Exam 5: Cybersecurity and Risk Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Robust data security is the responsibility of IT and data managers.

(True/False)
4.7/5
(37)

LulzSec is a hacker group and spin-off of the loosely organized hacking group called Anonymous.

(True/False)
4.8/5
(30)

Business operations are controlled by apps,systems,and networks that are so interconnected that anyone's ________ is an entry point for attacks.

(Multiple Choice)
4.9/5
(33)

One of ________ specialties is finding websites with poor security,and then stealing and posting information from them online.

(Multiple Choice)
4.7/5
(34)

Cyber-security experts warn that battling distributed denial-of-service and malware attacks has become part of everyday business for all organizations.

(True/False)
4.9/5
(31)

Detection and damage containment are the most desirable fraud controls.

(True/False)
4.8/5
(36)

A business impact analysis estimates the consequences of disruption of a business function and collects data to develop recovery strategies.

(True/False)
4.7/5
(50)

People who have their social security or credit card numbers stolen and used by thieves are frequently victims of ___________________.

(Multiple Choice)
4.7/5
(38)

In the United States,the Sarbanes-Oxley Act (SOX),Gramm-Leach-Bliley Act (GLB),Federal Information Security Management Act (FISMA),and USA Patriot Act all require businesses to __________________________.

(Multiple Choice)
4.8/5
(34)

A biometric control is an automated method of verifying the identity of a person,based on physical or behavioral characteristics.

(True/False)
4.8/5
(38)

The Payment Card Industry Data Security Standard (PCI DSS)created by Visa,MasterCard,American Express,and Discover is a __________.

(Multiple Choice)
4.7/5
(27)

.The IT security defense-in-depth model ends with ________.

(Multiple Choice)
4.8/5
(23)

Samuel received an email that looked like it came from his bank.The email told him to click a link that opened an official looking Webpage where he was asked to enter his account information.But when Samuel examined the URL,he noticed it was a strange address he did not recognize.Most likely,someone was attempting to steal Samuel's confidential information using a technique called __________.

(Multiple Choice)
4.7/5
(47)

The main cause of a data breach is malware,but the reason hacking is so successful is negligence-management not doing enough to defend against cyberthreats.

(True/False)
4.7/5
(33)

The preferred method of hackers who want to steal trade secrets and other confidential information from business organizations is ___________.

(Multiple Choice)
4.9/5
(29)

Internal fraud prevention measures are based on the same controls used to prevent external intrusions-perimeter defense technologies,such as firewalls,e-mail scanners,and biometric access.

(True/False)
5.0/5
(31)

In cybersecurity terms,the function of a password together with a username is to __________ a user's identity to verify that the person has the right to access a computer or network.

(Multiple Choice)
4.8/5
(35)

Access to top secret or highly secure networks associated with Homeland Security or national defense use authentication methods based on a biological feature,such as a fingerprint or retinal scan to identify a person.These methods are called _____________.

(Multiple Choice)
4.9/5
(35)

The cybersecurity defense strategy and controls that should be used depend on __________.

(Multiple Choice)
4.8/5
(38)

Internal fraud prevention and detection measures are based on __________ and __________.

(Multiple Choice)
4.8/5
(41)
Showing 61 - 80 of 150
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)