Exam 5: Cybersecurity and Risk Management Technology

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

______________ are designed to monitor network traffic and identify threats that may have breached the networks initial defenses.

(Short Answer)
4.9/5
(40)

A business impact analysis estimates the consequences of disruption of a business function and collects data to develop recovery strategies.

(True/False)
4.9/5
(41)

People who have their social security or credit card numbers stolen and used by thieves are frequently victims of ___________________.

(Multiple Choice)
4.9/5
(38)

In Cybersecurity terminology,a threat is defined as ________.

(Multiple Choice)
4.9/5
(39)

An employee can pose an internal threat by entering false or fraudulent data into a computer,or changing or deleting existing data.This called _________.

(Multiple Choice)
4.7/5
(39)

Botnets are stealth network attacks in which an unauthorized person gains access to a network and remains undetected for a long time to steal data continuously.

(True/False)
4.9/5
(34)

Intrusion Detection Systems (IDS)are designed to monitor network traffic and identify threats that have breached the networks' initial defenses.IDS identify all of the following except:

(Multiple Choice)
4.8/5
(30)

Managers should expect less tolerant regulators and greater fines and negative consequences for data breaches,according to KPMG.

(True/False)
4.8/5
(35)

__________ are essential to the prevention and detection of occupation frauds

(Multiple Choice)
4.8/5
(31)

The SEC and FTC impose huge fines for __________ in order to deter companies from under-investing in data protection.

(Short Answer)
4.9/5
(34)

When it comes to defending against employee fraud,regulators look favorably on companies that can demonstrate good __________ and best practices in operational risk management.

(Multiple Choice)
4.7/5
(31)

_____________ is the elapsed time between when vulnerability in a software app or system is discovered and when it's exploited.

(Short Answer)
4.9/5
(32)

Which of the following is not a type of administrative control for information assurance and risk management?

(Multiple Choice)
4.8/5
(30)

The smart strategy is to invest more to protect the company's most valuable assets rather than try to protect all assets equally.

(True/False)
4.7/5
(43)

Robust data security is the responsibility of IT and data managers.

(True/False)
4.9/5
(31)

Voice and fingerprint _______ can significantly improve the security of physical devices and provide stronger authentication for remote access or cloud services.

(Multiple Choice)
4.8/5
(34)

The IT security defense-in-depth model ends with ________.

(Multiple Choice)
4.9/5
(43)

Most viruses,trojans,and worms are activated when an attachment is opened or a link is clicked.

(True/False)
4.9/5
(32)

Enterprises take risks with BYOD practices that they never would consider taking with conventional computing devices.

(True/False)
4.8/5
(36)

Which of the following was not an outcome of the Yahoo data breaches in 2013 and 2014?

(Multiple Choice)
4.9/5
(44)
Showing 21 - 40 of 148
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)