Exam 5: IT Security, crime, compliance, and Continuity

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Fraud management starts with corporate governance culture and ethics __________.

(Multiple Choice)
4.8/5
(36)

One of the worst and most prevalent crimes is __________.

(Multiple Choice)
4.7/5
(33)

IT security is so integral to business objectives that it needs to be treated as a stand-alone function.

(True/False)
4.7/5
(35)

Network security involves three types of defenses,which are referred to as layers.Those layers consist of each of the following except:

(Multiple Choice)
4.8/5
(37)

Hackers involve unsuspecting insiders in their crimes using tactics called __________ that trick insiders into revealing access codes that outsiders should not have.

(Multiple Choice)
4.9/5
(44)

A __________ is a system,or group of systems,that enforces an access-control policy between two networks.

(Multiple Choice)
4.8/5
(42)

There has been a steep increase in malware because of the availability of free,easy to use,powerful toolkits that even novice cyber criminals can use to develop malware.

(True/False)
4.7/5
(32)

A(n)__________ is something or someone that may result in harm to an asset.

(Multiple Choice)
4.8/5
(35)

All Internet traffic,which travels as packets,should have to pass through a(n)__________ ,but that is rarely the case for instant messages and wireless traffic.

(Essay)
5.0/5
(36)

Which of the following is not a characteristic of IT security?

(Multiple Choice)
4.9/5
(37)

The major objective of __________ is proof of identity to identify the legitimate user and determine the action he or she is allowed to perform.

(Multiple Choice)
4.9/5
(34)

Sensitive data that are encrypted with wired equivalent privacy (WEP)and transmitted between two wireless devices __________.

(Multiple Choice)
4.8/5
(24)

Types of unintentional threats that organizations must defend against as part of their IT security measures are human errors,sabotage,environmental hazards,and computer system failures.

(True/False)
4.9/5
(38)

The purpose of the PCI DSS is to improve customers'__________ in e-commerce,especially when it comes to online payments,and to increase the Web security of online merchants.

(Essay)
4.8/5
(39)

What is the most cost-effective approach to managing fraud?

(Multiple Choice)
4.8/5
(40)

Why do social networks and cloud computing increase IT security risks? How can those risks be reduced?

(Essay)
4.8/5
(42)

Which of the following is a characteristic of information security in organizations?

(Multiple Choice)
4.8/5
(39)

__________,such as AirSnort and WEPcrack,are readily available tools that can be used to gain unauthorized access to networks putting them at great risk.

(Multiple Choice)
4.9/5
(50)

Implementing security programs raises many ethical issues.Identify two of these ethical issues.

(Essay)
4.9/5
(36)

__________ is the ability of an IS to continue to operate when a failure occurs,usually operating for a limited time or at a reduced level.

(Multiple Choice)
4.8/5
(31)
Showing 21 - 40 of 74
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)