Exam 5: Cybersecurity and Risk Management Technology

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

When it comes to fraud committed by an organization's employees,the single most effective fraud prevention technique is _______.

(Multiple Choice)
4.9/5
(33)

Crime can be divided into two categories depending on the tactics used to carry out the crime: ________.

(Multiple Choice)
5.0/5
(48)

A(n)________ attack bombards a network or website with traffic to crash it and leave it vulnerable to other threats.

(Multiple Choice)
4.7/5
(40)

The consequences of lax cybersecurity include damaged reputations,financial penalties,government fines,lost market share,falling share prices,and consumer backlash.

(True/False)
4.9/5
(40)

An audit is an important part of any control system.Which of the following is not a question that would typically be asked as part of an information systems audit?

(Multiple Choice)
4.7/5
(29)

In Cybersecurity terminology,a(n)__________is defined as something or someone that may result in harm to an asset.

(Short Answer)
4.7/5
(37)

Business operations are controlled by apps,systems,and networks that are so interconnected that anyone's ________ is an entry point for attacks.

(Multiple Choice)
4.7/5
(33)

SOX and the SEC regulators are making it clear that if controls can be ignored,there is no control.Therefore,fraud prevention and detection require an effective monitoring system.

(True/False)
4.8/5
(40)

Detecting internal fraud has become sophisticated.Audit trails from key systems and personnel records are stored in data warehouses and subjected to __________ where things like excessive hours worked,unusual transactions,copying of huge amounts of data and other unusual patterns of behavior are identified.

(Multiple Choice)
4.9/5
(31)

Discuss how social networks and cloud computing increase IT security risks.How do you recommend that the risks be reduced?

(Essay)
4.8/5
(34)

A stealth network attack in which an unauthorized person gains access to a network and remains undetected for a long time is referred to as a(n)__________ attack.

(Multiple Choice)
4.8/5
(33)

John received a strange message on his computer that asked him to send a hundred dollars in Bitcoin to a link or else he would lose all the data on his computer.John is a victim of:

(Multiple Choice)
4.9/5
(33)

It is often easy to get users to infect their corporate network or mobiles by tricking them into downloading and installing malicious apps or backdoors.

(True/False)
4.8/5
(39)

Which of the following represents a cybersecurity concern about employees using their own smartphones for work purposes?

(Multiple Choice)
4.9/5
(32)

The _________ is an exercise that determines the impact of losing the support or availability of a resource.

(Multiple Choice)
4.8/5
(41)

Online gambling offers easy fronts for international money-laundering operations.

(True/False)
4.8/5
(35)

When an employee's device is lost,the company can suffer a data breach if the device is not encrypted.

(True/False)
4.9/5
(38)

The three key cybersecurity principles are:

(Multiple Choice)
4.7/5
(41)

One of the biggest mistakes managers make is underestimating IT vulnerabilities and threats.

(True/False)
4.8/5
(32)

Exploits are gaps,holes,weaknesses,or flaws in corporate networks,IT security defenses,user training,policy enforcement,data storage,software,operating systems,apps,or mobile devices that expose an organization to intrusions or other attacks.

(True/False)
4.9/5
(36)
Showing 101 - 120 of 148
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)