Exam 5: Cybersecurity and Risk Management
Exam 1: Doing Business in Digital Times118 Questions
Exam 2: Data Governance and IT Architecture Support Long-Term Performance157 Questions
Exam 3: Data Management, Big Data Analytics, and Records Management115 Questions
Exam 4: Networks for Efficient Operations and Sustainability153 Questions
Exam 5: Cybersecurity and Risk Management150 Questions
Exam 6: Attracting Buyers With Search, Semantic, and Recommendation Technology116 Questions
Exam 7: Mobile Technologies and Commerce97 Questions
Exam 8: Retail, E-Commerce, and Mobile Commerce Technology139 Questions
Exam 9: Effective and Efficient Business Functions144 Questions
Exam 10: Strategic Technology and Enterprise Systems124 Questions
Exam 11: Data Visualization and Geographic Information Systems87 Questions
Exam 12: IT Strategy and Balanced Scorecard113 Questions
Exam 13: Project Management and SDLC103 Questions
Exam 14: Ethical Risks and Responsibilities of IT Innovations80 Questions
Select questions type
SOX and the SEC regulators are making it clear that if controls can be ignored,there is no control.Therefore,fraud prevention and detection require an effective monitoring system.
(True/False)
5.0/5
(38)
Define social engineering.Describe two ways in which social engineering could be used to obtain credentials from a user in order to gain access to an account or network.
(Essay)
4.8/5
(30)
Storm worm,which is spread via spam,is a ________ agent embedded inside over 25 million computers.Storm's combined power has been compared to the processing power of ________.
(Multiple Choice)
4.8/5
(37)
Detecting internal fraud has become sophisticated.Audit trails from key systems and personnel records are stored in data warehouses and subjected to __________ where things like excessive hours worked,unusual transactions,copying of huge amounts of data and other unusual patterns of behavior are identified.
(Multiple Choice)
4.8/5
(33)
Discuss how social networks and cloud computing increase IT security risks.How do you recommend that they risks be reduced?
(Essay)
4.9/5
(40)
The principle of ________ acknowledges that the cost of information security needs to be balanced with its benefits.It is the basic cost-benefit principle with which you are familiar.
(Multiple Choice)
4.9/5
(42)
Powerful IT security systems are needed to defend against what appears to be authorized access to a network or application.
(True/False)
4.9/5
(35)
Sometimes system failures and data or information loss can result from reasons other than an intentional attempt to breach security.Unintentional threats are all of the following except ___________.
(Multiple Choice)
4.8/5
(35)
The ability of an IS to continue to operate when a failure occurs,but usually for a limited time or at a reduced level is referred to as __________.
(Multiple Choice)
4.8/5
(38)
Crime can be divided into two categories depending on the tactics used to carry out the crime: ________.
(Multiple Choice)
4.8/5
(35)
One source of cybersecurity threats today are ____________who breach networks in an attempt to gain media attention or for their cause.
(Multiple Choice)
4.8/5
(30)
An audit is an important part of any control system.Which of the following is not a question that would typically be asked as part of an information systems audit?
(Multiple Choice)
4.8/5
(38)
Managers should expect less tolerant regulators and greater fines and negative consequences for data breaches,according to KPMG.
(True/False)
5.0/5
(37)
Attacks ________ could significantly disrupt the functioning of government and business-and trigger cascading effects far beyond the targeted sector and physical location of the incident.
(Multiple Choice)
4.7/5
(28)
Most data breaches go unreported,according to cybersecurity experts,because corporate victims fear that disclosure would damage their stock price,or because they never knew they were hacked in the first place
(True/False)
4.9/5
(39)
In Cybersecurity terminology,a(n)__________ is defined as a tool or technique that takes advantage of a vulnerability.
(Short Answer)
4.8/5
(36)
U.S.cybersecurity experts and government officials are increasingly concerned about breaches from __________ into corporate networks,either through mobile devices or by other means.
(Multiple Choice)
4.8/5
(29)
Fraudsters carry out their crime by threatening others and by taking advantage of their fears of job loss or disciplinary action.
(True/False)
4.8/5
(30)
The _________ is an exercise that determines the impact of losing the support or availability of a resource.
(Multiple Choice)
4.8/5
(29)
Explain internal fraud.Describe the most effective approach to preventing it.
(Essay)
4.8/5
(35)
Showing 21 - 40 of 150
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)