Exam 5: IT Security,crime,compliance,and Continuity

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

According to a Workplace E-Mail and Instant Messaging Survey of 840 U.S.companies,approximately__________ have had employee e-mail or text messages subpoenaed as part of a lawsuit or regulatory investigation.

(Multiple Choice)
4.9/5
(41)

Today,infosec is mostly a technology issue assigned to the IT department.Incidents are handled on a case-by-case "cleanup" basis rather than by taking a preemptive approach to protect ahead of the threats.

(True/False)
4.8/5
(31)

The __________ environment is the work atmosphere that a company sets for its employees in order to achieve reliable financial reporting and compliance with laws,regulations,and policies.

(Essay)
4.8/5
(33)

Which of the following is not a type of administrative control for information assurance and risk management?

(Multiple Choice)
4.9/5
(39)

IT risk management includes all of the following except:

(Multiple Choice)
4.8/5
(38)

Hackers involve unsuspecting insiders in their crimes using tactics called __________ that trick insiders into revealing access codes that outsiders should not have.

(Multiple Choice)
4.7/5
(36)

In general,risk management is expensive to the organization,but convenient for users.

(True/False)
4.9/5
(41)

Fingerprints,retinal scans,and voice scans for user identification are examples of __________ controls.

(Multiple Choice)
5.0/5
(36)

The infosec defense strategies and controls depend on what needs to be protected and the cost-benefit analysis.That is,companies should neither under-invest nor over-invest.

(True/False)
4.8/5
(27)

The major objective of __________ is proof of identity to identify the legitimate user and determine the action he or she is allowed to perform.

(Multiple Choice)
4.9/5
(37)

Prior to 2002,what was the common perspective on infosec?

(Multiple Choice)
4.9/5
(37)

IT security is so integral to business objectives that it needs to be treated as a stand-alone function.

(True/False)
4.8/5
(34)

Newly released viruses with unidentified signatures or that are hidden in an e-mail attachment are blocked by firewalls and antivirus software from entering a company's network.

(True/False)
4.9/5
(33)

Symptoms of fraud that can be detected by internal controls include all of the following except:

(Multiple Choice)
4.8/5
(41)
Showing 61 - 74 of 74
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)