Exam 5: Cybersecurity and Risk Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Hardware and software security defenses are important because they protect against irresponsible business practices.

(True/False)
4.8/5
(36)

Organizations in the _________ industries are more heavily regulated than most and are required to implement stringent measures to protect data.

(Multiple Choice)
4.9/5
(29)

The practice of people bringing and using their own mobile devices for work purposes is called _________.

(Short Answer)
4.8/5
(42)

The director of the Federal Trade Commission (FTC)bureau of consumer protection warned that the agency would bring enforcement action against small businesses that ________

(Multiple Choice)
4.9/5
(39)

Cybercrime surveys have reported each of the following trends or findings except ________.

(Multiple Choice)
4.8/5
(40)

Countering cyber-threats demands diligence,determination,and investment.

(True/False)
4.8/5
(37)

Vulnerabilities exist in networks,OSs,apps,databases,mobile devices,and cloud environments.These vulnerabilities are attack vectors for malware,hackers,hactivists,and organized crime.

(True/False)
4.8/5
(26)

Cybersecurity is ___________.

(Multiple Choice)
4.7/5
(36)

A stealth network attack in which an unauthorized person gains access to a network and remains undetected for a long time is referred to as a(n)___________ attack.

(Short Answer)
4.8/5
(34)

In Cybersecurity terminology,a(n)__________is defined as something or someone that may result in harm to an asset.

(Short Answer)
4.8/5
(29)

IT professionals work hard to protect key characteristics of an asset from security breaches.One of these characteristics is ________,or the avoidance of unauthorized disclosure of information or data.

(Multiple Choice)
4.8/5
(26)

Chris is a network manager for a large company.She receives daily updates about various malware and then assesses how to best protect her organization's network from attack.In cybersecurity terminology,she is involved in __________.

(Multiple Choice)
4.9/5
(41)

Social networks and cloud computing increase vulnerabilities by providing a single point of failure and attack for organized criminal networks.

(True/False)
4.8/5
(29)

Indicators of fraud are called __________.

(Short Answer)
4.9/5
(35)

Boeing's Black smartphone is secure because it ________.

(Multiple Choice)
4.8/5
(34)

The SEC and FTC impose huge fines for __________ in order to deter companies from over-investing in data protection.

(Short Answer)
5.0/5
(35)

Almost half of the 2013 breaches occurred in ________,where the largest number of records was exposed-more than 540 million data records or 66 percent.

(Multiple Choice)
4.9/5
(33)

The main cause of data breaches is ________,which is so successful because of ________ when management does not do enough to defend against cyberthreats.

(Multiple Choice)
4.9/5
(34)

In Cybersecurity terminology,an exploit is defined as ________:

(Multiple Choice)
4.9/5
(35)

.________ is the supervision,monitoring,and control of an organization's IT assets.

(Multiple Choice)
4.9/5
(30)
Showing 121 - 140 of 150
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)