Exam 5: Cybersecurity and Risk Management Technology

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Cybercrime surveys have reported each of the following trends or findings except ________.

Free
(Multiple Choice)
4.7/5
(38)
Correct Answer:
Verified

D

U.S.cybersecurity experts and government officials are increasingly concerned about breaches from __________ into corporate networks,either through mobile devices or by other means.

Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
Verified

D

One source of cybersecurity threats today are ____________who breach networks in an attempt to gain media attention or for their cause.

Free
(Multiple Choice)
4.7/5
(29)
Correct Answer:
Verified

A

In Cybersecurity terminology,a vulnerability is defined as ________:

(Multiple Choice)
4.8/5
(32)

___________ tactics are used by hackers and corporate spies to trick people into revealing login information or access codes.

(Multiple Choice)
4.8/5
(29)

Social networks and cloud computing increase vulnerabilities by providing a single point of failure and attack for organized criminal networks.

(True/False)
5.0/5
(31)

All of the following describe The Sarbanes-Oxley Act except:

(Multiple Choice)
4.8/5
(40)

A person who may violate ethical standards or principles,but without malicious intent.

(Multiple Choice)
4.8/5
(33)

Powerful IT security systems are needed to defend against what appears to be authorized access to a network or application.

(True/False)
4.8/5
(34)

In the United States,the Sarbanes-Oxley Act (SOX)requires businesses to __________________________.

(Multiple Choice)
4.9/5
(26)

A computer security specialist who breaks into protected systems and networks to test and assess their security.

(Multiple Choice)
4.9/5
(30)

When a host computer is infected,attempts to remove the malware may fail-and the malware may reinfect the host during a restore if the malware is captured in backups or archives.

(True/False)
4.9/5
(32)

According to a Ponemon study in 2016,the average cost of an overall data breach is:

(Multiple Choice)
4.9/5
(42)

__________ is a process designed to achieve reliable financial reporting in order to protect investors and comply with regulations.

(Short Answer)
4.8/5
(36)

LulzSec and Anonymous are examples of ________ that have claimed responsibility for high profile attacks designed to make a political statement,embarrass an organization or government,or to gain publicity.

(Multiple Choice)
4.9/5
(31)

Most organizations use software or hardware devices to control access to their private networks from the Internet by analyzing incoming and outgoing data packets.These devices are called ___________.

(Multiple Choice)
4.7/5
(32)

Attacks ________ could significantly disrupt the functioning of government and business-and trigger cascading effects far beyond the targeted sector and physical location of the incident.

(Multiple Choice)
4.7/5
(32)

Approximately 25 percent of occupational fraud could have been prevented if proper IT-based internal controls had been designed,implemented,and followed

(True/False)
4.8/5
(35)

In Cybersecurity terminology,a(n)_____________ is defined as the probability of a threat exploiting a vulnerability and the resulting cost.

(Short Answer)
4.9/5
(39)

The principle of ________ acknowledges that the cost of information security needs to be balanced with its benefits.It is the basic cost-benefit principle with which you are familiar.

(Multiple Choice)
4.8/5
(39)
Showing 1 - 20 of 148
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)