Exam 5: Cybersecurity and Risk Management Technology
Exam 1: Disruptive IT Impacts Companies, competition, and Careers96 Questions
Exam 2: Information Systems, IT Architecture, Data Governance, and Cloud Computing168 Questions
Exam 3: Data Management, Business Intelligence, and Data Analytics123 Questions
Exam 4: Networks, Collaborative Technology, and the Internet of Things135 Questions
Exam 5: Cybersecurity and Risk Management Technology148 Questions
Exam 6: Search, Semantic, and Recommendation Technology122 Questions
Exam 7: Web 2.0 and Social Technology111 Questions
Exam 8: Retail, e-Commerce, and Mobile Commerce Technology145 Questions
Exam 9: Functional Business Systems151 Questions
Exam 10: Enterprise Systems124 Questions
Exam 11: Data Visualization and Geographic Information Systems92 Questions
Exam 12: IT Strategy, Sourcing, and Strategic Technology Trends130 Questions
Exam 13: Systems Development and Project Management112 Questions
Exam 14: IT Ethics, Privacy and Sustainability66 Questions
Select questions type
When sending sensitive email,James uses a program that transforms data into scrambled code to protect it from being understood by unauthorized users.James is using ___________ to protect his email communications.
(Short Answer)
4.9/5
(35)
Detection and damage containment are the most desirable fraud controls.
(True/False)
4.8/5
(41)
When new vulnerabilities are found in operating systems,applications,or wired and wireless networks,vendors of those products release __________ or __________ to fix the vulnerabilities.
(Multiple Choice)
4.8/5
(40)
IT professionals work hard to protect key characteristics of an asset from security breaches.One of these characteristics is _________,or the property that data is accessible and modifiable when needed by those authorized to do so.
(Multiple Choice)
4.8/5
(31)
The 2016 Defense Trade Secrets Act was designed to prevent the theft of trade secrets,also known as __________________.
(Multiple Choice)
4.9/5
(37)
Internal fraud prevention and detection measures are based on __________ and __________.
(Multiple Choice)
4.9/5
(33)
Malware infected computers can be organized into networks called ________.
(Short Answer)
4.8/5
(35)
Since protecting all data at an equally high level is not practical,cybersecurity strategies need to classify and prioritize defenses.
(True/False)
4.8/5
(30)
A __________ estimates the consequences of disruption of a business function and collects data to develop recovery strategies.
(Short Answer)
4.8/5
(44)
Access to top secret or highly secure networks associated with Homeland Security or national defense use authentication methods based on a biological feature,such as a fingerprint or retinal scan to identify a person.These methods are called _____________.
(Multiple Choice)
4.7/5
(36)
In the United States,the Sarbanes-Oxley Act (SOX)requires businesses to protect PII,which stands for _______________.
(Short Answer)
4.8/5
(38)
IT professionals work hard to protect key characteristics of an asset from security breaches.One of these characteristics is ________,or the avoidance of unauthorized disclosure of information or data.
(Multiple Choice)
4.9/5
(32)
__________ is the elapsed time between when vulnerability is discovered and when it is exploited and has shrunk from months to __________.
(Multiple Choice)
4.8/5
(40)
Samuel received an email that looked like it came from his bank.The email told him to click a link that opened an official looking Webpage where he was asked to enter his account information.But when Samuel examined the URL,he noticed it was a strange address he did not recognize.Most likely,someone was attempting to steal Samuel's confidential information using a technique called __________.
(Multiple Choice)
4.8/5
(42)
Fraudsters carry out their crime by threatening others and by taking advantage of their fears of job loss or disciplinary action.
(True/False)
4.8/5
(33)
___________ is a term referring to a variety of criminal behaviors perpetrated by an organization's own employees or contractors.
(Multiple Choice)
4.8/5
(27)
Access to top secret or highly secure networks associated with Homeland Security or national defense often use authentication methods based on a biological feature,such as a fingerprint or retina to identify a person.These methods are called ____________.
(Short Answer)
4.9/5
(23)
Government and corporate officials concerned about security threats do not bring their own cell phones or laptops when traveling overseas.Instead,they bring loaner devices and follow strict security procedures including not connecting to their domestic network while out of the country.These procedures are referred to as _________.
(Multiple Choice)
4.9/5
(40)
The ability of an IS to continue to operate when a failure occurs,but usually for a limited time or at a reduced level is referred to as __________.
(Multiple Choice)
4.8/5
(37)
Showing 81 - 100 of 148
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)