Exam 5: Cybersecurity and Risk Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Firewalls and intrusion detection systems (IDS)mostly protect against internal threats.

(True/False)
4.9/5
(41)

According to cybersecurity experts,most data breaches go unreported because corporate victims fear that disclosure would damage their stock price,or because ________.

(Multiple Choice)
4.9/5
(27)

The internal control environment is the work atmosphere that a company sets for its employees and is designed to achieve all of the following except _________.

(Multiple Choice)
5.0/5
(28)

Since protecting all data at an equally high level is not practical,cybersecurity strategies need to classify and prioritize defenses.

(True/False)
4.7/5
(33)

Malware infected computers can be organized into networks called ________.

(Short Answer)
4.9/5
(36)

________ is also known as human hacking-tricking users into revealing their credentials and then using them to gain access to networks or accounts.

(Multiple Choice)
4.8/5
(33)

In Cybersecurity terminology,a risk is defined as ________:

(Multiple Choice)
4.8/5
(40)

In the United States,the Sarbanes-Oxley Act (SOX),Gramm-Leach-Bliley Act (GLB),Federal Information Security Management Act (FISMA),and USA Patriot Act all require businesses to protect PII,which stands for _______________.

(Short Answer)
4.8/5
(29)

The consequences of lax cybersecurity include damaged reputations,financial penalties,government fines,lost market share,falling share prices,and consumer backlash.

(True/False)
4.8/5
(28)

A key of finding of the 2014 Global State of Information Security Survey was ________.

(Multiple Choice)
4.9/5
(38)

_____________detection identifies things like excessive hours worked,unusual transactions,copying of huge amounts of data and other unusual patterns of behavior,and uses them to alert IT managers to the possibility of internal fraud.

(Short Answer)
4.8/5
(31)

Facebook,YouTube,Twitter,LinkedIn,and other social networks are making IT security dangers worse.Why?

(Multiple Choice)
4.8/5
(32)

While security threats from e-mail viruses and malware have been declining for years as e-mail security has improved,threats from __________ have increased considerably in recent years.

(Multiple Choice)
5.0/5
(34)

One of the biggest mistakes managers make is underestimating IT vulnerabilities and threats.

(True/False)
4.9/5
(30)

Most organizations use software or hardware devices to control access to their private networks from the Internet by analyzing incoming and outgoing data packets.These devices are called ___________.

(Multiple Choice)
4.9/5
(38)

During the fraud investigation of Bernie Madoff,computer forensics experts were tasked with uncovering digital messages that revealed "who knew what" and "who did what."

(True/False)
4.8/5
(29)

Which of the following is not a characteristic of money laundering and terrorist financing?

(Multiple Choice)
4.8/5
(43)

IT professionals work hard to protect key characteristics of an asset from security breaches.One of these characteristics is ____________,or the property that data or files have not been altered in an unauthorized way.

(Multiple Choice)
4.8/5
(36)

Most APT attacks are launched through ________.

(Multiple Choice)
4.9/5
(41)

Phishing is a deceptive method of stealing confidential information by pretending to be a legitimate organization,such as PayPal,a bank,credit card company,or other trusted source.

(True/False)
4.9/5
(34)
Showing 81 - 100 of 150
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)