Exam 5: IT Security,crime,compliance,and Continuity

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The objective of IT security management practices is to defend __________.

Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
Verified

D

__________,such as AirSnort and WEPcrack,are readily available tools that can be used to gain unauthorized access to networks putting them at great risk.

Free
(Multiple Choice)
4.9/5
(25)
Correct Answer:
Verified

A

__________ is the elapsed time between when vulnerability is discovered and when it's exploited and has shrunk from months to __________.

Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
Verified

B

Locking a Blackberry does not provide strong data protection.Why?

(Multiple Choice)
4.9/5
(29)

Firewalls and intrusion detection systems are placed throughout networks to monitor and control traffic into and out of a network.

(True/False)
4.9/5
(31)

Why are internal threats a major challenge for organizations? How can internal threats be minimized?

(Essay)
4.8/5
(35)

The theft of confidential account data from HSBC Private Bank in Switzerland in 2007 had been done by hackers because of inadequate security controls.

(True/False)
4.9/5
(33)

All Internet traffic,which travels as packets,should have to pass through a(n)__________ ,but that is rarely the case for instant messages and wireless traffic.

(Essay)
4.8/5
(25)

Network security involves three types of defenses,which are referred to as layers.Those layers consist of each of the following except:

(Multiple Choice)
4.9/5
(37)

Internal fraud prevention and detection measures are based on __________ and __________.

(Multiple Choice)
4.8/5
(31)

Implementing security programs raises many ethical issues.Identify two of these ethical issues.

(Essay)
4.8/5
(23)

A __________ is a system,or group of systems,that enforces an access-control policy between two networks.

(Multiple Choice)
4.7/5
(42)

Bernard Madoff is in jail after pleading guilty in 2009 to the biggest fraud in Wall Street history.Madoff carried out his fraud over four decades by relying on __________.

(Multiple Choice)
4.9/5
(35)

A fiduciary responsibility is both a legal and an ethical obligation.

(True/False)
4.8/5
(32)

Corporate and government secrets are currently being stolen by a serious threat called advanced persistent threat (APT),which are designed for long-term espionage.Once installed on a network,ATPs transmit copies of documents,such as Microsoft Office files and PDFs,in stealth mode.

(True/False)
4.9/5
(34)

__________ is the chain of events linking the business continuity plan to protection and to recovery.

(Multiple Choice)
5.0/5
(36)

Despite the challenges organizations face trying to protect against threats from employees,insider incidents can be minimized with a layered defense strategy consisting of security procedures,acceptable use policies,and technology controls.

(True/False)
4.7/5
(40)

When new vulnerabilities are found in operating systems,applications,or wired and wireless networks,vendors of those products release __________ or __________ to fix the vulnerabilities.

(Multiple Choice)
4.7/5
(40)

Physical security includes several controls.Which of the following is not a type of physical control?

(Multiple Choice)
4.9/5
(36)

The Sarbanes-Oxley Act (SOX):

(Multiple Choice)
4.8/5
(35)
Showing 1 - 20 of 74
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)