Exam 5: Cybersecurity and Risk Management Technology

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

When sending sensitive email,James uses a program that transforms data into scrambled code to protect it from being understood by unauthorized users.James is using ___________ to protect his email communications.

(Short Answer)
4.9/5
(35)

Detection and damage containment are the most desirable fraud controls.

(True/False)
4.8/5
(41)

When new vulnerabilities are found in operating systems,applications,or wired and wireless networks,vendors of those products release __________ or __________ to fix the vulnerabilities.

(Multiple Choice)
4.8/5
(40)

IT professionals work hard to protect key characteristics of an asset from security breaches.One of these characteristics is _________,or the property that data is accessible and modifiable when needed by those authorized to do so.

(Multiple Choice)
4.8/5
(31)

The 2016 Defense Trade Secrets Act was designed to prevent the theft of trade secrets,also known as __________________.

(Multiple Choice)
4.9/5
(37)

Internal fraud prevention and detection measures are based on __________ and __________.

(Multiple Choice)
4.9/5
(33)

Malware infected computers can be organized into networks called ________.

(Short Answer)
4.8/5
(35)

Since protecting all data at an equally high level is not practical,cybersecurity strategies need to classify and prioritize defenses.

(True/False)
4.8/5
(30)

Most APT attacks are launched through ________.

(Multiple Choice)
4.9/5
(43)

A __________ estimates the consequences of disruption of a business function and collects data to develop recovery strategies.

(Short Answer)
4.8/5
(44)

Access to top secret or highly secure networks associated with Homeland Security or national defense use authentication methods based on a biological feature,such as a fingerprint or retinal scan to identify a person.These methods are called _____________.

(Multiple Choice)
4.7/5
(36)

In the United States,the Sarbanes-Oxley Act (SOX)requires businesses to protect PII,which stands for _______________.

(Short Answer)
4.8/5
(38)

IT professionals work hard to protect key characteristics of an asset from security breaches.One of these characteristics is ________,or the avoidance of unauthorized disclosure of information or data.

(Multiple Choice)
4.9/5
(32)

__________ is the elapsed time between when vulnerability is discovered and when it is exploited and has shrunk from months to __________.

(Multiple Choice)
4.8/5
(40)

Samuel received an email that looked like it came from his bank.The email told him to click a link that opened an official looking Webpage where he was asked to enter his account information.But when Samuel examined the URL,he noticed it was a strange address he did not recognize.Most likely,someone was attempting to steal Samuel's confidential information using a technique called __________.

(Multiple Choice)
4.8/5
(42)

Fraudsters carry out their crime by threatening others and by taking advantage of their fears of job loss or disciplinary action.

(True/False)
4.8/5
(33)

___________ is a term referring to a variety of criminal behaviors perpetrated by an organization's own employees or contractors.

(Multiple Choice)
4.8/5
(27)

Access to top secret or highly secure networks associated with Homeland Security or national defense often use authentication methods based on a biological feature,such as a fingerprint or retina to identify a person.These methods are called ____________.

(Short Answer)
4.9/5
(23)

Government and corporate officials concerned about security threats do not bring their own cell phones or laptops when traveling overseas.Instead,they bring loaner devices and follow strict security procedures including not connecting to their domestic network while out of the country.These procedures are referred to as _________.

(Multiple Choice)
4.9/5
(40)

The ability of an IS to continue to operate when a failure occurs,but usually for a limited time or at a reduced level is referred to as __________.

(Multiple Choice)
4.8/5
(37)
Showing 81 - 100 of 148
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)