Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Information Technology for Management
Quiz 5: Cybersecurity and Risk Management Technology
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 41
Multiple Choice
Storm worm,which is spread via spam,is a ________ agent embedded inside over 25 million computers.Storm's combined power has been compared to the processing power of ________.
Question 42
Multiple Choice
The purpose of the ________ is to improve customers' trust in e-commerce,especially when it comes to online payments,and to increase the Web security of online merchants.
Question 43
Multiple Choice
The IT security defense-in-depth model ends with ________.
Question 44
Multiple Choice
________ is the supervision,monitoring,and control of an organization's IT assets.
Question 45
Multiple Choice
The principle of ________ acknowledges that the cost of information security needs to be balanced with its benefits.It is the basic cost-benefit principle with which you are familiar.
Question 46
Multiple Choice
Samuel received an email that looked like it came from his bank.The email told him to click a link that opened an official looking Webpage where he was asked to enter his account information.But when Samuel examined the URL,he noticed it was a strange address he did not recognize.Most likely,someone was attempting to steal Samuel's confidential information using a technique called __________.
Question 47
Multiple Choice
Intrusion Detection Systems (IDS) are designed to monitor network traffic and identify threats that have breached the networks' initial defenses.IDS identify all of the following except:
Question 48
Multiple Choice
Facebook,YouTube,Twitter,LinkedIn,and other social networks are making IT security dangers worse.Why?
Question 49
Multiple Choice
Cybersecurity is ___________.
Question 50
Multiple Choice
In cybersecurity terms,the function of a password together with a username is to __________ a user's identity to verify that the person has the right to access a computer or network.
Question 51
Multiple Choice
Sometimes system failures and data or information loss can result from reasons other than an intentional attempt to breach security.Unintentional threats are all of the following except ___________.