Exam 5: IT Security,crime,compliance,and Continuity

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is not a characteristic of money laundering and terrorist financing?

(Multiple Choice)
4.7/5
(38)

Protecting data and business operations involves all of the following efforts except:

(Multiple Choice)
4.8/5
(48)

Crime can be divided into two categories depending on the tactics used to carry out the crime.What are those two categories?

(Multiple Choice)
4.8/5
(40)

The purpose of the PCI DSS is to improve customers'__________ in e-commerce,especially when it comes to online payments,and to increase the Web security of online merchants.

(Essay)
4.8/5
(30)

A majority of data breaches involve:

(Multiple Choice)
4.7/5
(29)

Before the people who are responsible for security make any decisions about infosec defenses,they must understand __________.

(Multiple Choice)
4.8/5
(42)

Which of the following is not a characteristic of IT security?

(Multiple Choice)
4.9/5
(31)

There has been a steep increase in malware because of the availability of free,easy to use,powerful toolkits that even novice cyber criminals can use to develop malware.

(True/False)
4.8/5
(43)

Who stole account data from HSBC's Private Bank in Switzerland and how did HSBC learn about the data theft?

(Multiple Choice)
4.7/5
(44)

Why do social networks and cloud computing increase IT security risks? How can those risks be reduced?

(Essay)
4.9/5
(33)

A __________ attack occurs when a server or Web site receives a flood of traffic-much more traffic or requests for service than it can handle,causing it to crash.

(Essay)
4.9/5
(39)

When dealing with consumer-facing applications,such as online banking and e-commerce,strong authentication must be balanced with __________.

(Multiple Choice)
4.9/5
(32)

Fraud is nonviolent crime that is carried out using __________.

(Multiple Choice)
4.7/5
(35)

A majority of data breaches involve some sort of insider error or action either intentional or unintentional.That is,the greatest infosec risks are employees and managers.

(True/False)
4.8/5
(45)

__________ is a security technology for wireless networks that improves on the authentication and encryption features of WEP.

(Multiple Choice)
4.8/5
(38)

From an infosec perspective,__________ has been used by criminals or corporate spies to trick insiders into revealing information or access codes that outsiders should not have

(Essay)
4.9/5
(40)

A(n)__________ occurs when a server or Web site receives a flood of traffic-much more traffic or requests for service than it can handle,causing it to crash.

(Multiple Choice)
4.8/5
(30)

Which of the following is a characteristic of information security in organizations?

(Multiple Choice)
4.7/5
(38)

An estimated __________ of companies that suffer a significant data loss often go out of business within five years.

(Multiple Choice)
4.8/5
(31)

A(n)__________ is the probability of a threat exploiting a vulnerability.

(Multiple Choice)
4.9/5
(41)
Showing 21 - 40 of 74
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)