Deck 5: Cybersecurity and Risk Management

ملء الشاشة (f)
exit full mode
سؤال
Negative consequences of lax cybersecurity that companies tend to face include all of the following except ________.

A)Damaged brands and reputations
B)Criminal charges
C)Financial penalties
D)Customer backlash
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The main cause of data breaches is ________,which is so successful because of ________ when management does not do enough to defend against cyberthreats.

A)Hacking;highly motivated hackers
B)Hacking;negligence
C)Malware;BYOD
D)Malware;negligence
سؤال
A key of finding of the 2014 Global State of Information Security Survey was ________.

A)Too many companies are defending yesterday---that is,they rely on yesterday's cybersecurity practices that are ineffective at combating today's threats.
B)Protecting all data at an equally high level is now practical and feasible.
C)Most companies implement stringent security policies before moving to cloud computing,but not before implementing BYOD.
D)APTs require a new information-protection model that focuses on preventing DDoS attacks.
سؤال
Boeing's Black smartphone is secure because it ________.

A)Is self-destructing if tampered with.
B)Uses dual SIM cards
C)Communicates via satellite
D)Is an Android device
سؤال
___________ tactics are used by hackers and corporate spies to trick people into revealing login information or access codes.

A)Social engineering
B)Backdoor
C)BYOD
D)Password cracking
سؤال
According to cybersecurity experts,most data breaches go unreported because corporate victims fear that disclosure would damage their stock price,or because ________.

A)they want to hide the attack from the government
B)they never knew they were hacked in the first place
C)they want to cover up the intrusion
D)they do not have to report them.
سؤال
Almost half of the 2013 breaches occurred in ________,where the largest number of records was exposed-more than 540 million data records or 66 percent.

A)Asia
B)China
C)Europe
D)The United States
سؤال
The discount retailer Target suffered a hacker attack during the fourth quarter of 2013 (4Q2013)that exposed customer account information.Which of the following was not an impact of Target's hacker attack and data breach?

A)4Q 2013 profit dropped 46% and sales revenue fell 5.3 % after breach was disclosed.
B)Gartner estimated the cost of the breach from $400 million to $450 million
C)Target faced 2 lawsuits-one related to privacy invasion and one for negligence.
D)The incident scared shoppers away,affecting the company's profits throughout 2014.
سؤال
________ is also known as human hacking-tricking users into revealing their credentials and then using them to gain access to networks or accounts.

A)Android-hacking
B)BYOD
C)Hacktivism
D)Social engineering
سؤال
Experts believe the three greatest cybersecurity dangers over the next few years will involve all of the following except __________.

A)persistent threats
B)POS attacks
C)mobile computing
D)the use of social media
سؤال
Attacks ________ could significantly disrupt the functioning of government and business-and trigger cascading effects far beyond the targeted sector and physical location of the incident.

A)By hacktivists
B)By hackers
C)On critical infrastructure
D)On industrial control systems
سؤال
____________ is/are defined as "systems and assets,whether physical or virtual,so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security,national economic security,national public health or safety,or any combination of those matters."

A)Critical infrastructure
B)Cyber architecture
C)National networks
D)Strategic assets
سؤال
A(n)________ attack bombards a network or website with traffic to crash it and leave it vulnerable to other threats.

A)advanced persistent threat
B)distributed denial-of-service
C)malware
D)phishing
سؤال
Which of the following represents a cybersecurity concern about employees using their own smartphones for work purposes?

A)Employees will spend too much time playing games or using entertainment and recreation apps,thus reducing productivity.
B)Managers will be unable to monitor the time spent on personal calls made during work hours.
C)Many personal smartphones do not have anti-malware or data encryption apps,creating a security problem with respect to any confidential business data stored on the device.
D)Consumer-quality equipment are more likely to break or malfunction than enterprise quality devices.
سؤال
Advanced persistent threat (APT)attackers want to ________.

A)create awareness for their causes
B)remain unnoticed so they can continue to steal data
C)conduct cyberwarfare
D)reveal weaknesses in business and government websites and then force them offline.
سؤال
One source of cybersecurity threats today are ____________who breach networks in an attempt to gain media attention or for their cause.

A)Hacktivists
B)Political criminals
C)Industrial spies
D)Social engineers
سؤال
A stealth network attack in which an unauthorized person gains access to a network and remains undetected for a long time is referred to as a(n)__________ attack.

A)registry denial
B)advanced persistent threat
C)DDOS
D)hacktivist
سؤال
One of ________ specialties is finding websites with poor security,and then stealing and posting information from them online.

A)LulzSec's.
B).RSA's
C)Fraudsters'
D)Botmasters'
سؤال
A(n)________ is a hacker who attempts to breach secure networks looking for trade secrets or proprietary information.

A)Hacktivist
B)Political criminal
C)Industrial spy
D)Identity thief
سؤال
Cybercrime surveys have reported each of the following trends or findings except ________.

A)security incidents increased 33% despite implementation of security practices
B)current cybersecurity technologies and policies are simply not keeping pace with fast-evolving threats.
C)Many threats and challenges that organizations face today were unimaginable 10 years ago.
D)Older threats such as fraud and identity theft have decreased significantly.
سؤال
In Cybersecurity terminology,an exploit is defined as ________:

A)A weakness that threatens the confidentiality,integrity,or availability of data.
B)Something or someone that can damage,disrupt,or destroy an asset.
C)Estimated cost,loss,or damage that can result from an exploit.
D)Tools or techniques that take advantage of a vulnerability.
سؤال
IT professionals work hard to protect key characteristics of an asset from security breaches.One of these characteristics is ________,or the avoidance of unauthorized disclosure of information or data.

