Exam 5: Cybersecurity and Risk Management Technology
Exam 1: Disruptive IT Impacts Companies, competition, and Careers96 Questions
Exam 2: Information Systems, IT Architecture, Data Governance, and Cloud Computing168 Questions
Exam 3: Data Management, Business Intelligence, and Data Analytics123 Questions
Exam 4: Networks, Collaborative Technology, and the Internet of Things135 Questions
Exam 5: Cybersecurity and Risk Management Technology148 Questions
Exam 6: Search, Semantic, and Recommendation Technology122 Questions
Exam 7: Web 2.0 and Social Technology111 Questions
Exam 8: Retail, e-Commerce, and Mobile Commerce Technology145 Questions
Exam 9: Functional Business Systems151 Questions
Exam 10: Enterprise Systems124 Questions
Exam 11: Data Visualization and Geographic Information Systems92 Questions
Exam 12: IT Strategy, Sourcing, and Strategic Technology Trends130 Questions
Exam 13: Systems Development and Project Management112 Questions
Exam 14: IT Ethics, Privacy and Sustainability66 Questions
Select questions type
Cybercrime surveys have reported each of the following trends or findings except ________.
Free
(Multiple Choice)
4.7/5
(38)
Correct Answer:
D
U.S.cybersecurity experts and government officials are increasingly concerned about breaches from __________ into corporate networks,either through mobile devices or by other means.
Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
D
One source of cybersecurity threats today are ____________who breach networks in an attempt to gain media attention or for their cause.
Free
(Multiple Choice)
4.7/5
(29)
Correct Answer:
A
In Cybersecurity terminology,a vulnerability is defined as ________:
(Multiple Choice)
4.8/5
(32)
___________ tactics are used by hackers and corporate spies to trick people into revealing login information or access codes.
(Multiple Choice)
4.8/5
(29)
Social networks and cloud computing increase vulnerabilities by providing a single point of failure and attack for organized criminal networks.
(True/False)
5.0/5
(31)
All of the following describe The Sarbanes-Oxley Act except:
(Multiple Choice)
4.8/5
(40)
A person who may violate ethical standards or principles,but without malicious intent.
(Multiple Choice)
4.8/5
(33)
Powerful IT security systems are needed to defend against what appears to be authorized access to a network or application.
(True/False)
4.8/5
(34)
In the United States,the Sarbanes-Oxley Act (SOX)requires businesses to __________________________.
(Multiple Choice)
4.9/5
(26)
A computer security specialist who breaks into protected systems and networks to test and assess their security.
(Multiple Choice)
4.9/5
(30)
When a host computer is infected,attempts to remove the malware may fail-and the malware may reinfect the host during a restore if the malware is captured in backups or archives.
(True/False)
4.9/5
(32)
According to a Ponemon study in 2016,the average cost of an overall data breach is:
(Multiple Choice)
4.9/5
(42)
__________ is a process designed to achieve reliable financial reporting in order to protect investors and comply with regulations.
(Short Answer)
4.8/5
(36)
LulzSec and Anonymous are examples of ________ that have claimed responsibility for high profile attacks designed to make a political statement,embarrass an organization or government,or to gain publicity.
(Multiple Choice)
4.9/5
(31)
Most organizations use software or hardware devices to control access to their private networks from the Internet by analyzing incoming and outgoing data packets.These devices are called ___________.
(Multiple Choice)
4.7/5
(32)
Attacks ________ could significantly disrupt the functioning of government and business-and trigger cascading effects far beyond the targeted sector and physical location of the incident.
(Multiple Choice)
4.7/5
(32)
Approximately 25 percent of occupational fraud could have been prevented if proper IT-based internal controls had been designed,implemented,and followed
(True/False)
4.8/5
(35)
In Cybersecurity terminology,a(n)_____________ is defined as the probability of a threat exploiting a vulnerability and the resulting cost.
(Short Answer)
4.9/5
(39)
The principle of ________ acknowledges that the cost of information security needs to be balanced with its benefits.It is the basic cost-benefit principle with which you are familiar.
(Multiple Choice)
4.8/5
(39)
Showing 1 - 20 of 148
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)