Exam 5: IT Security, crime, compliance, and Continuity

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Managers have a legal and ethical obligation,which is called __________,to protect the confidential data of the people and partners that they collect,store,and share.

(Multiple Choice)
4.9/5
(32)

Despite the challenges organizations face trying to protect against threats from employees,insider incidents can be minimized with a layered defense strategy consisting of security procedures,acceptable use policies,and technology controls.

(True/False)
4.7/5
(40)

Under the doctrine of __________ ,senior managers and directors have a fiduciary obligation to use reasonable care to protect the company's business operations.When they fail to meet the company's legal and regulatory duties,they can face lawsuits or other legal action.

(Essay)
4.9/5
(36)

A majority of data breaches involve some sort of insider error or action either intentional or unintentional.That is,the greatest infosec risks are employees and managers.

(True/False)
4.8/5
(37)

Today,infosec is mostly a technology issue assigned to the IT department.Incidents are handled on a case-by-case "cleanup" basis rather than by taking a preemptive approach to protect ahead of the threats.

(True/False)
4.8/5
(39)

Fingerprints,retinal scans,and voice scans for user identification are examples of __________ controls.

(Multiple Choice)
4.8/5
(42)

A __________ attack occurs when a server or Web site receives a flood of traffic-much more traffic or requests for service than it can handle,causing it to crash.

(Essay)
4.8/5
(41)

Who stole account data from HSBC's Private Bank in Switzerland and how did HSBC learn about the data theft?

(Multiple Choice)
4.8/5
(36)

Sarbanes-Oxley Act is an antifraud law.It forces more accurate business reporting and disclosure of GAAP (generally accepted accounting principles)violations,thus making it necessary to find and root out fraud.

(True/False)
4.8/5
(37)

IT risk management includes all of the following except:

(Multiple Choice)
4.9/5
(40)

Protecting data and business operations involves all of the following efforts except:

(Multiple Choice)
4.8/5
(40)

All of the following are characteristics of firewalls except:

(Multiple Choice)
4.7/5
(34)

A(n)__________ is the probability of a threat exploiting a vulnerability.

(Multiple Choice)
4.8/5
(35)

Newly released viruses with unidentified signatures or that are hidden in an e-mail attachment are blocked by firewalls and antivirus software from entering a company's network.

(True/False)
4.8/5
(36)
Showing 61 - 74 of 74
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)