A)Integrity
B)Confidentiality
C)Availability
D)Reliability
سؤال
IT professionals work hard to protect key characteristics of an asset from security breaches.One of these characteristics is _________,or the property that data is accessible and modifiable when needed by those authorized to do so.

A)Integrity
B)Confidentiality
C)Availability
D)Reliability
سؤال
The objectives of cybersecurity are to accomplish each of the following except _________.

A)Make data and documents available and accessible 24/7 while simultaneously restricting access.
B)Promote secure and legal sharing of information among authorized persons and partners.
C)Ensure compliance with supply chain business partners.
D)Detect,diagnose,and respond to incidents and attacks in real time.
سؤال
In Cybersecurity terminology,a threat is defined as ________.

A)A weakness that threatens the confidentiality,integrity,or availability of data.
B)Something or someone that can damage,disrupt,or destroy an asset.
C)Estimated cost,loss,or damage that can result from an exploit.
D)Tools or techniques that take compromise a network.
سؤال
The preferred method of hackers who want to steal trade secrets and other confidential information from business organizations is ___________.

A)To bribe employees to get access codes and passwords.
B)To bombard websites or networks with so much traffic that they "crash",exposing sensitive data.
C)To break into employees' mobile devices and leapfrog into employers' networks-stealing secrets without a trace.
D)Use a combination of sophisticated hardware tools designed to defeat IT security defenses.
سؤال
IT professionals work hard to protect key characteristics of an asset from security breaches.One of these characteristics is ____________,or the property that data or files have not been altered in an unauthorized way.

A)Integrity
B)Confidentiality
C)Availability
D)Reliability
سؤال
Government and corporate officials concerned about security threats do not bring their own cell phones or laptops when traveling overseas.Instead,they bring loaner devices and follow strict security procedures including not connecting to their domestic network while out of the country.These procedures are referred to as _________.

A)Black Ops procedures
B)Do-Not-Carry rules
C)Foreign Threat Prevention procedures
D)Strict Security standards
سؤال
In Cybersecurity terminology,a vulnerability is defined as ________:

A)A weakness that threatens the confidentiality,integrity,or availability of data.
B)Something or someone that can damage,disrupt,or destroy an asset.
C)Estimated cost,loss,or damage that can result from an exploit.
D)Tools or techniques that take compromise a network.
سؤال
When sending sensitive email,James uses a program that transforms data into unreadable text to protect it from being understood by unauthorized users.James is using ________ to protect his email communications.

A)Authentication
B)Defense-in-depth
C)Encryption
D)Hashing
سؤال
In cybersecurity terms,the function of a password together with a username is to __________ a user's identity to verify that the person has the right to access a computer or network.

A)Record
B)Authenticate
C)Substantiate
D)Validate
سؤال
Access to top secret or highly secure networks associated with Homeland Security or national defense use authentication methods based on a biological feature,such as a fingerprint or retinal scan to identify a person.These methods are called _____________.

A)Bio-Engineering
B)Physical security
C)Biometrics
D)Human factors
سؤال
LulzSec and Anonymous are examples of ________ that have claimed responsibility for high profile attacks designed to make a political statement,embarrass an organization or government,or to gain publicity.

A)Hacktivists
B)Hostile government agents
C)Industrial spies
D)Cyber terrorists
سؤال
Organizations in the _________ industries are more heavily regulated than most and are required to implement stringent measures to protect data.

A)Banking and finance,entertainment and technology
B)Technology,banking and finance,and education
C)Energy,health care,and banking and finance
D)Healthcare,technology and defense
سؤال
Most organizations use software or hardware devices to control access to their private networks from the Internet by analyzing incoming and outgoing data packets.These devices are called ___________.

A)Antimalware
B)Firewalls
C)Intrusion detection systems
D)Middleware
سؤال
U.S.cybersecurity experts and government officials are increasingly concerned about breaches from __________ into corporate networks,either through mobile devices or by other means.

A)Domestic terrorists
B)Amateur hackers
C)Organized crime syndicates based in the United States
D)Other countries
سؤال
The three key cybersecurity principles are:

A)Data protection,equipment protection,reputation protection
B)Confidentiality,integrity,availability
C)Anticipate,defend,counter-attack
D)Identify,assess risk,take action
سؤال
In Cybersecurity terminology,a risk is defined as ________:

A)A weakness that threatens the confidentiality,integrity,or availability of data.
B)Something or someone that can damage,disrupt,or destroy an asset.
C)Estimated cost,loss,or damage that can result from an exploit.
D)The probability of a threat exploiting a vulnerability.
سؤال
The ability of an IS to continue to operate when a failure occurs,but usually for a limited time or at a reduced level is referred to as __________.

A)Fault tolerance
B)Hot site ready
C)Cold site ready
D)System override
سؤال
Chris is a network manager for a large company.She receives daily updates about various malware and then assesses how to best protect her organization's network from attack.In cybersecurity terminology,she is involved in __________.

