Exam 5: Cybersecurity and Risk Management Technology

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The single-most effective fraud prevention tactic is making employees know that ________.

(Multiple Choice)
4.9/5
(28)

Why are internal threats a major challenge for organizations? How can internal threats be minimized?

(Essay)
4.8/5
(33)

Chris is a network manager for a large company.She receives daily updates about various malware and then assesses how to best protect her organization's network from attack.In cybersecurity terminology,she is involved in __________.

(Multiple Choice)
4.9/5
(31)

Negative consequences of lax cybersecurity that companies tend to face include all of the following except ________.

(Multiple Choice)
4.8/5
(28)

A stealth network attack in which an unauthorized person gains access to a network and remains undetected for a long time is referred to as a(n)___________ attack.

(Short Answer)
4.8/5
(36)

Phishing is a deceptive method of stealing confidential information by pretending to be a legitimate organization,such as PayPal,a bank,credit card company,or other trusted source.

(True/False)
4.7/5
(34)

_________________ is a type of attack where a web site or network is bombarded with traffic to make it crash.

(Short Answer)
4.7/5
(34)

In Cybersecurity terminology,an exploit is defined as ________:

(Multiple Choice)
4.8/5
(32)

While security threats from e-mail viruses and malware have been declining for years as e-mail security has improved,threats from __________ have increased considerably in recent years.

(Multiple Choice)
4.8/5
(47)

_______ are software programs that users download and install to fix a vulnerability.

(Short Answer)
4.9/5
(35)

The director of the Federal Trade Commission (FTC)bureau of consumer protection warned that the agency would bring enforcement action against small businesses that ________

(Multiple Choice)
4.8/5
(39)

One source of cybersecurity threats today are _____________,who hack for their own causes and attempt to gain media attention.

(Short Answer)
4.9/5
(38)

The purpose of the ________ is to improve customers' trust in e-commerce,especially when it comes to online payments,and to increase the Web security of online merchants.

(Multiple Choice)
4.8/5
(46)

Botnets often target select groups of people with something in common-they work at the same company,bank at the same financial institution,or attend the same university

(True/False)
4.8/5
(36)

Hacking is an industry with its own way of operating,a workforce,and support services,such as contract hackers.

(True/False)
4.9/5
(37)

Risk is the probability of a threat successfully exploiting a vulnerability and the estimated cost of the loss or damage.

(True/False)
4.9/5
(37)

Physical security includes several controls.Which of the following is not a type of physical control?

(Multiple Choice)
4.8/5
(39)

The main cause of a data breach is malware,but the reason hacking is so successful is negligence-management not doing enough to defend against cyberthreats.

(True/False)
4.8/5
(38)

When it comes to reducing employee fraud,regulators look favorably on companies that can demonstrate good __________ and best practice operational risk management.

(Short Answer)
4.7/5
(45)

Cyber-security experts warn that battling distributed denial-of-service and malware attacks has become part of everyday business for all organizations.

(True/False)
4.8/5
(30)
Showing 121 - 140 of 148
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)