Filters
Question type

Study Flashcards

Cybercrime surveys have reported each of the following trends or findings except ________.


A) security incidents increased steadily despite implementation of security practices
B) current cybersecurity technologies and policies are simply not keeping pace with fast-evolving threats.
C) Many threats and challenges that organizations face today were unimaginable 10 years ago.
D) Older threats such as fraud and identity theft have decreased significantly.

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

D

One source of cybersecurity threats today are ____________who breach networks in an attempt to gain media attention or for their cause.


A) Hacktivists
B) Political criminals
C) Industrial spies
D) Social engineers

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

A

According to a Ponemon study in 2016,the average cost of an overall data breach is:


A) $1 million
B) $2 million
C) $4 million
D) $8 million

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

Most organizations use software or hardware devices to control access to their private networks from the Internet by analyzing incoming and outgoing data packets.These devices are called ___________.


A) Antimalware
B) Firewalls
C) Intrusion detection systems
D) Middleware

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

In Cybersecurity terminology,a(n)_____________ is defined as the probability of a threat exploiting a vulnerability and the resulting cost.

Correct Answer

verifed

verified

All of the following describe The Sarbanes-Oxley Act except:


A) Is an antifraud law
B) Forces more accurate business reporting and disclosure of GAAP (generally accepted accounting principles) violations.
C) Makes it necessary to find and root out fraud.
D) Has been adopted by all countries in North American and the European Union

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

When a host computer is infected,attempts to remove the malware may fail-and the malware may reinfect the host during a restore if the malware is captured in backups or archives.

A) True
B) False

Correct Answer

verifed

verified

Social networks and cloud computing increase vulnerabilities by providing a single point of failure and attack for organized criminal networks.

A) True
B) False

Correct Answer

verifed

verified

Approximately 25 percent of occupational fraud could have been prevented if proper IT-based internal controls had been designed,implemented,and followed

A) True
B) False

Correct Answer

verifed

verified

A computer security specialist who breaks into protected systems and networks to test and assess their security.


A) White Hat hacker
B) Red Hat hacker
C) Black Hat Hacker
D) Gray Hat Hacker

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Attacks ________ could significantly disrupt the functioning of government and business-and trigger cascading effects far beyond the targeted sector and physical location of the incident.


A) By hacktivists
B) By hackers
C) On critical infrastructure
D) On industrial control systems

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

U.S.cybersecurity experts and government officials are increasingly concerned about breaches from __________ into corporate networks,either through mobile devices or by other means.


A) Domestic terrorists
B) Amateur hackers
C) Organized crime syndicates based in the United States
D) Other countries

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

D

In the United States,the Sarbanes-Oxley Act (SOX) requires businesses to __________________________.


A) Report security breaches via media sources to inform the public
B) Backup sensitive data to offsite locations
C) Set up comprehensive internal controls
D) Inform the public about network failures in a timely manner

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

The principle of ________ acknowledges that the cost of information security needs to be balanced with its benefits.It is the basic cost-benefit principle with which you are familiar.


A) accounting
B) economic use of resources
C) legality
D) COBIT

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Powerful IT security systems are needed to defend against what appears to be authorized access to a network or application.

A) True
B) False

Correct Answer

verifed

verified

A person who may violate ethical standards or principles,but without malicious intent.


A) White Hat hacker
B) Red Hat hacker
C) Black Hat Hacker
D) Gray Hat Hacker

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

LulzSec and Anonymous are examples of ________ that have claimed responsibility for high profile attacks designed to make a political statement,embarrass an organization or government,or to gain publicity.


A) Hacktivists
B) Hostile government agents
C) Industrial spies
D) Cyber terrorists

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

___________ tactics are used by hackers and corporate spies to trick people into revealing login information or access codes.


A) Social engineering
B) Backdoor
C) BYOD
D) Password cracking

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

In Cybersecurity terminology,a vulnerability is defined as ________:


A) A weakness that threatens the confidentiality,integrity,or availability of data.
B) Something or someone that can damage,disrupt,or destroy an asset.
C) Estimated cost,loss,or damage that can result from an exploit.
D) Tools or techniques that take compromise a network.

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

__________ is a process designed to achieve reliable financial reporting in order to protect investors and comply with regulations.

Correct Answer

verifed

verified

Showing 1 - 20 of 148

Related Exams

Show Answer