Exam 5: Cybersecurity and Risk Management
Exam 1: Doing Business in Digital Times118 Questions
Exam 2: Data Governance and IT Architecture Support Long-Term Performance157 Questions
Exam 3: Data Management, Big Data Analytics, and Records Management115 Questions
Exam 4: Networks for Efficient Operations and Sustainability153 Questions
Exam 5: Cybersecurity and Risk Management150 Questions
Exam 6: Attracting Buyers With Search, Semantic, and Recommendation Technology116 Questions
Exam 7: Mobile Technologies and Commerce97 Questions
Exam 8: Retail, E-Commerce, and Mobile Commerce Technology139 Questions
Exam 9: Effective and Efficient Business Functions144 Questions
Exam 10: Strategic Technology and Enterprise Systems124 Questions
Exam 11: Data Visualization and Geographic Information Systems87 Questions
Exam 12: IT Strategy and Balanced Scorecard113 Questions
Exam 13: Project Management and SDLC103 Questions
Exam 14: Ethical Risks and Responsibilities of IT Innovations80 Questions
Select questions type
__________ are essential to the prevention and detection of occupation frauds
Free
(Multiple Choice)
4.7/5
(29)
Correct Answer:
B
A(n)________ attack bombards a network or website with traffic to crash it and leave it vulnerable to other threats.
Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
D
When sending sensitive email,James uses a program that transforms data into scrambled code to protect it from being understood by unauthorized users.James is using ___________ to protect his email communications.
Free
(Short Answer)
4.8/5
(43)
Correct Answer:
Encryption
A(n)________ is a hacker who attempts to breach secure networks looking for trade secrets or proprietary information.
(Multiple Choice)
4.8/5
(41)
Online gambling offers easy fronts for international money-laundering operations.
(True/False)
4.8/5
(43)
Enterprises take risks with BYOD practices that they never would consider taking with conventional computing devices.
(True/False)
4.8/5
(36)
_______ are software programs that users download and install to fix a vulnerability.
(Short Answer)
4.8/5
(31)
In Cybersecurity terminology,a(n)__________ is defined as a weakness that threatens the confidentiality,integrity,or availability of an asset.
(Short Answer)
4.8/5
(35)
In Cybersecurity terminology,a(n)____________ is defined as the estimated cost,loss,or damage that can result from an exploited vulnerability.
(Short Answer)
4.9/5
(41)
______________ are designed to monitor network traffic and identify threats that may have breached the networks initial defenses.
(Short Answer)
4.9/5
(31)
The single-most effective fraud prevention tactic is making employees know that ________.
(Multiple Choice)
5.0/5
(40)
When sending sensitive email,James uses a program that transforms data into unreadable text to protect it from being understood by unauthorized users.James is using ________ to protect his email communications.
(Multiple Choice)
4.7/5
(35)
IT professionals work hard to protect key characteristics of an asset from security breaches.One of these characteristics is _________,or the property that data is accessible and modifiable when needed by those authorized to do so.
(Multiple Choice)
4.9/5
(29)
____________ is/are defined as "systems and assets,whether physical or virtual,so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security,national economic security,national public health or safety,or any combination of those matters."
(Multiple Choice)
4.9/5
(25)
LulzSec and Anonymous are examples of ________ that have claimed responsibility for high profile attacks designed to make a political statement,embarrass an organization or government,or to gain publicity.
(Multiple Choice)
4.9/5
(37)
Exploits are gaps,holes,weaknesses,or flaws in corporate networks,IT security defenses,user training,policy enforcement,data storage,software,operating systems,apps,or mobile devices that expose an organization to intrusions or other attacks.
(True/False)
4.8/5
(33)
__________ is the elapsed time between when vulnerability is discovered and when it is exploited and has shrunk from months to __________.
(Multiple Choice)
4.8/5
(21)
In Cybersecurity terminology,a vulnerability is defined as ________:
(Multiple Choice)
4.8/5
(30)
When a host computer is infected,attempts to remove the malware may fail-and the malware may reinfect the host during a restore if the malware is captured in backups or archives.
(True/False)
4.8/5
(27)
.The IT security defense-in-depth model starts with ________.
(Multiple Choice)
4.7/5
(26)
Showing 1 - 20 of 150
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)