Exam 5: Cybersecurity and Risk Management Technology
Exam 1: Disruptive IT Impacts Companies, competition, and Careers96 Questions
Exam 2: Information Systems, IT Architecture, Data Governance, and Cloud Computing168 Questions
Exam 3: Data Management, Business Intelligence, and Data Analytics123 Questions
Exam 4: Networks, Collaborative Technology, and the Internet of Things135 Questions
Exam 5: Cybersecurity and Risk Management Technology148 Questions
Exam 6: Search, Semantic, and Recommendation Technology122 Questions
Exam 7: Web 2.0 and Social Technology111 Questions
Exam 8: Retail, e-Commerce, and Mobile Commerce Technology145 Questions
Exam 9: Functional Business Systems151 Questions
Exam 10: Enterprise Systems124 Questions
Exam 11: Data Visualization and Geographic Information Systems92 Questions
Exam 12: IT Strategy, Sourcing, and Strategic Technology Trends130 Questions
Exam 13: Systems Development and Project Management112 Questions
Exam 14: IT Ethics, Privacy and Sustainability66 Questions
Select questions type
Countering cyber-threats demands diligence,determination,and investment.
(True/False)
4.8/5
(40)
________ is the supervision,monitoring,and control of an organization's IT assets.
(Multiple Choice)
4.8/5
(34)
A person who attempts to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons.
(Multiple Choice)
4.8/5
(39)
According to cybersecurity experts,most data breaches go unreported because corporate victims fear that disclosure would damage their stock price,or because ________.
(Multiple Choice)
4.8/5
(39)
In Cybersecurity terminology,a(n)__________ is defined as a tool or technique that takes advantage of a vulnerability.
(Short Answer)
4.9/5
(44)
The Payment Card Industry Data Security Standard (PCI DSS)created by Visa,MasterCard,American Express,and Discover is a __________.
(Multiple Choice)
4.8/5
(39)
A biometric control is an automated method of verifying the identity of a person,based on physical or behavioral characteristics.
(True/False)
4.8/5
(34)
Facebook,YouTube,Twitter,LinkedIn,and other social networks are making IT security dangers worse.Why?
(Multiple Choice)
5.0/5
(32)
Explain internal fraud.Describe the most effective approach to preventing it.
(Essay)
4.8/5
(31)
When sending sensitive email,James uses a program that transforms data into unreadable text to protect it from being understood by unauthorized users.James is using ________ to protect his email communications.
(Multiple Choice)
4.9/5
(42)
____________ tactics are used by hackers and corporate spies to trick people into revealing login information or access codes.
(Short Answer)
4.9/5
(42)
Vulnerabilities exist in networks,OSs,apps,databases,mobile devices,and cloud environments.These vulnerabilities are attack vectors for malware,hackers,hactivists,and organized crime.
(True/False)
4.8/5
(34)
A defense strategy requires several controls._________are established to protect the system regardless of the specific application.
(Multiple Choice)
4.8/5
(32)
The internal control environment is the work atmosphere that a company sets for its employees and is designed to achieve all of the following except _________.
(Multiple Choice)
4.8/5
(43)
Define social engineering.Describe two ways in which social engineering could be used to obtain credentials from a user in order to gain access to an account or network.
(Essay)
4.9/5
(28)
According to a Mobile Phone report,17 rogue apps managed to get into Google Play and they were downloaded over 700,000 times before being removed.Rogue mobile apps can contain malware or launch phishing attacks.
(True/False)
4.9/5
(31)
The main cause of data breaches is ________,which is so successful because of ________ when management does not do enough to defend against cyberthreats.
(Multiple Choice)
4.9/5
(31)
Showing 41 - 60 of 148
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)