Exam 5: IT Security, crime, compliance, and Continuity
Exam 1: Information Systems in the 2010s71 Questions
Exam 2: Infrastructure and Support Systems75 Questions
Exam 3: Data,text,and Document Management74 Questions
Exam 4: Network Management and Mobility71 Questions
Exam 5: IT Security, crime, compliance, and Continuity74 Questions
Exam 6: E-Business and E-Commerce74 Questions
Exam 7: Mobile Computing and Commerce75 Questions
Exam 8: Web 2.0 and Social Media74 Questions
Exam 9: Operational Planning and Control Systems72 Questions
Exam 10: Enterprise Information Systems72 Questions
Exam 11: Business Intelligence and Decision Support73 Questions
Exam 12: IT Strategic Planning74 Questions
Exam 13: Business Process Management and Systems Development71 Questions
Exam 14: Global Ecology, ethics, and Social Responsibility73 Questions
Select questions type
Internal fraud prevention and detection measures are based on __________ and __________.
Free
(Multiple Choice)
4.7/5
(30)
Correct Answer:
B
A(n)__________ occurs when a server or Web site receives a flood of traffic-much more traffic or requests for service than it can handle,causing it to crash.
Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
D
Why are internal threats a major challenge for organizations? How can internal threats be minimized?
Free
(Essay)
4.8/5
(38)
Correct Answer:
Threats from employees,referred to as internal threats,are a major challenge largely due to the many ways an employee can carry out malicious activity.Insiders may be able to bypass physical security (e.g. ,locked doors)and technical security (e.g. ,passwords)measures that organizations have in place to prevent unauthorized access.Why? Because defenses such as firewalls,intrusion detection systems (IDS),and locked doors mostly protect against external threats.
Insider incidents can be minimized with a layered defense strategy consisting of security procedures,acceptable use policies,and technology controls.
Which of the following is not one of the essential defenses against botnets and malware?
(Multiple Choice)
4.8/5
(45)
Financial institutions,data processing firms,and retail businesses do not have to notify potential victims or reveal data breaches in which customers' personal financial information may have been stolen,lost,or compromised.
(True/False)
4.8/5
(38)
In general,risk management is expensive to the organization,but convenient for users.
(True/False)
4.8/5
(28)
Crime can be divided into two categories depending on the tactics used to carry out the crime.What are those two categories?
(Multiple Choice)
4.9/5
(35)
According to a Workplace E-Mail and Instant Messaging Survey of 840 U.S.companies,approximately__________ have had employee e-mail or text messages subpoenaed as part of a lawsuit or regulatory investigation.
(Multiple Choice)
4.8/5
(33)
__________ is the chain of events linking the business continuity plan to protection and to recovery.
(Multiple Choice)
4.8/5
(34)
Why do fraud prevention and detection require an effective monitoring system?
(Essay)
4.9/5
(28)
The objective of IT security management practices is to defend __________.
(Multiple Choice)
4.9/5
(40)
The infosec defense strategies and controls depend on what needs to be protected and the cost-benefit analysis.That is,companies should neither under-invest nor over-invest.
(True/False)
4.8/5
(32)
Locking a Blackberry does not provide strong data protection.Why?
(Multiple Choice)
4.7/5
(36)
Firewalls and intrusion detection systems are placed throughout networks to monitor and control traffic into and out of a network.
(True/False)
4.8/5
(44)
__________ refers to the deliberate misuse of the assets of one's employer for personal gain.
(Multiple Choice)
4.8/5
(35)
Symptoms of fraud that can be detected by internal controls include all of the following except:
(Multiple Choice)
4.9/5
(35)
__________ is the supervision,monitoring,and control of the organization's IT assets.COBIT is a guide to best practices in this area.
(Essay)
4.8/5
(33)
Showing 1 - 20 of 74
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)