A)Identifying exposure
B)Risk management
C)A security audit
D)Encryption defenses
سؤال
.The IT security defense-in-depth model starts with ________.

A)Senior management commitment and support
B)IT security procedures and enforcement
C)Hardware and software selection
D)Acceptable use policies and IT security training
سؤال
__________ is the elapsed time between when vulnerability is discovered and when it is exploited and has shrunk from months to __________.

A)Time-to-exploitation;days
B)Time-to-exploitation;minutes
C)Denial of service;days
D)Denial of service;seconds
سؤال
Storm worm,which is spread via spam,is a ________ agent embedded inside over 25 million computers.Storm's combined power has been compared to the processing power of ________.

A)botnet;a supercomputer
B)spyware;a DDoS attack
C)vector;zombies
D)spear phishing;a server
سؤال
In the United States,the Sarbanes-Oxley Act (SOX),Gramm-Leach-Bliley Act (GLB),Federal Information Security Management Act (FISMA),and USA Patriot Act all require businesses to __________________________.

A)Report security breaches via media sources to inform the public
B)Backup sensitive data to offsite locations
C)Protect personally identifiable information
D)Inform the public about network failures in a timely manner
سؤال
Which of the following statements about malware is false?

A)Technically,malware is a computer program or code that can infect anything attached to the Internet and is able to process the code.
B)Setting an e-mail client,such as Microsoft Outlook or Gmail,to allow scripting blocks malware.
C)RATS create an unprotected backdoor into a system through which a hacker can remotely control that system.
D)The payload carries out the purpose of the malware.
سؤال
Intrusion Detection Systems (IDS)are designed to monitor network traffic and identify threats that have breached the networks' initial defenses.IDS identify of the following except:

A)An attacker who is using the identity or credentials of a legitimate user to gain access to an IS,device,or network.
B)A legitimate user who performs actions he is not authorized to do.
C)A user who tries to disguise or cover up his actions by deleting audit files or system logs.
D)Employees who use computing or network resources inefficiently.
سؤال
Sometimes system failures and data or information loss can result from reasons other than an intentional attempt to breach security.Unintentional threats are all of the following except ___________.

A)Political/civic unrest
B)Human errors
C)Environmental hazards
D)Computer systems failures
سؤال
Cybersecurity is ___________.

A)an ongoing unending process
B)a problem that is solved with hardware or software
C)defined in the AUP that is enforced periodically
D)primarily the responsibility of the IT and legal departments
سؤال
.The IT security defense-in-depth model ends with ________.

A)Senior management commitment and support
B)IT security procedures and enforcement
C)Hardware and software selection
D)Acceptable use policies and IT security training
سؤال
Most APT attacks are launched through ________.

A)Data tampering
B)Worms
C)Phishing
D)Vectors
سؤال
Facebook,YouTube,Twitter,LinkedIn,and other social networks are making IT security dangers worse.Why?

A)Users invite in and build relationships with others.Cybercriminals hack into these trusted relationships using stolen log-in credentials.
B)E-mail viruses and malware have been increasing for years even though e-mail security has improved.
C)Communication has shifted from social networks to smartphones.
D)Web filtering,user education,and strict policies cannot help prevent IT security dangers on Facebook and other social networks.
سؤال
Most information security incidents will occur because of _________.

A)Increases in hacker skills and capabilities
B)Poorly designed network protection software
C)Increasing sophistication of computer viruses and worms
D)Users who do not follow secure computing practices and procedures
سؤال
Samuel received an email that looked like it came from his bank.The email told him to click a link that opened an official looking Webpage where he was asked to enter his account information.But when Samuel examined the URL,he noticed it was a strange address he did not recognize.Most likely,someone was attempting to steal Samuel's confidential information using a technique called __________.

A)Botnets
B)Phishing
C)Spoofing
D)Click hijacking
سؤال
.________ is the supervision,monitoring,and control of an organization's IT assets.

A)IT governance
B)Internal control
C)PCI DSS
D)FISMA
سؤال
While security threats from e-mail viruses and malware have been declining for years as e-mail security has improved,threats from __________ have increased considerably in recent years.

A)Software errors
B)Malicious employees
C)Social networks and cloud computing
D)Vendor sabotage
سؤال
The purpose of the PCI DSS is to improve customers' trust in e-commerce,especially when it comes to online payments,and to increase the Web security of online merchants.

A)IT governance
B)Internal control
C)PCI DSS
D)FISMA
سؤال
Which of the following is not a characteristic of money laundering and terrorist financing?

A)Transnational organized crime groups use money laundering to fund their operations,which creates international and national security threats.
B)Cybercrime is safer and easier than selling drugs,dealing in black market diamonds,or robbing banks.
C)Funds used to finance terrorist operations are easy to track,which provides evidence to identify and locate leaders of terrorist organizations and cells.
D)Online gambling offers easy fronts for international money-laundering operations.
سؤال
The principle of ________ acknowledges that the cost of information security needs to be balanced with its benefits.It is the basic cost-benefit principle with which you are familiar.

A)accounting
B)economic use of resources
C)legality
D)COBIT
سؤال
The director of the Federal Trade Commission (FTC)bureau of consumer protection warned that the agency would bring enforcement action against small businesses that ________

A)failed to inform the public about network failures in a timely manner
B)failed to transmit sensitive data
C)did not report security breaches to law enforcement
D)lacked adequate policies and procedures to protect consumer data.
سؤال
When new vulnerabilities are found in operating systems,applications,or wired and wireless networks,vendors of those products release __________ or __________ to fix the vulnerabilities.

