Exam 16: Cybersecurity
Exam 1: Accounting As Information98 Questions
Exam 2: Risks and Risk Assessments100 Questions
Exam 3: Risk Management and Internal Controls100 Questions
Exam 4: Software and Systems106 Questions
Exam 5: Data Storage and Analysis98 Questions
Exam 6: Systems and Database Design98 Questions
Exam 7: Emerging and Disruptive Technologies100 Questions
Exam 8: Documenting Systems and Processes100 Questions
Exam 9: Human Resources and Payroll Processes100 Questions
Exam 10: Purchasing and Payments Process100 Questions
Exam 11: Conversion Processes100 Questions
Exam 12: Marketing, Sales, and Collection Processes100 Questions
Exam 13: Financial Reporting Processes103 Questions
Exam 14: Information Systems and Controls100 Questions
Exam 15: Fraud100 Questions
Exam 16: Cybersecurity99 Questions
Exam 17: Data Analytics99 Questions
Exam 18: Data Visualization100 Questions
Exam 19: Audit Assurance86 Questions
Select questions type
The purpose of a ________, also called an IP probe, is to identify which hosts are active in the network by sending a communication to each IP address to see if there is a response packet.
Free
(Multiple Choice)
4.7/5
(34)
Correct Answer:
A
What is an incorrect sender address red flag?
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
A
The National Institute of Standards and Technology (NIST) has published Security and Privacy Controls for Federal Information Systems and Organizations (NIST-800-53). One of the control families is Access Control. What ID does Access Control family use?
(Multiple Choice)
4.8/5
(41)
Which of the following is an example of a Denial-of-Service internal control?
(Multiple Choice)
4.9/5
(42)
Match the cybersecurity threat to the following control activity:
-Ensure that the information system uniquely identifies and authenticates devices before establishing a connection.
(Multiple Choice)
4.7/5
(27)
The National Institute of Standards and Technology (NIST) has published Security and Privacy Controls for Federal Information Systems and Organizations (NIST-800-53). The NIST-800-53 document is divided into 18 control families. One of the control families is Configuration Management. What ID does Configuration Management family use?
(Multiple Choice)
4.8/5
(41)
Cybersecurity programs are subject to different resource constraints and business needs depending on the size of the company. Who might be responsible for leading the cybersecurity program in a larger organization?
(Essay)
4.9/5
(29)
What is it called when a company performs sweeps and scans to detect and classify loopholes in their infrastructure?
(Multiple Choice)
4.9/5
(33)
RAM Manufacturing LLC is a rapidly growing manufacturer of parts for the automotive industry. Maeve, an Internal Auditor, started with RAM Manufacturing a month ago. Maeve arrives at work, parks her car and walks to a side entrance. There she finds Justin waiting. Justin tells her that he works for an equipment repair company, has been called out to RAM Manufacturing to make repairs on a piece of equipment and forgot his ID in his work truck. He asks if Maeve could let him enter the side entrance. Maeve has never met Justin before. What should Maeve do?
(Essay)
4.8/5
(43)
RAM Manufacturing LLC is a rapidly growing manufacturer of parts for the automotive industry. Maeve, the VP of Internal Audit is working with the chief technology officer, Justin, to propose an enterprise-wide data strategy project to the audit committee. Maeve suggests that the Internal Audit department perform a review of the company's data management and privacy procedures. This review will involve interviewing various departments throughout RAM Manufacturing to ask questions such as:
• What guidelines are in place for data privacy?
• How is data being shared?
• Are communications masked or encrypted securely?
• What are the differences between internal communications and communications with third parties?
• Where is data being stored?
• What procedures are in place for data retention?
• Do these procedures meet regulatory standards?
Maeve and Justin must decide which framework(s) to use as guidance for proposing recommendations for this project to the audit committee. What framework would you recommend? Justify your answer.
(Essay)
4.8/5
(38)
A business can protect itself from DoS and DDoS attacks by ensuring that ________, routers, and intrusion detection systems are up-to-date, are properly configured, and will automatically block the ports where fake requests enter the system.
(Multiple Choice)
4.9/5
(33)
What are some of the things that attackers may do once they have broken into a network?
(Essay)
4.8/5
(42)
Match the cybersecurity threat to the following control activity:
-Prohibit password reuse for a specified number of generations.
(Multiple Choice)
4.9/5
(48)
Showing 1 - 20 of 99
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)