Exam 5: IT Security,crime,compliance,and Continuity
Exam 1: Information Systems in the 2010s71 Questions
Exam 2: Infrastructure and Support Systems75 Questions
Exam 3: Data,text,and Document Management74 Questions
Exam 4: Network Management and Mobility71 Questions
Exam 5: IT Security,crime,compliance,and Continuity74 Questions
Exam 6: E-Business and E-Commerce74 Questions
Exam 7: Mobile Computing and Commerce75 Questions
Exam 8: Web 2.0 and Social Media74 Questions
Exam 9: Operational Planning and Control Systems72 Questions
Exam 10: Enterprise Information Systems73 Questions
Exam 11: Business Intelligence and Decision Support73 Questions
Exam 12: IT Strategic Planning74 Questions
Exam 13: Business Process Management and Systems Development71 Questions
Exam 14: Global Ecology, Ethics, and Social Responsibility73 Questions
Select questions type
Which of the following is not a characteristic of money laundering and terrorist financing?
(Multiple Choice)
4.7/5
(38)
Protecting data and business operations involves all of the following efforts except:
(Multiple Choice)
4.8/5
(48)
Crime can be divided into two categories depending on the tactics used to carry out the crime.What are those two categories?
(Multiple Choice)
4.8/5
(40)
The purpose of the PCI DSS is to improve customers'__________ in e-commerce,especially when it comes to online payments,and to increase the Web security of online merchants.
(Essay)
4.8/5
(30)
Before the people who are responsible for security make any decisions about infosec defenses,they must understand __________.
(Multiple Choice)
4.8/5
(42)
Which of the following is not a characteristic of IT security?
(Multiple Choice)
4.9/5
(31)
There has been a steep increase in malware because of the availability of free,easy to use,powerful toolkits that even novice cyber criminals can use to develop malware.
(True/False)
4.8/5
(43)
Who stole account data from HSBC's Private Bank in Switzerland and how did HSBC learn about the data theft?
(Multiple Choice)
4.7/5
(44)
Why do social networks and cloud computing increase IT security risks? How can those risks be reduced?
(Essay)
4.9/5
(33)
A __________ attack occurs when a server or Web site receives a flood of traffic-much more traffic or requests for service than it can handle,causing it to crash.
(Essay)
4.9/5
(39)
When dealing with consumer-facing applications,such as online banking and e-commerce,strong authentication must be balanced with __________.
(Multiple Choice)
4.9/5
(32)
Fraud is nonviolent crime that is carried out using __________.
(Multiple Choice)
4.7/5
(35)
A majority of data breaches involve some sort of insider error or action either intentional or unintentional.That is,the greatest infosec risks are employees and managers.
(True/False)
4.8/5
(45)
__________ is a security technology for wireless networks that improves on the authentication and encryption features of WEP.
(Multiple Choice)
4.8/5
(38)
From an infosec perspective,__________ has been used by criminals or corporate spies to trick insiders into revealing information or access codes that outsiders should not have
(Essay)
4.9/5
(40)
A(n)__________ occurs when a server or Web site receives a flood of traffic-much more traffic or requests for service than it can handle,causing it to crash.
(Multiple Choice)
4.8/5
(30)
Which of the following is a characteristic of information security in organizations?
(Multiple Choice)
4.7/5
(38)
An estimated __________ of companies that suffer a significant data loss often go out of business within five years.
(Multiple Choice)
4.8/5
(31)
A(n)__________ is the probability of a threat exploiting a vulnerability.
(Multiple Choice)
4.9/5
(41)
Showing 21 - 40 of 74
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)