A)Patches;service packs
B)Patches;downloads
C)Firewalls;spyware
D)Service packs;firewalls
سؤال
A defense strategy requires several controls.___________ protect computer facilities and resources such as computers,data centers,software,manuals,and networks.

A)Application controls
B)Physical controls
C)General controls
D)Authentication controls
سؤال
The _________ is an exercise that determines the impact of losing the support or availability of a resource.

A)Business impact analysis (BIA)
B)Vulnerability audit
C)Asset valuation audit
D)Computing Cost/Benefit (CCB)audit
سؤال
The single-most effective fraud prevention tactic is making employees know that ________.

A)fraudsters will be fired
B)fraudsters will be forced to repay what they stole plus interest
C)fraud could destroy the company and jobs.
D)fraud will be detected by IT monitoring systems and punished by the legal system.
سؤال
Business operations are controlled by apps,systems,and networks that are so interconnected that anyone's ________ is an entry point for attacks.

A)mobile device
B)botnet
C)BYOD
D)firewall
سؤال
________ is the most cost-effective approach to fraud.

A)Detection
B)Lawsuits
C)Prevention
D)Prosecution
سؤال
When it comes to defending against employee fraud,regulators look favorably on companies that can demonstrate good __________ and best practices in operational risk management.

A)Corporate governance
B)Access to legal counsel
C)Relationships with security vendors
D)Awareness of industry standards
سؤال
People who have their social security or credit card numbers stolen and used by thieves are frequently victims of ___________________.

A)Insider fraud
B)Identity theft
C)Occupational corruption
D)Document sabotage
سؤال
Crime can be divided into two categories depending on the tactics used to carry out the crime: ________.

A)Fraud and felonies
B)Occupational and opportunistic
C)Lethal and misdemeanors
D)violent and nonviolent
سؤال
__________ are essential to the prevention and detection of occupation frauds

A)Anti-malware and firewalls
B)Internal audits and internal controls
C)Encryption and IDS
D)AUPs
سؤال
___________ is a term referring to a variety of criminal behaviors perpetrated by an organization's own employees or contractors.

A)Managerial corruption
B)Insider or internal fraud
C)Corporate fraud
D)Intentional fraud
سؤال
A defense strategy requires several controls._________are established to protect the system regardless of the specific application.

A)Application controls
B)Physical controls
C)General controls
D)Authentication controls
سؤال
When it comes to fraud committed by an organization's employees,the single most effective fraud prevention technique is _______.

A)Holding managers responsible for the actions of their employees
B)Peer monitoring (employees monitor each other)
C)Creating the perception that fraud will be detected and punished
D)A clearly written employee policy manual that explains unacceptable behaviors
سؤال
Internal fraud prevention and detection measures are based on __________ and __________.

A)A detailed recovery plan;containment,including a fault-tolerant system
B)Perimeter defense technologies,such as e-mail scanners;human resource procedures,such as recruitment screening
C)General controls;application controls
D)Physical controls,including authorization;authentication systems
سؤال
Voice and fingerprint _______ can significantly improve the security of physical devices and provide stronger authentication for remote access or cloud services.

A)cryptography
B)biometrics
C)encryption
D)visualization
سؤال
Social networks and cloud computing have increased vulnerabilities in all of the following ways except ________.

A)by providing a single point of failure and attack for organized criminal networks
B)In Twitter and Facebook,users invite in and build relationships with others.Cybercriminals hack into these trusted relationships using stolen logins.
C)Twitter's use of service packs and patches have not been effective.
D)These networks and services increase exposure to risk because of the time-to-exploitation of today's sophisticated spyware and mobile viruses
سؤال
The Payment Card Industry Data Security Standard (PCI DSS)created by Visa,MasterCard,American Express,and Discover is a __________.

A)Set of standards required by U.S.and international law for protecting credit card transaction data.
B)Set of industry standards required for all online merchants that store,process,or transmit cardholder data.
C)Set of voluntary security guidelines for retailers who accept Visa,MasterCard,American Express,and Discover credit cards.
D)Set of regulations (that vary from state to state,and country to country)that apply to credit card companies.
سؤال
The cybersecurity defense strategy and controls that should be used depend on __________.

A)The source of the threat
B)Industry regulations regarding protection of sensitive data
C)What needs to be protected and the cost-benefit analysis
D)The available IT budget
سؤال
Which of the following is not a type of administrative control for information assurance and risk management?

A)Fostering company loyalty
B)Immediately revoking access privileges of dismissed,resigned,or transferred employees
C)Instituting separation of duties by dividing sensitive computer duties among as many employees as economically feasible
D)Performing authorization and authentication
سؤال
Detecting internal fraud has become sophisticated.Audit trails from key systems and personnel records are stored in data warehouses and subjected to __________ where things like excessive hours worked,unusual transactions,copying of huge amounts of data and other unusual patterns of behavior are identified.

A)Security audits
B)Pattern analysis
C)Behavior recognition scans
D)Anomaly detection analysis
سؤال
Physical security includes several controls.Which of the following is not a type of physical control?

