Exam 5: Cybersecurity and Risk Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In Cybersecurity terminology,a(n)_____________ is defined as the probability of a threat exploiting a vulnerability

(Short Answer)
5.0/5
(29)

__________.is a process designed to achieve reliable financial reporting in order to protect investors and comply with regulations.

(Short Answer)
4.9/5
(30)

When an employee's device is lost,the company can suffer a data breach if the device is not encrypted.

(True/False)
4.7/5
(33)

____________ tactics are used by hackers and corporate spies to trick people into revealing login information or access codes.

(Short Answer)
4.8/5
(34)

It is often easy to get users to infect their corporate network or mobiles by tricking them into downloading and installing malicious apps or backdoors.

(True/False)
4.8/5
(36)

Approximately 25 percent of occupational fraud could have been prevented if proper IT-based internal controls had been designed,implemented,and followed

(True/False)
4.8/5
(32)

A __________ estimates the consequences of disruption of a business function and collects data to develop recovery strategies.

(Short Answer)
5.0/5
(31)

Access to top secret or highly secure networks associated with Homeland Security or national defense often use authentication methods based on a biological feature,such as a fingerprint or retina to identify a person.These methods are called ____________.

(Short Answer)
4.9/5
(33)

Advanced persistent threat (APT)attackers want to ________.

(Multiple Choice)
4.7/5
(44)

When it comes to fraud committed by an organization's employees,the single most effective fraud prevention technique is _______.

(Multiple Choice)
4.8/5
(40)

One source of cybersecurity threats today are _____________,who hack for their own causes and attempt to gain media attention.

(Short Answer)
4.8/5
(32)

When new vulnerabilities are found in operating systems,applications,or wired and wireless networks,vendors of those products release __________ or __________ to fix the vulnerabilities.

(Multiple Choice)
4.8/5
(32)

_________________ is a type of attack where a web site or network is bombarded with traffic to make it crash.

(Short Answer)
4.7/5
(29)

A defense strategy requires several controls.___________ protect computer facilities and resources such as computers,data centers,software,manuals,and networks.

(Multiple Choice)
4.8/5
(31)

When it comes to reducing employee fraud,regulators look favorably on companies that can demonstrate good __________ and best practice operational risk management.

(Short Answer)
4.8/5
(44)

Negative consequences of lax cybersecurity that companies tend to face include all of the following except ________.

(Multiple Choice)
4.9/5
(27)

Intrusion Detection Systems (IDS)are designed to monitor network traffic and identify threats that have breached the networks' initial defenses.IDS identify of the following except:

(Multiple Choice)
4.7/5
(37)

In Cybersecurity terminology,a threat is defined as ________.

(Multiple Choice)
4.9/5
(38)

Experts believe the three greatest cybersecurity dangers over the next few years will involve all of the following except __________.

(Multiple Choice)
4.9/5
(29)

When it comes to defending against employee fraud,regulators look favorably on companies that can demonstrate good __________ and best practices in operational risk management.

(Multiple Choice)
4.8/5
(44)
Showing 101 - 120 of 150
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)