Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Information Technology for Management
Quiz 5: Cybersecurity and Risk Management Technology
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 81
True/False
Powerful IT security systems are needed to defend against what appears to be authorized access to a network or application.
Question 82
Multiple Choice
All of the following describe The Sarbanes-Oxley Act except:
Question 83
True/False
Hacking is an industry with its own way of operating,a workforce,and support services,such as contract hackers.
Question 84
True/False
The smart strategy is to invest more to protect the company's most valuable assets rather than try to protect all assets equally.
Question 85
True/False
Exploits are gaps,holes,weaknesses,or flaws in corporate networks,IT security defenses,user training,policy enforcement,data storage,software,operating systems,apps,or mobile devices that expose an organization to intrusions or other attacks.
Question 86
Multiple Choice
The internal control environment is the work atmosphere that a company sets for its employees and is designed to achieve all of the following except _________.
Question 87
True/False
It is often easy to get users to infect their corporate network or mobiles by tricking them into downloading and installing malicious apps or backdoors.
Question 88
True/False
Vulnerabilities exist in networks,OSs,apps,databases,mobile devices,and cloud environments.These vulnerabilities are attack vectors for malware,hackers,hactivists,and organized crime.
Question 89
True/False
When an employee's device is lost,the company can suffer a data breach if the device is not encrypted.
Question 90
True/False
The main cause of a data breach is malware,but the reason hacking is so successful is negligence-management not doing enough to defend against cyberthreats.
Question 91
True/False
Most data breaches go unreported,according to cybersecurity experts,because corporate victims fear that disclosure would damage their stock price,or because they never knew they were hacked in the first place