Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Information Technology
Quiz 5: Cybersecurity, Compliance, and Business Continuity
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
IT professionals work hard to protect key characteristics of an asset from security breaches. One of these characteristics is _________________, or the property that data is accessible and modifiable when needed by those authorized to do so.
Question 22
Multiple Choice
In Cybersecurity terminology, a threat is defined as:
Question 23
Multiple Choice
IT professionals work hard to protect key characteristics of an asset from security breaches. One of these characteristics is _________________, or the property that data or files have not been altered in an unauthorized way.
Question 24
Multiple Choice
IT professionals work hard to protect key characteristics of an asset from security breaches. One of these characteristics is _________________, or the avoidance of unauthorized disclosure of information or data.
Question 25
Multiple Choice
In Cybersecurity terminology, an exploit is defined as:
Question 26
Multiple Choice
The three key principles of cybersecurity are:
Question 27
Multiple Choice
Viruses, worms, Trojan horses, spyware, and any other type of disruptive, destructive, or unwanted programs are examples of ___________________.
Question 28
Multiple Choice
In Cybersecurity terminology, a risk is defined as:
Question 29
Multiple Choice
The ability of an IS to continue to operate when a failure occurs, but usually for a limited time or at a reduced level is referred to as _______________.
Question 30
Multiple Choice
Some government and corporate officials concerned about security threats from abroad do not bring their own cell phone or laptop when traveling overseas. Instead, they bring loaner devices and follow a strict regimen of security procedures including not connecting to their US network while out of the country. These procedures are referred to as ____________________.
Question 31
Multiple Choice
Chris Morrisey is a network manager for a large company. She receives daily updates about various worms, viruses and other malicious software found on the Internet including an assessment of how dangerous each of these are so that she can figure out how best to protect her organization's network. The information in her report is about __________________.
Question 32
Multiple Choice
Chris Morrisey is a network manager for a large company. She receives daily updates about various worms, viruses and other malicious software found on the Internet and then assesses how to best protect her organization's network from possible attack. In cybersecurity terminology, she is involved in ________________________.
Question 33
Multiple Choice
Access to top secret or highly secure networks associated with Homeland Security or national defense often use authentication methods based on a biological feature, such as a fingerprint or retina to identify a person. These methods are called ____________________.
Question 34
Multiple Choice
In Cybersecurity terminology, a vulnerability is defined as:
Question 35
Multiple Choice
Intrusion Detection Systems IDS) are designed to monitor network traffic and identify threats that may have breached the networks initial defenses. These include all of the following except:
Question 36
Multiple Choice
U.S. cybersecurity experts and government officials are increasingly concerned about breaches from ______________________ into corporate networks, either through mobile devices or by other means.