Exam 5: Cybersecurity and Risk Management Technology
Exam 1: Disruptive IT Impacts Companies, competition, and Careers96 Questions
Exam 2: Information Systems, IT Architecture, Data Governance, and Cloud Computing168 Questions
Exam 3: Data Management, Business Intelligence, and Data Analytics123 Questions
Exam 4: Networks, Collaborative Technology, and the Internet of Things135 Questions
Exam 5: Cybersecurity and Risk Management Technology148 Questions
Exam 6: Search, Semantic, and Recommendation Technology122 Questions
Exam 7: Web 2.0 and Social Technology111 Questions
Exam 8: Retail, e-Commerce, and Mobile Commerce Technology145 Questions
Exam 9: Functional Business Systems151 Questions
Exam 10: Enterprise Systems124 Questions
Exam 11: Data Visualization and Geographic Information Systems92 Questions
Exam 12: IT Strategy, Sourcing, and Strategic Technology Trends130 Questions
Exam 13: Systems Development and Project Management112 Questions
Exam 14: IT Ethics, Privacy and Sustainability66 Questions
Select questions type
Internal fraud prevention measures are based on the same controls used to prevent external intrusions-perimeter defense technologies,such as firewalls,e-mail scanners,and biometric access.
(True/False)
4.9/5
(32)
In Cybersecurity terminology,a(n)____________ is defined as the estimated cost,loss,or damage that can result from an exploited vulnerability.
(Short Answer)
4.8/5
(41)
The cybersecurity defense strategy and controls that should be used depend on __________.
(Multiple Choice)
4.8/5
(34)
_____________detection identifies things like excessive hours worked,unusual transactions,copying of huge amounts of data and other unusual patterns of behavior,and uses them to alert IT managers to the possibility of internal fraud.
(Short Answer)
4.8/5
(43)
IT professionals work hard to protect key characteristics of an asset from security breaches.One of these characteristics is ____________,or the property that data or files have not been altered in an unauthorized way.
(Multiple Choice)
5.0/5
(42)
Experts believe the three greatest cybersecurity dangers over the next few years will involve all of the following except __________.
(Multiple Choice)
4.9/5
(46)
In Cybersecurity terminology,a(n)__________ is defined as a weakness that threatens the confidentiality,integrity,or availability of an asset.
(Short Answer)
4.8/5
(39)
According to Cisco in 2015,the most common form of malware distributed was _________.
(Multiple Choice)
5.0/5
(41)
Firewalls and intrusion detection systems (IDS)mostly protect against internal threats.
(True/False)
4.8/5
(39)
____________ is/are defined as "systems and assets,whether physical or virtual,so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security,national economic security,national public health or safety,or any combination of those matters."
(Multiple Choice)
4.9/5
(33)
The IT security defense-in-depth model starts with ________.
(Multiple Choice)
4.8/5
(35)
Sometimes system failures and data or information loss can result from reasons other than an intentional attempt to breach security.Unintentional threats are all of the following except ___________.
(Multiple Choice)
4.9/5
(42)
Most information security incidents will occur because of _________.
(Multiple Choice)
4.9/5
(34)
A defense strategy requires several controls.___________ protect computer facilities and resources such as computers,data centers,software,manuals,and networks.
(Multiple Choice)
4.9/5
(41)
_________ is a term referring to a variety of deceptive behaviors perpetrated by an organization's own employees or contractors.
(Short Answer)
4.7/5
(41)
In cybersecurity terms,the function of a password together with a username is to __________ a user's identity to verify that the person has the right to access a computer or network.
(Multiple Choice)
4.9/5
(36)
__________ controls can verify a user's identity,which creates the problem of privacy invasion.
(Short Answer)
4.9/5
(35)
The practice of people bringing and using their own mobile devices for work purposes is called _________.
(Short Answer)
5.0/5
(34)
Most data breaches go unreported,according to cybersecurity experts,because corporate victims fear that disclosure would damage their stock price,or because they never knew they were hacked in the first place
(True/False)
4.8/5
(32)
Showing 61 - 80 of 148
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)