Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Information Technology for Management
Quiz 5: Cybersecurity and Risk Management
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
In Cybersecurity terminology,an exploit is defined as ________:
Question 22
Multiple Choice
IT professionals work hard to protect key characteristics of an asset from security breaches.One of these characteristics is ________,or the avoidance of unauthorized disclosure of information or data.
Question 23
Multiple Choice
IT professionals work hard to protect key characteristics of an asset from security breaches.One of these characteristics is _________,or the property that data is accessible and modifiable when needed by those authorized to do so.
Question 24
Multiple Choice
The objectives of cybersecurity are to accomplish each of the following except _________.
Question 25
Multiple Choice
In Cybersecurity terminology,a threat is defined as ________.
Question 26
Multiple Choice
The preferred method of hackers who want to steal trade secrets and other confidential information from business organizations is ___________.
Question 27
Multiple Choice
IT professionals work hard to protect key characteristics of an asset from security breaches.One of these characteristics is ____________,or the property that data or files have not been altered in an unauthorized way.
Question 28
Multiple Choice
Government and corporate officials concerned about security threats do not bring their own cell phones or laptops when traveling overseas.Instead,they bring loaner devices and follow strict security procedures including not connecting to their domestic network while out of the country.These procedures are referred to as _________.
Question 29
Multiple Choice
In Cybersecurity terminology,a vulnerability is defined as ________:
Question 30
Multiple Choice
When sending sensitive email,James uses a program that transforms data into unreadable text to protect it from being understood by unauthorized users.James is using ________ to protect his email communications.