Exam 5: Cybersecurity and Risk Management
Exam 1: Doing Business in Digital Times118 Questions
Exam 2: Data Governance and IT Architecture Support Long-Term Performance157 Questions
Exam 3: Data Management, Big Data Analytics, and Records Management115 Questions
Exam 4: Networks for Efficient Operations and Sustainability153 Questions
Exam 5: Cybersecurity and Risk Management150 Questions
Exam 6: Attracting Buyers With Search, Semantic, and Recommendation Technology116 Questions
Exam 7: Mobile Technologies and Commerce97 Questions
Exam 8: Retail, E-Commerce, and Mobile Commerce Technology139 Questions
Exam 9: Effective and Efficient Business Functions144 Questions
Exam 10: Strategic Technology and Enterprise Systems124 Questions
Exam 11: Data Visualization and Geographic Information Systems87 Questions
Exam 12: IT Strategy and Balanced Scorecard113 Questions
Exam 13: Project Management and SDLC103 Questions
Exam 14: Ethical Risks and Responsibilities of IT Innovations80 Questions
Select questions type
Robust data security is the responsibility of IT and data managers.
(True/False)
4.7/5
(37)
LulzSec is a hacker group and spin-off of the loosely organized hacking group called Anonymous.
(True/False)
4.8/5
(30)
Business operations are controlled by apps,systems,and networks that are so interconnected that anyone's ________ is an entry point for attacks.
(Multiple Choice)
4.9/5
(33)
One of ________ specialties is finding websites with poor security,and then stealing and posting information from them online.
(Multiple Choice)
4.7/5
(34)
Cyber-security experts warn that battling distributed denial-of-service and malware attacks has become part of everyday business for all organizations.
(True/False)
4.9/5
(31)
Detection and damage containment are the most desirable fraud controls.
(True/False)
4.8/5
(36)
A business impact analysis estimates the consequences of disruption of a business function and collects data to develop recovery strategies.
(True/False)
4.7/5
(50)
People who have their social security or credit card numbers stolen and used by thieves are frequently victims of ___________________.
(Multiple Choice)
4.7/5
(38)
In the United States,the Sarbanes-Oxley Act (SOX),Gramm-Leach-Bliley Act (GLB),Federal Information Security Management Act (FISMA),and USA Patriot Act all require businesses to __________________________.
(Multiple Choice)
4.8/5
(34)
A biometric control is an automated method of verifying the identity of a person,based on physical or behavioral characteristics.
(True/False)
4.8/5
(38)
The Payment Card Industry Data Security Standard (PCI DSS)created by Visa,MasterCard,American Express,and Discover is a __________.
(Multiple Choice)
4.7/5
(27)
.The IT security defense-in-depth model ends with ________.
(Multiple Choice)
4.8/5
(23)
Samuel received an email that looked like it came from his bank.The email told him to click a link that opened an official looking Webpage where he was asked to enter his account information.But when Samuel examined the URL,he noticed it was a strange address he did not recognize.Most likely,someone was attempting to steal Samuel's confidential information using a technique called __________.
(Multiple Choice)
4.7/5
(47)
The main cause of a data breach is malware,but the reason hacking is so successful is negligence-management not doing enough to defend against cyberthreats.
(True/False)
4.7/5
(33)
The preferred method of hackers who want to steal trade secrets and other confidential information from business organizations is ___________.
(Multiple Choice)
4.9/5
(29)
Internal fraud prevention measures are based on the same controls used to prevent external intrusions-perimeter defense technologies,such as firewalls,e-mail scanners,and biometric access.
(True/False)
5.0/5
(31)
In cybersecurity terms,the function of a password together with a username is to __________ a user's identity to verify that the person has the right to access a computer or network.
(Multiple Choice)
4.8/5
(35)
Access to top secret or highly secure networks associated with Homeland Security or national defense use authentication methods based on a biological feature,such as a fingerprint or retinal scan to identify a person.These methods are called _____________.
(Multiple Choice)
4.9/5
(35)
The cybersecurity defense strategy and controls that should be used depend on __________.
(Multiple Choice)
4.8/5
(38)
Internal fraud prevention and detection measures are based on __________ and __________.
(Multiple Choice)
4.8/5
(41)
Showing 61 - 80 of 150
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)