Exam 5: Cybersecurity and Risk Management Technology
Exam 1: Disruptive IT Impacts Companies, competition, and Careers96 Questions
Exam 2: Information Systems, IT Architecture, Data Governance, and Cloud Computing168 Questions
Exam 3: Data Management, Business Intelligence, and Data Analytics123 Questions
Exam 4: Networks, Collaborative Technology, and the Internet of Things135 Questions
Exam 5: Cybersecurity and Risk Management Technology148 Questions
Exam 6: Search, Semantic, and Recommendation Technology122 Questions
Exam 7: Web 2.0 and Social Technology111 Questions
Exam 8: Retail, e-Commerce, and Mobile Commerce Technology145 Questions
Exam 9: Functional Business Systems151 Questions
Exam 10: Enterprise Systems124 Questions
Exam 11: Data Visualization and Geographic Information Systems92 Questions
Exam 12: IT Strategy, Sourcing, and Strategic Technology Trends130 Questions
Exam 13: Systems Development and Project Management112 Questions
Exam 14: IT Ethics, Privacy and Sustainability66 Questions
Select questions type
When it comes to fraud committed by an organization's employees,the single most effective fraud prevention technique is _______.
(Multiple Choice)
4.9/5
(33)
Crime can be divided into two categories depending on the tactics used to carry out the crime: ________.
(Multiple Choice)
5.0/5
(48)
A(n)________ attack bombards a network or website with traffic to crash it and leave it vulnerable to other threats.
(Multiple Choice)
4.7/5
(40)
The consequences of lax cybersecurity include damaged reputations,financial penalties,government fines,lost market share,falling share prices,and consumer backlash.
(True/False)
4.9/5
(40)
An audit is an important part of any control system.Which of the following is not a question that would typically be asked as part of an information systems audit?
(Multiple Choice)
4.7/5
(29)
In Cybersecurity terminology,a(n)__________is defined as something or someone that may result in harm to an asset.
(Short Answer)
4.7/5
(37)
Business operations are controlled by apps,systems,and networks that are so interconnected that anyone's ________ is an entry point for attacks.
(Multiple Choice)
4.7/5
(33)
SOX and the SEC regulators are making it clear that if controls can be ignored,there is no control.Therefore,fraud prevention and detection require an effective monitoring system.
(True/False)
4.8/5
(40)
Detecting internal fraud has become sophisticated.Audit trails from key systems and personnel records are stored in data warehouses and subjected to __________ where things like excessive hours worked,unusual transactions,copying of huge amounts of data and other unusual patterns of behavior are identified.
(Multiple Choice)
4.9/5
(31)
Discuss how social networks and cloud computing increase IT security risks.How do you recommend that the risks be reduced?
(Essay)
4.8/5
(34)
A stealth network attack in which an unauthorized person gains access to a network and remains undetected for a long time is referred to as a(n)__________ attack.
(Multiple Choice)
4.8/5
(33)
John received a strange message on his computer that asked him to send a hundred dollars in Bitcoin to a link or else he would lose all the data on his computer.John is a victim of:
(Multiple Choice)
4.9/5
(33)
It is often easy to get users to infect their corporate network or mobiles by tricking them into downloading and installing malicious apps or backdoors.
(True/False)
4.8/5
(39)
Which of the following represents a cybersecurity concern about employees using their own smartphones for work purposes?
(Multiple Choice)
4.9/5
(32)
The _________ is an exercise that determines the impact of losing the support or availability of a resource.
(Multiple Choice)
4.8/5
(41)
Online gambling offers easy fronts for international money-laundering operations.
(True/False)
4.8/5
(35)
When an employee's device is lost,the company can suffer a data breach if the device is not encrypted.
(True/False)
4.9/5
(38)
One of the biggest mistakes managers make is underestimating IT vulnerabilities and threats.
(True/False)
4.8/5
(32)
Exploits are gaps,holes,weaknesses,or flaws in corporate networks,IT security defenses,user training,policy enforcement,data storage,software,operating systems,apps,or mobile devices that expose an organization to intrusions or other attacks.
(True/False)
4.9/5
(36)
Showing 101 - 120 of 148
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)