Exam 5: IT Security, crime, compliance, and Continuity
Exam 1: Information Systems in the 2010s71 Questions
Exam 2: Infrastructure and Support Systems75 Questions
Exam 3: Data,text,and Document Management74 Questions
Exam 4: Network Management and Mobility71 Questions
Exam 5: IT Security, crime, compliance, and Continuity74 Questions
Exam 6: E-Business and E-Commerce74 Questions
Exam 7: Mobile Computing and Commerce75 Questions
Exam 8: Web 2.0 and Social Media74 Questions
Exam 9: Operational Planning and Control Systems72 Questions
Exam 10: Enterprise Information Systems72 Questions
Exam 11: Business Intelligence and Decision Support73 Questions
Exam 12: IT Strategic Planning74 Questions
Exam 13: Business Process Management and Systems Development71 Questions
Exam 14: Global Ecology, ethics, and Social Responsibility73 Questions
Select questions type
Managers have a legal and ethical obligation,which is called __________,to protect the confidential data of the people and partners that they collect,store,and share.
(Multiple Choice)
4.9/5
(32)
Despite the challenges organizations face trying to protect against threats from employees,insider incidents can be minimized with a layered defense strategy consisting of security procedures,acceptable use policies,and technology controls.
(True/False)
4.7/5
(40)
Under the doctrine of __________ ,senior managers and directors have a fiduciary obligation to use reasonable care to protect the company's business operations.When they fail to meet the company's legal and regulatory duties,they can face lawsuits or other legal action.
(Essay)
4.9/5
(36)
A majority of data breaches involve some sort of insider error or action either intentional or unintentional.That is,the greatest infosec risks are employees and managers.
(True/False)
4.8/5
(37)
Today,infosec is mostly a technology issue assigned to the IT department.Incidents are handled on a case-by-case "cleanup" basis rather than by taking a preemptive approach to protect ahead of the threats.
(True/False)
4.8/5
(39)
Fingerprints,retinal scans,and voice scans for user identification are examples of __________ controls.
(Multiple Choice)
4.8/5
(42)
A __________ attack occurs when a server or Web site receives a flood of traffic-much more traffic or requests for service than it can handle,causing it to crash.
(Essay)
4.8/5
(41)
Who stole account data from HSBC's Private Bank in Switzerland and how did HSBC learn about the data theft?
(Multiple Choice)
4.8/5
(36)
Sarbanes-Oxley Act is an antifraud law.It forces more accurate business reporting and disclosure of GAAP (generally accepted accounting principles)violations,thus making it necessary to find and root out fraud.
(True/False)
4.8/5
(37)
Protecting data and business operations involves all of the following efforts except:
(Multiple Choice)
4.8/5
(40)
All of the following are characteristics of firewalls except:
(Multiple Choice)
4.7/5
(34)
A(n)__________ is the probability of a threat exploiting a vulnerability.
(Multiple Choice)
4.8/5
(35)
Newly released viruses with unidentified signatures or that are hidden in an e-mail attachment are blocked by firewalls and antivirus software from entering a company's network.
(True/False)
4.8/5
(36)
Showing 61 - 74 of 74
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)