A)Security bonds or malfeasance insurance for key employees
B)Emergency power shutoff and backup batteries
C)Shielding against electromagnetic fields
D)Properly designed and maintained air-conditioning systems
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/150
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 5: Cybersecurity and Risk Management
1
Negative consequences of lax cybersecurity that companies tend to face include all of the following except ________.

A)Damaged brands and reputations
B)Criminal charges
C)Financial penalties
D)Customer backlash
B
2
The main cause of data breaches is ________,which is so successful because of ________ when management does not do enough to defend against cyberthreats.

A)Hacking;highly motivated hackers
B)Hacking;negligence
C)Malware;BYOD
D)Malware;negligence
B
3
A key of finding of the 2014 Global State of Information Security Survey was ________.

A)Too many companies are defending yesterday---that is,they rely on yesterday's cybersecurity practices that are ineffective at combating today's threats.
B)Protecting all data at an equally high level is now practical and feasible.
C)Most companies implement stringent security policies before moving to cloud computing,but not before implementing BYOD.
D)APTs require a new information-protection model that focuses on preventing DDoS attacks.
A
4
Boeing's Black smartphone is secure because it ________.

A)Is self-destructing if tampered with.
B)Uses dual SIM cards
C)Communicates via satellite
D)Is an Android device
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
5
___________ tactics are used by hackers and corporate spies to trick people into revealing login information or access codes.

A)Social engineering
B)Backdoor
C)BYOD
D)Password cracking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
6
According to cybersecurity experts,most data breaches go unreported because corporate victims fear that disclosure would damage their stock price,or because ________.

A)they want to hide the attack from the government
B)they never knew they were hacked in the first place
C)they want to cover up the intrusion
D)they do not have to report them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
7
Almost half of the 2013 breaches occurred in ________,where the largest number of records was exposed-more than 540 million data records or 66 percent.

A)Asia
B)China
C)Europe
D)The United States
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
8
The discount retailer Target suffered a hacker attack during the fourth quarter of 2013 (4Q2013)that exposed customer account information.Which of the following was not an impact of Target's hacker attack and data breach?

A)4Q 2013 profit dropped 46% and sales revenue fell 5.3 % after breach was disclosed.
B)Gartner estimated the cost of the breach from $400 million to $450 million
C)Target faced 2 lawsuits-one related to privacy invasion and one for negligence.
D)The incident scared shoppers away,affecting the company's profits throughout 2014.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
9
________ is also known as human hacking-tricking users into revealing their credentials and then using them to gain access to networks or accounts.

A)Android-hacking
B)BYOD
C)Hacktivism
D)Social engineering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
10
Experts believe the three greatest cybersecurity dangers over the next few years will involve all of the following except __________.

A)persistent threats
B)POS attacks
C)mobile computing
D)the use of social media
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
11
Attacks ________ could significantly disrupt the functioning of government and business-and trigger cascading effects far beyond the targeted sector and physical location of the incident.

A)By hacktivists
B)By hackers
C)On critical infrastructure
D)On industrial control systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
12
____________ is/are defined as "systems and assets,whether physical or virtual,so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security,national economic security,national public health or safety,or any combination of those matters."

A)Critical infrastructure
B)Cyber architecture
C)National networks
D)Strategic assets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
13
A(n)________ attack bombards a network or website with traffic to crash it and leave it vulnerable to other threats.

A)advanced persistent threat
B)distributed denial-of-service
C)malware
D)phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following represents a cybersecurity concern about employees using their own smartphones for work purposes?

A)Employees will spend too much time playing games or using entertainment and recreation apps,thus reducing productivity.
B)Managers will be unable to monitor the time spent on personal calls made during work hours.
C)Many personal smartphones do not have anti-malware or data encryption apps,creating a security problem with respect to any confidential business data stored on the device.
D)Consumer-quality equipment are more likely to break or malfunction than enterprise quality devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
15
Advanced persistent threat (APT)attackers want to ________.

A)create awareness for their causes
B)remain unnoticed so they can continue to steal data
C)conduct cyberwarfare
D)reveal weaknesses in business and government websites and then force them offline.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
16
One source of cybersecurity threats today are ____________who breach networks in an attempt to gain media attention or for their cause.

A)Hacktivists
B)Political criminals
C)Industrial spies
D)Social engineers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
17
A stealth network attack in which an unauthorized person gains access to a network and remains undetected for a long time is referred to as a(n)__________ attack.

A)registry denial
B)advanced persistent threat
C)DDOS
D)hacktivist
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
18
One of ________ specialties is finding websites with poor security,and then stealing and posting information from them online.

A)LulzSec's.
B).RSA's
C)Fraudsters'
D)Botmasters'
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
19
A(n)________ is a hacker who attempts to breach secure networks looking for trade secrets or proprietary information.

A)Hacktivist
B)Political criminal
C)Industrial spy
D)Identity thief
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
20
Cybercrime surveys have reported each of the following trends or findings except ________.

