Exam 26: Data Breaches
Exam 1: The Importance of Mis80 Questions
Exam 2: Business Processes, Information Systems, and Information89 Questions
Exam 3: Organizational Strategy, Information Systems96 Questions
Exam 4: Hardware and Software80 Questions
Exam 5: Database Processing80 Questions
Exam 6: The Cloud74 Questions
Exam 7: Organizations and Information Systems84 Questions
Exam 8: Social Media Information Systems91 Questions
Exam 9: Business Intelligence Systems92 Questions
Exam 10: Information Systems Security93 Questions
Exam 11: Information Systems Management80 Questions
Exam 12: Information Systems Development80 Questions
Exam 13: Collaboration Information Systems for Decision Making46 Questions
Exam 14: Collaborative Information Systems for Student Projects53 Questions
Exam 15: Mobile Systems50 Questions
Exam 16: Introduction to Microsoft Excel 201348 Questions
Exam 17: Database Design44 Questions
Exam 18: Using Microsoft Access 201348 Questions
Exam 19: Using Excel and Access Together50 Questions
Exam 20: Network and Cloud Technology63 Questions
Exam 21: Enterprise Resource Planning Erpsystems50 Questions
Exam 22: Supply Chain Management40 Questions
Exam 23: Enterprise Social Networks and Knowledge Management40 Questions
Exam 24: Database Marketing40 Questions
Exam 25: Reporting Systems and Olap44 Questions
Exam 26: Data Breaches50 Questions
Exam 27: International Mis41 Questions
Exam 28: Systems Development Project Management44 Questions
Exam 29: Agile Development44 Questions
Exam 30: Business Process Management40 Questions
Select questions type
Which of the following is a direct cost of handling a data breach?
(Multiple Choice)
4.7/5
(43)
Which of the following regulatory laws requires data protection for health care institutions?
(Multiple Choice)
4.9/5
(40)
________ are software or procedures used to prevent an information security attack.
(Multiple Choice)
4.7/5
(40)
Personally identifiable information includes a person's bank account numbers, personal identification numbers, email address, and social security numbers.
(True/False)
4.8/5
(30)
The first step in protecting oneself from data breaches is ________.
(Multiple Choice)
4.8/5
(28)
According to the reports in Ponemon's 2014 Cost of Data Breach Study, organizations are more likely to lose larger amounts of data than smaller amounts of data.
(True/False)
4.8/5
(31)
Performing a walkthrough should be done as part of a business continuity planning session.
(True/False)
4.8/5
(34)
What are countermeasures? Why is it important for organizations to implement countermeasures?
(Essay)
4.8/5
(35)
Organizations can implement countermeasures that make data breaches impossible to occur.
(True/False)
4.9/5
(33)
Venclave Hospital is a privately-owned organization that specializes in treating neurological diseases.Which of the following regulatory laws governs the data security measures to be taken by this hospital for protecting against data breach?
(Multiple Choice)
4.9/5
(36)
The Federal Information Security Management Act (FISMA)details the procedures to be followed by a federal agency in case an organization fails to ensure the minimum security requirements for its data and systems.
(True/False)
4.8/5
(30)
It is easy for organizations to prepare a list of countermeasures against many different types of attacks and take appropriate measures accordingly.
(True/False)
4.8/5
(41)
Talgedco Inc., a software company, has taken several steps to secure its systems and data.The company has also installed a network intrusion detection system and data loss prevention system.Employees of this company have also been trained on the procedures to be followed to reduce the probability of a data breach.These steps taken by Talgedco are an example of ________.
(Multiple Choice)
4.9/5
(41)
Stolen credit card information is validated through a process called carding.
(True/False)
4.8/5
(36)
Executives, managers, and all systems personnel of an organization discuss the actions to be taken by each employee in case a data breach occurs.They identify areas that would need immediate attention and assign specific responsibilities to each employee.The employees of the organization are performing a(n)________.
(Multiple Choice)
4.8/5
(39)
Jobs Dot Com, an online recruitment site, was hacked into, and personal information of a number of users was stolen.What information should Jobs Dot Com include in its data breach notification to its users?
(Multiple Choice)
5.0/5
(34)
The ________ is a regulatory law that requires security precautions for government agencies.
(Multiple Choice)
4.8/5
(34)
Data breach notifications should state that the existing security policies and procedures are inadequate and that changes are being made to prevent similar breaches in the future.
(True/False)
4.7/5
(43)
Spear phishing is used by organizations to monitor traffic passing through their internal network.
(True/False)
4.7/5
(34)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)