Exam 5: IT Security,crime,compliance,and Continuity
Exam 1: Information Systems in the 2010s71 Questions
Exam 2: Infrastructure and Support Systems75 Questions
Exam 3: Data,text,and Document Management74 Questions
Exam 4: Network Management and Mobility71 Questions
Exam 5: IT Security,crime,compliance,and Continuity74 Questions
Exam 6: E-Business and E-Commerce74 Questions
Exam 7: Mobile Computing and Commerce75 Questions
Exam 8: Web 2.0 and Social Media74 Questions
Exam 9: Operational Planning and Control Systems72 Questions
Exam 10: Enterprise Information Systems73 Questions
Exam 11: Business Intelligence and Decision Support73 Questions
Exam 12: IT Strategic Planning74 Questions
Exam 13: Business Process Management and Systems Development71 Questions
Exam 14: Global Ecology, Ethics, and Social Responsibility73 Questions
Select questions type
According to a Workplace E-Mail and Instant Messaging Survey of 840 U.S.companies,approximately__________ have had employee e-mail or text messages subpoenaed as part of a lawsuit or regulatory investigation.
(Multiple Choice)
4.9/5
(41)
Today,infosec is mostly a technology issue assigned to the IT department.Incidents are handled on a case-by-case "cleanup" basis rather than by taking a preemptive approach to protect ahead of the threats.
(True/False)
4.8/5
(31)
The __________ environment is the work atmosphere that a company sets for its employees in order to achieve reliable financial reporting and compliance with laws,regulations,and policies.
(Essay)
4.8/5
(33)
Which of the following is not a type of administrative control for information assurance and risk management?
(Multiple Choice)
4.9/5
(39)
Hackers involve unsuspecting insiders in their crimes using tactics called __________ that trick insiders into revealing access codes that outsiders should not have.
(Multiple Choice)
4.7/5
(36)
In general,risk management is expensive to the organization,but convenient for users.
(True/False)
4.9/5
(41)
Fingerprints,retinal scans,and voice scans for user identification are examples of __________ controls.
(Multiple Choice)
5.0/5
(36)
The infosec defense strategies and controls depend on what needs to be protected and the cost-benefit analysis.That is,companies should neither under-invest nor over-invest.
(True/False)
4.8/5
(27)
The major objective of __________ is proof of identity to identify the legitimate user and determine the action he or she is allowed to perform.
(Multiple Choice)
4.9/5
(37)
IT security is so integral to business objectives that it needs to be treated as a stand-alone function.
(True/False)
4.8/5
(34)
Newly released viruses with unidentified signatures or that are hidden in an e-mail attachment are blocked by firewalls and antivirus software from entering a company's network.
(True/False)
4.9/5
(33)
Symptoms of fraud that can be detected by internal controls include all of the following except:
(Multiple Choice)
4.8/5
(41)
Showing 61 - 74 of 74
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)