Multiple Choice
According to Sullivan (2011) ,the vulnerabilities in Business IT and EC systems include each of the following organizational weaknesses except
A) end-user training and security awareness.
B) lax security with mobile devices.
C) inappropriate use of business computers and network services.
D) closed systems not reacting quickly enough to security breaches.
Correct Answer:

Verified
Correct Answer:
Verified
Q75: An exercise that determines the impact of
Q76: Fraud is aimed mostly against organizations.
Q77: A software program that runs independently,consuming the
Q78: Key logs provide the means to reconstruct
Q79: A method used to ensure confidentiality and
Q80: General controls are intended to protect specific
Q81: The success and security of EC can
Q82: Risk aversion is an approach oriented toward
Q84: The mathematical formula used to encrypt the
Q85: Briefly describe the CIA security triad.