Exam 5: IT Security, crime, compliance, and Continuity

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Internal fraud prevention and detection measures are based on __________ and __________.

Free
(Multiple Choice)
4.7/5
(30)
Correct Answer:
Verified

B

A(n)__________ occurs when a server or Web site receives a flood of traffic-much more traffic or requests for service than it can handle,causing it to crash.

Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
Verified

D

Why are internal threats a major challenge for organizations? How can internal threats be minimized?

Free
(Essay)
4.8/5
(38)
Correct Answer:
Verified

Threats from employees,referred to as internal threats,are a major challenge largely due to the many ways an employee can carry out malicious activity.Insiders may be able to bypass physical security (e.g. ,locked doors)and technical security (e.g. ,passwords)measures that organizations have in place to prevent unauthorized access.Why? Because defenses such as firewalls,intrusion detection systems (IDS),and locked doors mostly protect against external threats.
Insider incidents can be minimized with a layered defense strategy consisting of security procedures,acceptable use policies,and technology controls.

Which of the following is not one of the essential defenses against botnets and malware?

(Multiple Choice)
4.8/5
(45)

Financial institutions,data processing firms,and retail businesses do not have to notify potential victims or reveal data breaches in which customers' personal financial information may have been stolen,lost,or compromised.

(True/False)
4.8/5
(38)

In general,risk management is expensive to the organization,but convenient for users.

(True/False)
4.8/5
(28)

Crime can be divided into two categories depending on the tactics used to carry out the crime.What are those two categories?

(Multiple Choice)
4.9/5
(35)

According to a Workplace E-Mail and Instant Messaging Survey of 840 U.S.companies,approximately__________ have had employee e-mail or text messages subpoenaed as part of a lawsuit or regulatory investigation.

(Multiple Choice)
4.8/5
(33)

__________ is the chain of events linking the business continuity plan to protection and to recovery.

(Multiple Choice)
4.8/5
(34)

Why do fraud prevention and detection require an effective monitoring system?

(Essay)
4.9/5
(28)

The objective of IT security management practices is to defend __________.

(Multiple Choice)
4.9/5
(40)

The infosec defense strategies and controls depend on what needs to be protected and the cost-benefit analysis.That is,companies should neither under-invest nor over-invest.

(True/False)
4.8/5
(32)

The Sarbanes-Oxley Act (SOX):

(Multiple Choice)
4.9/5
(34)

A majority of data breaches involve:

(Multiple Choice)
4.7/5
(31)

Locking a Blackberry does not provide strong data protection.Why?

(Multiple Choice)
4.7/5
(36)

Firewalls and intrusion detection systems are placed throughout networks to monitor and control traffic into and out of a network.

(True/False)
4.8/5
(44)

Prior to 2002,what was the common perspective on infosec?

(Multiple Choice)
4.8/5
(35)

__________ refers to the deliberate misuse of the assets of one's employer for personal gain.

(Multiple Choice)
4.8/5
(35)

Symptoms of fraud that can be detected by internal controls include all of the following except:

(Multiple Choice)
4.9/5
(35)

__________ is the supervision,monitoring,and control of the organization's IT assets.COBIT is a guide to best practices in this area.

(Essay)
4.8/5
(33)
Showing 1 - 20 of 74
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)