A)security incidents increased 33% despite implementation of security practices
B)current cybersecurity technologies and policies are simply not keeping pace with fast-evolving threats.
C)Many threats and challenges that organizations face today were unimaginable 10 years ago.
D)Older threats such as fraud and identity theft have decreased significantly.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
21
In Cybersecurity terminology,an exploit is defined as ________:

A)A weakness that threatens the confidentiality,integrity,or availability of data.
B)Something or someone that can damage,disrupt,or destroy an asset.
C)Estimated cost,loss,or damage that can result from an exploit.
D)Tools or techniques that take advantage of a vulnerability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
22
IT professionals work hard to protect key characteristics of an asset from security breaches.One of these characteristics is ________,or the avoidance of unauthorized disclosure of information or data.

A)Integrity
B)Confidentiality
C)Availability
D)Reliability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
23
IT professionals work hard to protect key characteristics of an asset from security breaches.One of these characteristics is _________,or the property that data is accessible and modifiable when needed by those authorized to do so.

A)Integrity
B)Confidentiality
C)Availability
D)Reliability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
24
The objectives of cybersecurity are to accomplish each of the following except _________.

A)Make data and documents available and accessible 24/7 while simultaneously restricting access.
B)Promote secure and legal sharing of information among authorized persons and partners.
C)Ensure compliance with supply chain business partners.
D)Detect,diagnose,and respond to incidents and attacks in real time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
25
In Cybersecurity terminology,a threat is defined as ________.

A)A weakness that threatens the confidentiality,integrity,or availability of data.
B)Something or someone that can damage,disrupt,or destroy an asset.
C)Estimated cost,loss,or damage that can result from an exploit.
D)Tools or techniques that take compromise a network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
26
The preferred method of hackers who want to steal trade secrets and other confidential information from business organizations is ___________.

A)To bribe employees to get access codes and passwords.
B)To bombard websites or networks with so much traffic that they "crash",exposing sensitive data.
C)To break into employees' mobile devices and leapfrog into employers' networks-stealing secrets without a trace.
D)Use a combination of sophisticated hardware tools designed to defeat IT security defenses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
27
IT professionals work hard to protect key characteristics of an asset from security breaches.One of these characteristics is ____________,or the property that data or files have not been altered in an unauthorized way.

A)Integrity
B)Confidentiality
C)Availability
D)Reliability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
28
Government and corporate officials concerned about security threats do not bring their own cell phones or laptops when traveling overseas.Instead,they bring loaner devices and follow strict security procedures including not connecting to their domestic network while out of the country.These procedures are referred to as _________.

A)Black Ops procedures
B)Do-Not-Carry rules
C)Foreign Threat Prevention procedures
D)Strict Security standards
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
29
In Cybersecurity terminology,a vulnerability is defined as ________:

A)A weakness that threatens the confidentiality,integrity,or availability of data.
B)Something or someone that can damage,disrupt,or destroy an asset.
C)Estimated cost,loss,or damage that can result from an exploit.
D)Tools or techniques that take compromise a network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
30
When sending sensitive email,James uses a program that transforms data into unreadable text to protect it from being understood by unauthorized users.James is using ________ to protect his email communications.

A)Authentication
B)Defense-in-depth
C)Encryption
D)Hashing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
31
In cybersecurity terms,the function of a password together with a username is to __________ a user's identity to verify that the person has the right to access a computer or network.

A)Record
B)Authenticate
C)Substantiate
D)Validate
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
32
Access to top secret or highly secure networks associated with Homeland Security or national defense use authentication methods based on a biological feature,such as a fingerprint or retinal scan to identify a person.These methods are called _____________.

A)Bio-Engineering
B)Physical security
C)Biometrics
D)Human factors
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
33
LulzSec and Anonymous are examples of ________ that have claimed responsibility for high profile attacks designed to make a political statement,embarrass an organization or government,or to gain publicity.

A)Hacktivists
B)Hostile government agents
C)Industrial spies
D)Cyber terrorists
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
34
Organizations in the _________ industries are more heavily regulated than most and are required to implement stringent measures to protect data.

A)Banking and finance,entertainment and technology
B)Technology,banking and finance,and education
C)Energy,health care,and banking and finance
D)Healthcare,technology and defense
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
35
Most organizations use software or hardware devices to control access to their private networks from the Internet by analyzing incoming and outgoing data packets.These devices are called ___________.

A)Antimalware
B)Firewalls
C)Intrusion detection systems
D)Middleware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
36
U.S.cybersecurity experts and government officials are increasingly concerned about breaches from __________ into corporate networks,either through mobile devices or by other means.

A)Domestic terrorists
B)Amateur hackers
C)Organized crime syndicates based in the United States
D)Other countries
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
37
The three key cybersecurity principles are:

A)Data protection,equipment protection,reputation protection
B)Confidentiality,integrity,availability
C)Anticipate,defend,counter-attack
D)Identify,assess risk,take action
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
38
In Cybersecurity terminology,a risk is defined as ________:

A)A weakness that threatens the confidentiality,integrity,or availability of data.
B)Something or someone that can damage,disrupt,or destroy an asset.
C)Estimated cost,loss,or damage that can result from an exploit.
D)The probability of a threat exploiting a vulnerability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
39
The ability of an IS to continue to operate when a failure occurs,but usually for a limited time or at a reduced level is referred to as __________.

A)Fault tolerance
B)Hot site ready
C)Cold site ready
D)System override
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
40
Chris is a network manager for a large company.She receives daily updates about various malware and then assesses how to best protect her organization's network from attack.In cybersecurity terminology,she is involved in __________.

