Exam 5: Cybersecurity and Risk Management Technology

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The preferred method of hackers who want to steal trade secrets and other confidential information from business organizations is ___________.

(Multiple Choice)
4.9/5
(31)

Advanced persistent threat (APT)attackers want to ________.

(Multiple Choice)
4.8/5
(33)

One of the methods that could have prevented the Yahoo data breach is ____________,when a user is asked to enter information such as username and password,then a mobile app generates and sends a random number code for the user to enter before being granted access to his or her account.

(Multiple Choice)
4.9/5
(40)

Which of the following statements about malware is false?

(Multiple Choice)
4.7/5
(42)

Storm worm,which is spread via spam,is a ________ agent embedded inside over 25 million computers.Storm's combined power has been compared to the processing power of ________.

(Multiple Choice)
4.7/5
(45)

Hardware and software security defenses are important because they protect against irresponsible business practices.

(True/False)
4.7/5
(39)

________ is also known as human hacking-tricking users into revealing their credentials and then using them to gain access to networks or accounts.

(Multiple Choice)
5.0/5
(38)

In Cybersecurity terminology,a risk is defined as ________:

(Multiple Choice)
4.8/5
(41)
Showing 141 - 148 of 148
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)