Exam 5: Cybersecurity and Risk Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Physical security includes several controls.Which of the following is not a type of physical control?

(Multiple Choice)
4.7/5
(38)

Government and corporate officials concerned about security threats do not bring their own cell phones or laptops when traveling overseas.Instead,they bring loaner devices and follow strict security procedures including not connecting to their domestic network while out of the country.These procedures are referred to as _________.

(Multiple Choice)
4.9/5
(36)

________ is the most cost-effective approach to fraud.

(Multiple Choice)
4.8/5
(31)

___________ tactics are used by hackers and corporate spies to trick people into revealing login information or access codes.

(Multiple Choice)
4.8/5
(34)

Most information security incidents will occur because of _________.

(Multiple Choice)
4.9/5
(33)

Why are internal threats a major challenge for organizations? How can internal threats be minimized?

(Essay)
4.9/5
(36)

__________ controls can verify a user's identity,which creates the problem of privacy invasion.

(Short Answer)
4.8/5
(38)

The objectives of cybersecurity are to accomplish each of the following except _________.

(Multiple Choice)
4.8/5
(32)

The purpose of the PCI DSS is to improve customers' trust in e-commerce,especially when it comes to online payments,and to increase the Web security of online merchants.

(Multiple Choice)
4.7/5
(33)

Botnets often target select groups of people with something in common-they work at the same company,bank at the same financial institution,or attend the same university

(True/False)
4.8/5
(35)
Showing 141 - 150 of 150
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)