Exam 5: IT Security,crime,compliance,and Continuity

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Types of unintentional threats that organizations must defend against as part of their IT security measures are human errors,sabotage,environmental hazards,and computer system failures.

(True/False)
4.8/5
(31)

Managers have a legal and ethical obligation,which is called __________,to protect the confidential data of the people and partners that they collect,store,and share.

(Multiple Choice)
4.9/5
(39)

Fraud management starts with corporate governance culture and ethics __________.

(Multiple Choice)
4.9/5
(44)

One of the worst and most prevalent crimes is __________.

(Multiple Choice)
4.8/5
(41)

Why do fraud prevention and detection require an effective monitoring system?

(Essay)
4.7/5
(35)

Financial institutions,data processing firms,and retail businesses do not have to notify potential victims or reveal data breaches in which customers' personal financial information may have been stolen,lost,or compromised.

(True/False)
5.0/5
(38)

Facebook,YouTube,Twitter,LinkedIn,and other social networks are making IT security dangers worse.Why?

(Multiple Choice)
4.8/5
(44)

A __________ control is an automated method of verifying the identity of a person,based on physical or behavioral characteristics,such as a fingerprint or voice scan.

(Essay)
4.8/5
(25)

A(n)__________ is something or someone that may result in harm to an asset.

(Multiple Choice)
4.9/5
(38)

All of the following are characteristics of firewalls except:

(Multiple Choice)
4.9/5
(47)

What is the most cost-effective approach to managing fraud?

(Multiple Choice)
4.9/5
(37)

Under the doctrine of __________ ,senior managers and directors have a fiduciary obligation to use reasonable care to protect the company's business operations.When they fail to meet the company's legal and regulatory duties,they can face lawsuits or other legal action.

(Essay)
4.9/5
(34)

__________ is the word that refers to viruses,worms,trojan horses,spyware,and all other types of disruptive,destructive,or unwanted programs.

(Essay)
4.9/5
(22)

__________ is the ability of an IS to continue to operate when a failure occurs,usually operating for a limited time or at a reduced level.

(Multiple Choice)
4.9/5
(37)

An important element in any security system is the __________ plan,also known as the disaster recovery plan,which outlines the process by which businesses should recover from a major disaster.

(Essay)
4.8/5
(34)

Sarbanes-Oxley Act is an antifraud law.It forces more accurate business reporting and disclosure of GAAP (generally accepted accounting principles)violations,thus making it necessary to find and root out fraud.

(True/False)
4.8/5
(34)

__________ is the supervision,monitoring,and control of the organization's IT assets.COBIT is a guide to best practices in this area.

(Essay)
4.9/5
(31)

Which of the following is not one of the essential defenses against botnets and malware?

(Multiple Choice)
4.9/5
(31)

Sensitive data that are encrypted with wired equivalent privacy (WEP)and transmitted between two wireless devices __________.

(Multiple Choice)
4.9/5
(37)

__________ refers to the deliberate misuse of the assets of one's employer for personal gain.

(Multiple Choice)
5.0/5
(31)
Showing 41 - 60 of 74
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)