A)Identifying exposure
B)Risk management
C)A security audit
D)Encryption defenses
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
41
.The IT security defense-in-depth model starts with ________.

A)Senior management commitment and support
B)IT security procedures and enforcement
C)Hardware and software selection
D)Acceptable use policies and IT security training
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
42
__________ is the elapsed time between when vulnerability is discovered and when it is exploited and has shrunk from months to __________.

A)Time-to-exploitation;days
B)Time-to-exploitation;minutes
C)Denial of service;days
D)Denial of service;seconds
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
43
Storm worm,which is spread via spam,is a ________ agent embedded inside over 25 million computers.Storm's combined power has been compared to the processing power of ________.

A)botnet;a supercomputer
B)spyware;a DDoS attack
C)vector;zombies
D)spear phishing;a server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
44
In the United States,the Sarbanes-Oxley Act (SOX),Gramm-Leach-Bliley Act (GLB),Federal Information Security Management Act (FISMA),and USA Patriot Act all require businesses to __________________________.

A)Report security breaches via media sources to inform the public
B)Backup sensitive data to offsite locations
C)Protect personally identifiable information
D)Inform the public about network failures in a timely manner
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
45
Which of the following statements about malware is false?

A)Technically,malware is a computer program or code that can infect anything attached to the Internet and is able to process the code.
B)Setting an e-mail client,such as Microsoft Outlook or Gmail,to allow scripting blocks malware.
C)RATS create an unprotected backdoor into a system through which a hacker can remotely control that system.
D)The payload carries out the purpose of the malware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
46
Intrusion Detection Systems (IDS)are designed to monitor network traffic and identify threats that have breached the networks' initial defenses.IDS identify of the following except:

A)An attacker who is using the identity or credentials of a legitimate user to gain access to an IS,device,or network.
B)A legitimate user who performs actions he is not authorized to do.
C)A user who tries to disguise or cover up his actions by deleting audit files or system logs.
D)Employees who use computing or network resources inefficiently.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
47
Sometimes system failures and data or information loss can result from reasons other than an intentional attempt to breach security.Unintentional threats are all of the following except ___________.

A)Political/civic unrest
B)Human errors
C)Environmental hazards
D)Computer systems failures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
48
Cybersecurity is ___________.

A)an ongoing unending process
B)a problem that is solved with hardware or software
C)defined in the AUP that is enforced periodically
D)primarily the responsibility of the IT and legal departments
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
49
.The IT security defense-in-depth model ends with ________.

A)Senior management commitment and support
B)IT security procedures and enforcement
C)Hardware and software selection
D)Acceptable use policies and IT security training
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
50
Most APT attacks are launched through ________.

A)Data tampering
B)Worms
C)Phishing
D)Vectors
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
51
Facebook,YouTube,Twitter,LinkedIn,and other social networks are making IT security dangers worse.Why?

A)Users invite in and build relationships with others.Cybercriminals hack into these trusted relationships using stolen log-in credentials.
B)E-mail viruses and malware have been increasing for years even though e-mail security has improved.
C)Communication has shifted from social networks to smartphones.
D)Web filtering,user education,and strict policies cannot help prevent IT security dangers on Facebook and other social networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
52
Most information security incidents will occur because of _________.

A)Increases in hacker skills and capabilities
B)Poorly designed network protection software
C)Increasing sophistication of computer viruses and worms
D)Users who do not follow secure computing practices and procedures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
53
Samuel received an email that looked like it came from his bank.The email told him to click a link that opened an official looking Webpage where he was asked to enter his account information.But when Samuel examined the URL,he noticed it was a strange address he did not recognize.Most likely,someone was attempting to steal Samuel's confidential information using a technique called __________.

A)Botnets
B)Phishing
C)Spoofing
D)Click hijacking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
54
.________ is the supervision,monitoring,and control of an organization's IT assets.

A)IT governance
B)Internal control
C)PCI DSS
D)FISMA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
55
While security threats from e-mail viruses and malware have been declining for years as e-mail security has improved,threats from __________ have increased considerably in recent years.

A)Software errors
B)Malicious employees
C)Social networks and cloud computing
D)Vendor sabotage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
56
The purpose of the PCI DSS is to improve customers' trust in e-commerce,especially when it comes to online payments,and to increase the Web security of online merchants.

A)IT governance
B)Internal control
C)PCI DSS
D)FISMA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
57
Which of the following is not a characteristic of money laundering and terrorist financing?

A)Transnational organized crime groups use money laundering to fund their operations,which creates international and national security threats.
B)Cybercrime is safer and easier than selling drugs,dealing in black market diamonds,or robbing banks.
C)Funds used to finance terrorist operations are easy to track,which provides evidence to identify and locate leaders of terrorist organizations and cells.
D)Online gambling offers easy fronts for international money-laundering operations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
58
The principle of ________ acknowledges that the cost of information security needs to be balanced with its benefits.It is the basic cost-benefit principle with which you are familiar.

A)accounting
B)economic use of resources
C)legality
D)COBIT
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
59
The director of the Federal Trade Commission (FTC)bureau of consumer protection warned that the agency would bring enforcement action against small businesses that ________

A)failed to inform the public about network failures in a timely manner
B)failed to transmit sensitive data
C)did not report security breaches to law enforcement
D)lacked adequate policies and procedures to protect consumer data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
60
When new vulnerabilities are found in operating systems,applications,or wired and wireless networks,vendors of those products release __________ or __________ to fix the vulnerabilities.

