Exam 3: Cyberattacks and Cybersecurity

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Even when preventive measures are implemented, no organization is completely secure from a determined computer attack.

Free
(True/False)
4.9/5
(30)
Correct Answer:
Verified

True

After virus eradication, you can use a previous backup to restore an infected computer.

Free
(True/False)
4.8/5
(41)
Correct Answer:
Verified

False

Vishing frequently leads consumers to counterfeit Web sites designed to trick them into initiating a denial-of-service attack.

Free
(True/False)
4.9/5
(44)
Correct Answer:
Verified

False

Often a successful attack on an information system is due to poor system design or implementation. Once such a vulnerability is discovered, software developers quickly create and issue which of the following, in order to eliminate the problem?

(Multiple Choice)
4.8/5
(44)

The intimidation of government or civilian population by using information technology to disable critical national infrastructure in order to achieve political, religious, or ideological goals is known as which of the following?

(Multiple Choice)
4.9/5
(36)

Define computer forensics and briefly describe how one may prepare for a role as a computer forensics investigator.

(Essay)
4.8/5
(37)

Malware that stops you from using your computer or accessing your data until you meet certain demands is known as which of the following?

(Multiple Choice)
4.9/5
(34)

A type of computer crime perpetrator whose primary motive is to achieve financial gain is known as which of the following?

(Multiple Choice)
4.9/5
(38)

Briefly explain why many organizations are choosing to outsource their network security operations to a managed security service provider (MSSP).

(Essay)
4.9/5
(43)

A business policy that permits employees to use their own mobile devices to access company computing resources and applications is known as which of the following?

(Multiple Choice)
5.0/5
(39)

Which of the following is a form of Trojan horse which executes when it is triggered by a specific event such as a change in a particular file, by typing a specific series of keystrokes, or by a specific time or date?

(Multiple Choice)
4.8/5
(42)

Many organizations use software to provide a comprehensive display of all key performance indicators related to an organization's security defenses, including threats, exposures, policy compliance, and incident alerts. What is this type of software known as?

(Multiple Choice)
4.7/5
(41)

The Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act states that it is legal to spam, provided the messages meet a few basic requirements.

(True/False)
4.9/5
(46)

Installation of a corporate firewall is the least common security precaution taken by businesses as it does not provide sufficient security.

(True/False)
5.0/5
(40)

Trojan horse has become an umbrella term for many types of malicious code.

(True/False)
4.8/5
(37)

The cost of creating an email campaign for a product or a service is typically more expensive and takes longer to conduct than a direct-mail campaign.

(True/False)
4.9/5
(45)

Bring your own device (BYOD) is a business policy that permits, and in some cases encourages, employees to use their own mobile devices (smartphones, tablets, or laptops) to access company computing resources and applications.

(True/False)
4.8/5
(39)

Which of the following concepts recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved?

(Multiple Choice)
4.7/5
(42)

Whenever possible, automated system rules should mirror an organization's written policies.

(True/False)
4.8/5
(39)

Identify and briefly discuss five reasons why the number, variety, and impact of security incidents is increasing.

(Essay)
4.8/5
(43)
Showing 1 - 20 of 60
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)