Exam 5: IT Security,crime,compliance,and Continuity
Exam 1: Information Systems in the 2010s71 Questions
Exam 2: Infrastructure and Support Systems75 Questions
Exam 3: Data,text,and Document Management74 Questions
Exam 4: Network Management and Mobility71 Questions
Exam 5: IT Security,crime,compliance,and Continuity74 Questions
Exam 6: E-Business and E-Commerce74 Questions
Exam 7: Mobile Computing and Commerce75 Questions
Exam 8: Web 2.0 and Social Media74 Questions
Exam 9: Operational Planning and Control Systems72 Questions
Exam 10: Enterprise Information Systems73 Questions
Exam 11: Business Intelligence and Decision Support73 Questions
Exam 12: IT Strategic Planning74 Questions
Exam 13: Business Process Management and Systems Development71 Questions
Exam 14: Global Ecology, Ethics, and Social Responsibility73 Questions
Select questions type
The objective of IT security management practices is to defend __________.
Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
D
__________,such as AirSnort and WEPcrack,are readily available tools that can be used to gain unauthorized access to networks putting them at great risk.
Free
(Multiple Choice)
4.9/5
(25)
Correct Answer:
A
__________ is the elapsed time between when vulnerability is discovered and when it's exploited and has shrunk from months to __________.
Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
B
Locking a Blackberry does not provide strong data protection.Why?
(Multiple Choice)
4.9/5
(29)
Firewalls and intrusion detection systems are placed throughout networks to monitor and control traffic into and out of a network.
(True/False)
4.9/5
(31)
Why are internal threats a major challenge for organizations? How can internal threats be minimized?
(Essay)
4.8/5
(35)
The theft of confidential account data from HSBC Private Bank in Switzerland in 2007 had been done by hackers because of inadequate security controls.
(True/False)
4.9/5
(33)
All Internet traffic,which travels as packets,should have to pass through a(n)__________ ,but that is rarely the case for instant messages and wireless traffic.
(Essay)
4.8/5
(25)
Network security involves three types of defenses,which are referred to as layers.Those layers consist of each of the following except:
(Multiple Choice)
4.9/5
(37)
Internal fraud prevention and detection measures are based on __________ and __________.
(Multiple Choice)
4.8/5
(31)
Implementing security programs raises many ethical issues.Identify two of these ethical issues.
(Essay)
4.8/5
(23)
A __________ is a system,or group of systems,that enforces an access-control policy between two networks.
(Multiple Choice)
4.7/5
(42)
Bernard Madoff is in jail after pleading guilty in 2009 to the biggest fraud in Wall Street history.Madoff carried out his fraud over four decades by relying on __________.
(Multiple Choice)
4.9/5
(35)
A fiduciary responsibility is both a legal and an ethical obligation.
(True/False)
4.8/5
(32)
Corporate and government secrets are currently being stolen by a serious threat called advanced persistent threat (APT),which are designed for long-term espionage.Once installed on a network,ATPs transmit copies of documents,such as Microsoft Office files and PDFs,in stealth mode.
(True/False)
4.9/5
(34)
__________ is the chain of events linking the business continuity plan to protection and to recovery.
(Multiple Choice)
5.0/5
(36)
Despite the challenges organizations face trying to protect against threats from employees,insider incidents can be minimized with a layered defense strategy consisting of security procedures,acceptable use policies,and technology controls.
(True/False)
4.7/5
(40)
When new vulnerabilities are found in operating systems,applications,or wired and wireless networks,vendors of those products release __________ or __________ to fix the vulnerabilities.
(Multiple Choice)
4.7/5
(40)
Physical security includes several controls.Which of the following is not a type of physical control?
(Multiple Choice)
4.9/5
(36)
Showing 1 - 20 of 74
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)