Exam 5: Cybersecurity and Risk Management Technology
Exam 1: Disruptive IT Impacts Companies, competition, and Careers96 Questions
Exam 2: Information Systems, IT Architecture, Data Governance, and Cloud Computing168 Questions
Exam 3: Data Management, Business Intelligence, and Data Analytics123 Questions
Exam 4: Networks, Collaborative Technology, and the Internet of Things135 Questions
Exam 5: Cybersecurity and Risk Management Technology148 Questions
Exam 6: Search, Semantic, and Recommendation Technology122 Questions
Exam 7: Web 2.0 and Social Technology111 Questions
Exam 8: Retail, e-Commerce, and Mobile Commerce Technology145 Questions
Exam 9: Functional Business Systems151 Questions
Exam 10: Enterprise Systems124 Questions
Exam 11: Data Visualization and Geographic Information Systems92 Questions
Exam 12: IT Strategy, Sourcing, and Strategic Technology Trends130 Questions
Exam 13: Systems Development and Project Management112 Questions
Exam 14: IT Ethics, Privacy and Sustainability66 Questions
Select questions type
The single-most effective fraud prevention tactic is making employees know that ________.
(Multiple Choice)
4.9/5
(28)
Why are internal threats a major challenge for organizations? How can internal threats be minimized?
(Essay)
4.8/5
(33)
Chris is a network manager for a large company.She receives daily updates about various malware and then assesses how to best protect her organization's network from attack.In cybersecurity terminology,she is involved in __________.
(Multiple Choice)
4.9/5
(31)
Negative consequences of lax cybersecurity that companies tend to face include all of the following except ________.
(Multiple Choice)
4.8/5
(28)
A stealth network attack in which an unauthorized person gains access to a network and remains undetected for a long time is referred to as a(n)___________ attack.
(Short Answer)
4.8/5
(36)
Phishing is a deceptive method of stealing confidential information by pretending to be a legitimate organization,such as PayPal,a bank,credit card company,or other trusted source.
(True/False)
4.7/5
(34)
_________________ is a type of attack where a web site or network is bombarded with traffic to make it crash.
(Short Answer)
4.7/5
(34)
In Cybersecurity terminology,an exploit is defined as ________:
(Multiple Choice)
4.8/5
(32)
While security threats from e-mail viruses and malware have been declining for years as e-mail security has improved,threats from __________ have increased considerably in recent years.
(Multiple Choice)
4.8/5
(47)
_______ are software programs that users download and install to fix a vulnerability.
(Short Answer)
4.9/5
(35)
The director of the Federal Trade Commission (FTC)bureau of consumer protection warned that the agency would bring enforcement action against small businesses that ________
(Multiple Choice)
4.8/5
(39)
One source of cybersecurity threats today are _____________,who hack for their own causes and attempt to gain media attention.
(Short Answer)
4.9/5
(38)
The purpose of the ________ is to improve customers' trust in e-commerce,especially when it comes to online payments,and to increase the Web security of online merchants.
(Multiple Choice)
4.8/5
(46)
Botnets often target select groups of people with something in common-they work at the same company,bank at the same financial institution,or attend the same university
(True/False)
4.8/5
(36)
Hacking is an industry with its own way of operating,a workforce,and support services,such as contract hackers.
(True/False)
4.9/5
(37)
Risk is the probability of a threat successfully exploiting a vulnerability and the estimated cost of the loss or damage.
(True/False)
4.9/5
(37)
Physical security includes several controls.Which of the following is not a type of physical control?
(Multiple Choice)
4.8/5
(39)
The main cause of a data breach is malware,but the reason hacking is so successful is negligence-management not doing enough to defend against cyberthreats.
(True/False)
4.8/5
(38)
When it comes to reducing employee fraud,regulators look favorably on companies that can demonstrate good __________ and best practice operational risk management.
(Short Answer)
4.7/5
(45)
Cyber-security experts warn that battling distributed denial-of-service and malware attacks has become part of everyday business for all organizations.
(True/False)
4.8/5
(30)
Showing 121 - 140 of 148
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)