Exam 5: Cybersecurity and Risk Management Technology

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Internal fraud prevention measures are based on the same controls used to prevent external intrusions-perimeter defense technologies,such as firewalls,e-mail scanners,and biometric access.

(True/False)
4.9/5
(32)

In Cybersecurity terminology,a(n)____________ is defined as the estimated cost,loss,or damage that can result from an exploited vulnerability.

(Short Answer)
4.8/5
(41)

The cybersecurity defense strategy and controls that should be used depend on __________.

(Multiple Choice)
4.8/5
(34)

_____________detection identifies things like excessive hours worked,unusual transactions,copying of huge amounts of data and other unusual patterns of behavior,and uses them to alert IT managers to the possibility of internal fraud.

(Short Answer)
4.8/5
(43)

IT professionals work hard to protect key characteristics of an asset from security breaches.One of these characteristics is ____________,or the property that data or files have not been altered in an unauthorized way.

(Multiple Choice)
5.0/5
(42)

Experts believe the three greatest cybersecurity dangers over the next few years will involve all of the following except __________.

(Multiple Choice)
4.9/5
(46)

In Cybersecurity terminology,a(n)__________ is defined as a weakness that threatens the confidentiality,integrity,or availability of an asset.

(Short Answer)
4.8/5
(39)

________ is the most cost-effective approach to fraud.

(Multiple Choice)
4.8/5
(40)

According to Cisco in 2015,the most common form of malware distributed was _________.

(Multiple Choice)
5.0/5
(41)

Firewalls and intrusion detection systems (IDS)mostly protect against internal threats.

(True/False)
4.8/5
(39)

____________ is/are defined as "systems and assets,whether physical or virtual,so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security,national economic security,national public health or safety,or any combination of those matters."

(Multiple Choice)
4.9/5
(33)

The IT security defense-in-depth model starts with ________.

(Multiple Choice)
4.8/5
(35)

Sometimes system failures and data or information loss can result from reasons other than an intentional attempt to breach security.Unintentional threats are all of the following except ___________.

(Multiple Choice)
4.9/5
(42)

Most information security incidents will occur because of _________.

(Multiple Choice)
4.9/5
(34)

A defense strategy requires several controls.___________ protect computer facilities and resources such as computers,data centers,software,manuals,and networks.

(Multiple Choice)
4.9/5
(41)

_________ is a term referring to a variety of deceptive behaviors perpetrated by an organization's own employees or contractors.

(Short Answer)
4.7/5
(41)

In cybersecurity terms,the function of a password together with a username is to __________ a user's identity to verify that the person has the right to access a computer or network.

(Multiple Choice)
4.9/5
(36)

__________ controls can verify a user's identity,which creates the problem of privacy invasion.

(Short Answer)
4.9/5
(35)

The practice of people bringing and using their own mobile devices for work purposes is called _________.

(Short Answer)
5.0/5
(34)

Most data breaches go unreported,according to cybersecurity experts,because corporate victims fear that disclosure would damage their stock price,or because they never knew they were hacked in the first place

(True/False)
4.8/5
(32)
Showing 61 - 80 of 148
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)