A)Patches;service packs
B)Patches;downloads
C)Firewalls;spyware
D)Service packs;firewalls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
61
A defense strategy requires several controls.___________ protect computer facilities and resources such as computers,data centers,software,manuals,and networks.

A)Application controls
B)Physical controls
C)General controls
D)Authentication controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
62
The _________ is an exercise that determines the impact of losing the support or availability of a resource.

A)Business impact analysis (BIA)
B)Vulnerability audit
C)Asset valuation audit
D)Computing Cost/Benefit (CCB)audit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
63
The single-most effective fraud prevention tactic is making employees know that ________.

A)fraudsters will be fired
B)fraudsters will be forced to repay what they stole plus interest
C)fraud could destroy the company and jobs.
D)fraud will be detected by IT monitoring systems and punished by the legal system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
64
Business operations are controlled by apps,systems,and networks that are so interconnected that anyone's ________ is an entry point for attacks.

A)mobile device
B)botnet
C)BYOD
D)firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
65
________ is the most cost-effective approach to fraud.

A)Detection
B)Lawsuits
C)Prevention
D)Prosecution
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
66
When it comes to defending against employee fraud,regulators look favorably on companies that can demonstrate good __________ and best practices in operational risk management.

A)Corporate governance
B)Access to legal counsel
C)Relationships with security vendors
D)Awareness of industry standards
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
67
People who have their social security or credit card numbers stolen and used by thieves are frequently victims of ___________________.

A)Insider fraud
B)Identity theft
C)Occupational corruption
D)Document sabotage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
68
Crime can be divided into two categories depending on the tactics used to carry out the crime: ________.

A)Fraud and felonies
B)Occupational and opportunistic
C)Lethal and misdemeanors
D)violent and nonviolent
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
69
__________ are essential to the prevention and detection of occupation frauds

A)Anti-malware and firewalls
B)Internal audits and internal controls
C)Encryption and IDS
D)AUPs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
70
___________ is a term referring to a variety of criminal behaviors perpetrated by an organization's own employees or contractors.

A)Managerial corruption
B)Insider or internal fraud
C)Corporate fraud
D)Intentional fraud
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
71
A defense strategy requires several controls._________are established to protect the system regardless of the specific application.

A)Application controls
B)Physical controls
C)General controls
D)Authentication controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
72
When it comes to fraud committed by an organization's employees,the single most effective fraud prevention technique is _______.

A)Holding managers responsible for the actions of their employees
B)Peer monitoring (employees monitor each other)
C)Creating the perception that fraud will be detected and punished
D)A clearly written employee policy manual that explains unacceptable behaviors
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
73
Internal fraud prevention and detection measures are based on __________ and __________.

A)A detailed recovery plan;containment,including a fault-tolerant system
B)Perimeter defense technologies,such as e-mail scanners;human resource procedures,such as recruitment screening
C)General controls;application controls
D)Physical controls,including authorization;authentication systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
74
Voice and fingerprint _______ can significantly improve the security of physical devices and provide stronger authentication for remote access or cloud services.

A)cryptography
B)biometrics
C)encryption
D)visualization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
75
Social networks and cloud computing have increased vulnerabilities in all of the following ways except ________.

A)by providing a single point of failure and attack for organized criminal networks
B)In Twitter and Facebook,users invite in and build relationships with others.Cybercriminals hack into these trusted relationships using stolen logins.
C)Twitter's use of service packs and patches have not been effective.
D)These networks and services increase exposure to risk because of the time-to-exploitation of today's sophisticated spyware and mobile viruses
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
76
The Payment Card Industry Data Security Standard (PCI DSS)created by Visa,MasterCard,American Express,and Discover is a __________.

A)Set of standards required by U.S.and international law for protecting credit card transaction data.
B)Set of industry standards required for all online merchants that store,process,or transmit cardholder data.
C)Set of voluntary security guidelines for retailers who accept Visa,MasterCard,American Express,and Discover credit cards.
D)Set of regulations (that vary from state to state,and country to country)that apply to credit card companies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
77
The cybersecurity defense strategy and controls that should be used depend on __________.

A)The source of the threat
B)Industry regulations regarding protection of sensitive data
C)What needs to be protected and the cost-benefit analysis
D)The available IT budget
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
78
Which of the following is not a type of administrative control for information assurance and risk management?

A)Fostering company loyalty
B)Immediately revoking access privileges of dismissed,resigned,or transferred employees
C)Instituting separation of duties by dividing sensitive computer duties among as many employees as economically feasible
D)Performing authorization and authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
79
Detecting internal fraud has become sophisticated.Audit trails from key systems and personnel records are stored in data warehouses and subjected to __________ where things like excessive hours worked,unusual transactions,copying of huge amounts of data and other unusual patterns of behavior are identified.

A)Security audits
B)Pattern analysis
C)Behavior recognition scans
D)Anomaly detection analysis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
80
Physical security includes several controls.Which of the following is not a type of physical control?

A)Security bonds or malfeasance insurance for key employees
B)Emergency power shutoff and backup batteries
C)Shielding against electromagnetic fields
D)Properly designed and maintained air-conditioning systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 150 في هذه المجموعة.