Exam 5: Cybersecurity and Risk Management
Exam 1: Doing Business in Digital Times118 Questions
Exam 2: Data Governance and IT Architecture Support Long-Term Performance157 Questions
Exam 3: Data Management, Big Data Analytics, and Records Management115 Questions
Exam 4: Networks for Efficient Operations and Sustainability153 Questions
Exam 5: Cybersecurity and Risk Management150 Questions
Exam 6: Attracting Buyers With Search, Semantic, and Recommendation Technology116 Questions
Exam 7: Mobile Technologies and Commerce97 Questions
Exam 8: Retail, E-Commerce, and Mobile Commerce Technology139 Questions
Exam 9: Effective and Efficient Business Functions144 Questions
Exam 10: Strategic Technology and Enterprise Systems124 Questions
Exam 11: Data Visualization and Geographic Information Systems87 Questions
Exam 12: IT Strategy and Balanced Scorecard113 Questions
Exam 13: Project Management and SDLC103 Questions
Exam 14: Ethical Risks and Responsibilities of IT Innovations80 Questions
Select questions type
In Cybersecurity terminology,a(n)_____________ is defined as the probability of a threat exploiting a vulnerability
(Short Answer)
5.0/5
(29)
__________.is a process designed to achieve reliable financial reporting in order to protect investors and comply with regulations.
(Short Answer)
4.9/5
(30)
When an employee's device is lost,the company can suffer a data breach if the device is not encrypted.
(True/False)
4.7/5
(33)
____________ tactics are used by hackers and corporate spies to trick people into revealing login information or access codes.
(Short Answer)
4.8/5
(34)
It is often easy to get users to infect their corporate network or mobiles by tricking them into downloading and installing malicious apps or backdoors.
(True/False)
4.8/5
(36)
Approximately 25 percent of occupational fraud could have been prevented if proper IT-based internal controls had been designed,implemented,and followed
(True/False)
4.8/5
(32)
A __________ estimates the consequences of disruption of a business function and collects data to develop recovery strategies.
(Short Answer)
5.0/5
(31)
Access to top secret or highly secure networks associated with Homeland Security or national defense often use authentication methods based on a biological feature,such as a fingerprint or retina to identify a person.These methods are called ____________.
(Short Answer)
4.9/5
(33)
Advanced persistent threat (APT)attackers want to ________.
(Multiple Choice)
4.7/5
(44)
When it comes to fraud committed by an organization's employees,the single most effective fraud prevention technique is _______.
(Multiple Choice)
4.8/5
(40)
One source of cybersecurity threats today are _____________,who hack for their own causes and attempt to gain media attention.
(Short Answer)
4.8/5
(32)
When new vulnerabilities are found in operating systems,applications,or wired and wireless networks,vendors of those products release __________ or __________ to fix the vulnerabilities.
(Multiple Choice)
4.8/5
(32)
_________________ is a type of attack where a web site or network is bombarded with traffic to make it crash.
(Short Answer)
4.7/5
(29)
A defense strategy requires several controls.___________ protect computer facilities and resources such as computers,data centers,software,manuals,and networks.
(Multiple Choice)
4.8/5
(31)
When it comes to reducing employee fraud,regulators look favorably on companies that can demonstrate good __________ and best practice operational risk management.
(Short Answer)
4.8/5
(44)
Negative consequences of lax cybersecurity that companies tend to face include all of the following except ________.
(Multiple Choice)
4.9/5
(27)
Intrusion Detection Systems (IDS)are designed to monitor network traffic and identify threats that have breached the networks' initial defenses.IDS identify of the following except:
(Multiple Choice)
4.7/5
(37)
In Cybersecurity terminology,a threat is defined as ________.
(Multiple Choice)
4.9/5
(38)
Experts believe the three greatest cybersecurity dangers over the next few years will involve all of the following except __________.
(Multiple Choice)
4.9/5
(29)
When it comes to defending against employee fraud,regulators look favorably on companies that can demonstrate good __________ and best practices in operational risk management.
(Multiple Choice)
4.8/5
(44)
Showing 101 - 120 of 150
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)