Exam 5: IT Security, crime, compliance, and Continuity
Exam 1: Information Systems in the 2010s71 Questions
Exam 2: Infrastructure and Support Systems75 Questions
Exam 3: Data,text,and Document Management74 Questions
Exam 4: Network Management and Mobility71 Questions
Exam 5: IT Security, crime, compliance, and Continuity74 Questions
Exam 6: E-Business and E-Commerce74 Questions
Exam 7: Mobile Computing and Commerce75 Questions
Exam 8: Web 2.0 and Social Media74 Questions
Exam 9: Operational Planning and Control Systems72 Questions
Exam 10: Enterprise Information Systems72 Questions
Exam 11: Business Intelligence and Decision Support73 Questions
Exam 12: IT Strategic Planning74 Questions
Exam 13: Business Process Management and Systems Development71 Questions
Exam 14: Global Ecology, ethics, and Social Responsibility73 Questions
Select questions type
When new vulnerabilities are found in operating systems,applications,or wired and wireless networks,vendors of those products release __________ or __________ to fix the vulnerabilities.
(Multiple Choice)
4.9/5
(35)
Which of the following is not a type of administrative control for information assurance and risk management?
(Multiple Choice)
4.8/5
(32)
__________ is the word that refers to viruses,worms,trojan horses,spyware,and all other types of disruptive,destructive,or unwanted programs.
(Essay)
4.9/5
(39)
A fiduciary responsibility is both a legal and an ethical obligation.
(True/False)
4.9/5
(32)
An estimated __________ of companies that suffer a significant data loss often go out of business within five years.
(Multiple Choice)
4.8/5
(39)
__________ is the elapsed time between when vulnerability is discovered and when it's exploited and has shrunk from months to __________.
(Multiple Choice)
4.8/5
(38)
Before the people who are responsible for security make any decisions about infosec defenses,they must understand __________.
(Multiple Choice)
4.9/5
(41)
Bernard Madoff is in jail after pleading guilty in 2009 to the biggest fraud in Wall Street history.Madoff carried out his fraud over four decades by relying on __________.
(Multiple Choice)
4.8/5
(39)
Corporate and government secrets are currently being stolen by a serious threat called advanced persistent threat (APT),which are designed for long-term espionage.Once installed on a network,ATPs transmit copies of documents,such as Microsoft Office files and PDFs,in stealth mode.
(True/False)
4.8/5
(32)
From an infosec perspective,__________ has been used by criminals or corporate spies to trick insiders into revealing information or access codes that outsiders should not have
(Essay)
4.8/5
(42)
__________ is a security technology for wireless networks that improves on the authentication and encryption features of WEP.
(Multiple Choice)
4.7/5
(38)
The theft of confidential account data from HSBC Private Bank in Switzerland in 2007 had been done by hackers because of inadequate security controls.
(True/False)
5.0/5
(42)
Physical security includes several controls.Which of the following is not a type of physical control?
(Multiple Choice)
4.8/5
(36)
A __________ control is an automated method of verifying the identity of a person,based on physical or behavioral characteristics,such as a fingerprint or voice scan.
(Essay)
4.8/5
(31)
The __________ environment is the work atmosphere that a company sets for its employees in order to achieve reliable financial reporting and compliance with laws,regulations,and policies.
(Essay)
4.9/5
(39)
When dealing with consumer-facing applications,such as online banking and e-commerce,strong authentication must be balanced with __________.
(Multiple Choice)
4.9/5
(34)
Which of the following is not a characteristic of money laundering and terrorist financing?
(Multiple Choice)
4.8/5
(38)
Fraud is nonviolent crime that is carried out using __________.
(Multiple Choice)
4.8/5
(41)
An important element in any security system is the __________ plan,also known as the disaster recovery plan,which outlines the process by which businesses should recover from a major disaster.
(Essay)
4.9/5
(38)
Facebook,YouTube,Twitter,LinkedIn,and other social networks are making IT security dangers worse.Why?
(Multiple Choice)
4.9/5
(44)
Showing 41 - 60 of 74
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)