Exam 5: Cybersecurity and Risk Management Technology
Exam 1: Disruptive IT Impacts Companies, competition, and Careers96 Questions
Exam 2: Information Systems, IT Architecture, Data Governance, and Cloud Computing168 Questions
Exam 3: Data Management, Business Intelligence, and Data Analytics123 Questions
Exam 4: Networks, Collaborative Technology, and the Internet of Things135 Questions
Exam 5: Cybersecurity and Risk Management Technology148 Questions
Exam 6: Search, Semantic, and Recommendation Technology122 Questions
Exam 7: Web 2.0 and Social Technology111 Questions
Exam 8: Retail, e-Commerce, and Mobile Commerce Technology145 Questions
Exam 9: Functional Business Systems151 Questions
Exam 10: Enterprise Systems124 Questions
Exam 11: Data Visualization and Geographic Information Systems92 Questions
Exam 12: IT Strategy, Sourcing, and Strategic Technology Trends130 Questions
Exam 13: Systems Development and Project Management112 Questions
Exam 14: IT Ethics, Privacy and Sustainability66 Questions
Select questions type
______________ are designed to monitor network traffic and identify threats that may have breached the networks initial defenses.
(Short Answer)
4.9/5
(40)
A business impact analysis estimates the consequences of disruption of a business function and collects data to develop recovery strategies.
(True/False)
4.9/5
(41)
People who have their social security or credit card numbers stolen and used by thieves are frequently victims of ___________________.
(Multiple Choice)
4.9/5
(38)
In Cybersecurity terminology,a threat is defined as ________.
(Multiple Choice)
4.9/5
(39)
An employee can pose an internal threat by entering false or fraudulent data into a computer,or changing or deleting existing data.This called _________.
(Multiple Choice)
4.7/5
(39)
Botnets are stealth network attacks in which an unauthorized person gains access to a network and remains undetected for a long time to steal data continuously.
(True/False)
4.9/5
(34)
Intrusion Detection Systems (IDS)are designed to monitor network traffic and identify threats that have breached the networks' initial defenses.IDS identify all of the following except:
(Multiple Choice)
4.8/5
(30)
Managers should expect less tolerant regulators and greater fines and negative consequences for data breaches,according to KPMG.
(True/False)
4.8/5
(35)
__________ are essential to the prevention and detection of occupation frauds
(Multiple Choice)
4.8/5
(31)
The SEC and FTC impose huge fines for __________ in order to deter companies from under-investing in data protection.
(Short Answer)
4.9/5
(34)
When it comes to defending against employee fraud,regulators look favorably on companies that can demonstrate good __________ and best practices in operational risk management.
(Multiple Choice)
4.7/5
(31)
_____________ is the elapsed time between when vulnerability in a software app or system is discovered and when it's exploited.
(Short Answer)
4.9/5
(32)
Which of the following is not a type of administrative control for information assurance and risk management?
(Multiple Choice)
4.8/5
(30)
The smart strategy is to invest more to protect the company's most valuable assets rather than try to protect all assets equally.
(True/False)
4.7/5
(43)
Robust data security is the responsibility of IT and data managers.
(True/False)
4.9/5
(31)
Voice and fingerprint _______ can significantly improve the security of physical devices and provide stronger authentication for remote access or cloud services.
(Multiple Choice)
4.8/5
(34)
Most viruses,trojans,and worms are activated when an attachment is opened or a link is clicked.
(True/False)
4.9/5
(32)
Enterprises take risks with BYOD practices that they never would consider taking with conventional computing devices.
(True/False)
4.8/5
(36)
Which of the following was not an outcome of the Yahoo data breaches in 2013 and 2014?
(Multiple Choice)
4.9/5
(44)
Showing 21 - 40 of 148
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)