Exam 5: Cybersecurity and Risk Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_____________ is the elapsed time between when vulnerability in a software app or system is discovered and when it's exploited.

(Short Answer)
4.9/5
(25)

___________ is a term referring to a variety of criminal behaviors perpetrated by an organization's own employees or contractors.

(Multiple Choice)
4.8/5
(35)

Which of the following represents a cybersecurity concern about employees using their own smartphones for work purposes?

(Multiple Choice)
4.9/5
(28)

The three key cybersecurity principles are:

(Multiple Choice)
4.8/5
(33)

The smart strategy is to invest more to protect the company's most valuable assets rather than try to protect all assets equally.

(True/False)
4.8/5
(33)

Social networks and cloud computing have increased vulnerabilities in all of the following ways except ________.

(Multiple Choice)
4.9/5
(33)

The discount retailer Target suffered a hacker attack during the fourth quarter of 2013 (4Q2013)that exposed customer account information.Which of the following was not an impact of Target's hacker attack and data breach?

(Multiple Choice)
4.9/5
(41)

_________ is a term referring to a variety of deceptive behaviors perpetrated by an organization's own employees or contractors.

(Short Answer)
4.9/5
(31)

Voice and fingerprint _______ can significantly improve the security of physical devices and provide stronger authentication for remote access or cloud services.

(Multiple Choice)
4.9/5
(25)

According to a Mobile Phone report,17 rogue apps managed to get into Google Play and they were downloaded over 700,000 times before being removed.Rogue mobile apps can contain malware or launch phishing attacks.

(True/False)
4.8/5
(31)

.Botnets are stealth network attacks in which an unauthorized person gains access to a network and remains undetected for a long time to steal data continuously.

(True/False)
4.9/5
(37)

Which of the following is not a type of administrative control for information assurance and risk management?

(Multiple Choice)
4.9/5
(33)

Which of the following statements about malware is false?

(Multiple Choice)
4.9/5
(47)

Most viruses,trojans,and worms are activated when an attachment is opened or a link is clicked.

(True/False)
4.8/5
(32)

A stealth network attack in which an unauthorized person gains access to a network and remains undetected for a long time is referred to as a(n)__________ attack.

(Multiple Choice)
4.8/5
(28)

A defense strategy requires several controls._________are established to protect the system regardless of the specific application.

(Multiple Choice)
4.8/5
(31)

Describe spear phishing.How does spear phishing work?

(Essay)
4.9/5
(38)

Risk is the probability of a threat successfully exploiting a vulnerability and the estimated cost of the loss or damage.

(True/False)
4.8/5
(35)

Hacking is an industry with its own way of operating,a workforce,and support services,such as contract hackers.

(True/False)
4.8/5
(35)

All of the following describe The Sarbanes-Oxley Act except:

(Multiple Choice)
4.8/5
(38)
Showing 41 - 60 of 150
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)