Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Information Technology for Management
Quiz 5: Cybersecurity and Risk Management Technology
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
In Cybersecurity terminology,a vulnerability is defined as ________:
Question 22
Multiple Choice
When sending sensitive email,James uses a program that transforms data into unreadable text to protect it from being understood by unauthorized users.James is using ________ to protect his email communications.
Question 23
Multiple Choice
Most organizations use software or hardware devices to control access to their private networks from the Internet by analyzing incoming and outgoing data packets.These devices are called ___________.
Question 24
Multiple Choice
The ability of an IS to continue to operate when a failure occurs,but usually for a limited time or at a reduced level is referred to as __________.
Question 25
Multiple Choice
LulzSec and Anonymous are examples of ________ that have claimed responsibility for high profile attacks designed to make a political statement,embarrass an organization or government,or to gain publicity.