Exam 5: Cybersecurity and Risk Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

__________ are essential to the prevention and detection of occupation frauds

Free
(Multiple Choice)
4.7/5
(29)
Correct Answer:
Verified

B

A(n)________ attack bombards a network or website with traffic to crash it and leave it vulnerable to other threats.

Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
Verified

D

When sending sensitive email,James uses a program that transforms data into scrambled code to protect it from being understood by unauthorized users.James is using ___________ to protect his email communications.

Free
(Short Answer)
4.8/5
(43)
Correct Answer:
Verified

Encryption

A(n)________ is a hacker who attempts to breach secure networks looking for trade secrets or proprietary information.

(Multiple Choice)
4.8/5
(41)

Online gambling offers easy fronts for international money-laundering operations.

(True/False)
4.8/5
(43)

Enterprises take risks with BYOD practices that they never would consider taking with conventional computing devices.

(True/False)
4.8/5
(36)

_______ are software programs that users download and install to fix a vulnerability.

(Short Answer)
4.8/5
(31)

In Cybersecurity terminology,a(n)__________ is defined as a weakness that threatens the confidentiality,integrity,or availability of an asset.

(Short Answer)
4.8/5
(35)

In Cybersecurity terminology,a(n)____________ is defined as the estimated cost,loss,or damage that can result from an exploited vulnerability.

(Short Answer)
4.9/5
(41)

______________ are designed to monitor network traffic and identify threats that may have breached the networks initial defenses.

(Short Answer)
4.9/5
(31)

The single-most effective fraud prevention tactic is making employees know that ________.

(Multiple Choice)
5.0/5
(40)

When sending sensitive email,James uses a program that transforms data into unreadable text to protect it from being understood by unauthorized users.James is using ________ to protect his email communications.

(Multiple Choice)
4.7/5
(35)

IT professionals work hard to protect key characteristics of an asset from security breaches.One of these characteristics is _________,or the property that data is accessible and modifiable when needed by those authorized to do so.

(Multiple Choice)
4.9/5
(29)

____________ is/are defined as "systems and assets,whether physical or virtual,so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security,national economic security,national public health or safety,or any combination of those matters."

(Multiple Choice)
4.9/5
(25)

LulzSec and Anonymous are examples of ________ that have claimed responsibility for high profile attacks designed to make a political statement,embarrass an organization or government,or to gain publicity.

(Multiple Choice)
4.9/5
(37)

Exploits are gaps,holes,weaknesses,or flaws in corporate networks,IT security defenses,user training,policy enforcement,data storage,software,operating systems,apps,or mobile devices that expose an organization to intrusions or other attacks.

(True/False)
4.8/5
(33)

__________ is the elapsed time between when vulnerability is discovered and when it is exploited and has shrunk from months to __________.

(Multiple Choice)
4.8/5
(21)

In Cybersecurity terminology,a vulnerability is defined as ________:

(Multiple Choice)
4.8/5
(30)

When a host computer is infected,attempts to remove the malware may fail-and the malware may reinfect the host during a restore if the malware is captured in backups or archives.

(True/False)
4.8/5
(27)

.The IT security defense-in-depth model starts with ________.

(Multiple Choice)
4.7/5
(26)
Showing 1 - 20 of 150
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)