Exam 5: Cybersecurity and Risk Management
Exam 1: Doing Business in Digital Times118 Questions
Exam 2: Data Governance and IT Architecture Support Long-Term Performance157 Questions
Exam 3: Data Management, Big Data Analytics, and Records Management115 Questions
Exam 4: Networks for Efficient Operations and Sustainability153 Questions
Exam 5: Cybersecurity and Risk Management150 Questions
Exam 6: Attracting Buyers With Search, Semantic, and Recommendation Technology116 Questions
Exam 7: Mobile Technologies and Commerce97 Questions
Exam 8: Retail, E-Commerce, and Mobile Commerce Technology139 Questions
Exam 9: Effective and Efficient Business Functions144 Questions
Exam 10: Strategic Technology and Enterprise Systems124 Questions
Exam 11: Data Visualization and Geographic Information Systems87 Questions
Exam 12: IT Strategy and Balanced Scorecard113 Questions
Exam 13: Project Management and SDLC103 Questions
Exam 14: Ethical Risks and Responsibilities of IT Innovations80 Questions
Select questions type
_____________ is the elapsed time between when vulnerability in a software app or system is discovered and when it's exploited.
(Short Answer)
4.9/5
(25)
___________ is a term referring to a variety of criminal behaviors perpetrated by an organization's own employees or contractors.
(Multiple Choice)
4.8/5
(35)
Which of the following represents a cybersecurity concern about employees using their own smartphones for work purposes?
(Multiple Choice)
4.9/5
(28)
The smart strategy is to invest more to protect the company's most valuable assets rather than try to protect all assets equally.
(True/False)
4.8/5
(33)
Social networks and cloud computing have increased vulnerabilities in all of the following ways except ________.
(Multiple Choice)
4.9/5
(33)
The discount retailer Target suffered a hacker attack during the fourth quarter of 2013 (4Q2013)that exposed customer account information.Which of the following was not an impact of Target's hacker attack and data breach?
(Multiple Choice)
4.9/5
(41)
_________ is a term referring to a variety of deceptive behaviors perpetrated by an organization's own employees or contractors.
(Short Answer)
4.9/5
(31)
Voice and fingerprint _______ can significantly improve the security of physical devices and provide stronger authentication for remote access or cloud services.
(Multiple Choice)
4.9/5
(25)
According to a Mobile Phone report,17 rogue apps managed to get into Google Play and they were downloaded over 700,000 times before being removed.Rogue mobile apps can contain malware or launch phishing attacks.
(True/False)
4.8/5
(31)
.Botnets are stealth network attacks in which an unauthorized person gains access to a network and remains undetected for a long time to steal data continuously.
(True/False)
4.9/5
(37)
Which of the following is not a type of administrative control for information assurance and risk management?
(Multiple Choice)
4.9/5
(33)
Most viruses,trojans,and worms are activated when an attachment is opened or a link is clicked.
(True/False)
4.8/5
(32)
A stealth network attack in which an unauthorized person gains access to a network and remains undetected for a long time is referred to as a(n)__________ attack.
(Multiple Choice)
4.8/5
(28)
A defense strategy requires several controls._________are established to protect the system regardless of the specific application.
(Multiple Choice)
4.8/5
(31)
Risk is the probability of a threat successfully exploiting a vulnerability and the estimated cost of the loss or damage.
(True/False)
4.8/5
(35)
Hacking is an industry with its own way of operating,a workforce,and support services,such as contract hackers.
(True/False)
4.8/5
(35)
All of the following describe The Sarbanes-Oxley Act except:
(Multiple Choice)
4.8/5
(38)
Showing 41 - 60 of 150
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)