60 Questions
Exam 30: Agile Development55 Questions
Exam 31: Business Process Management56 Questions
Select questions type
Which of the following should be done by employees to protect against data breaches?
(Multiple Choice)
4.7/5
(39)
Despite data breach, organizations should refrain from informing their users immediately as it will lead to mass user defection.
(True/False)
4.8/5
(36)
Performing a walkthrough should be done as part of a business continuity planning session.
(True/False)
4.8/5
(36)
The first step in protecting oneself from data breaches is ________.
(Multiple Choice)
4.8/5
(43)
It is easy for organizations to prepare a list of countermeasures against many different types of attacks and take appropriate measures accordingly.
(True/False)
4.8/5
(43)
________ are software or procedures used to prevent an information security attack.
(Multiple Choice)
4.8/5
(39)
What was one major change that happen in business because of the Target breach?
(Multiple Choice)
4.8/5
(45)
Organizations need to understand the body of regulatory law relative to the type of information they store because they will be held accountable for implementing those standards.
(True/False)
4.8/5
(38)
A student at the MSA University hacked into the university's official Web site and stole some confidential information about the scholarship program. This incident is an example of ________.
(Multiple Choice)
4.9/5
(33)
Executives, managers, and all systems personnel of an organization discuss the actions to be taken by each employee in case a data breach occurs. They identify areas that would need immediate attention and assign specific responsibilities to each employee. The employees of the organization are performing a(n) ________.
(Multiple Choice)
4.9/5
(32)
________ refers to the process of placing a small charge on a credit card to ensure it is working.
(Multiple Choice)
4.9/5
(34)
The purpose of a business continuity planning session in an organization is to ________.
(Multiple Choice)
4.8/5
(41)
Which of the following regulatory laws requires data protection for financial institutions?
(Multiple Choice)
4.8/5
(47)
Which of the following is a best practice for notifying users of a data breach?
(Multiple Choice)
4.9/5
(42)
What are countermeasures? Why is it important for organizations to implement countermeasures?
(Essay)
4.7/5
(35)
Internal employees can steal data more easily than external hackers.
(True/False)
4.8/5
(30)
Explain how hackers use information stolen from data breaches for credit card forgery.
(Essay)
4.9/5
(34)
Showing 41 - 60 of 65
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)