Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Information Technology
Quiz 5: Cybersecurity, Compliance, and Business Continuity
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 101
True/False
Since mobile devices are smaller and less complex than high powered PCs, managing employee-owned mobile devices is relatively simple.
Question 102
True/False
Social engineering tactics are used by hackers and corporate spies to trick people into revealing login information or access codes.
Question 103
True/False
With the number of mobile apps hitting 1.3 million in mid-2012-compared to only 75,000 apps for PCs--managing employee-owned devices is more complex and expensive.
Question 104
True/False
One source of cybersecurity threats today are hacktivists, hacker-activists or hacking for a cause) who breach networks in an attempt to gain media attention.
Question 105
True/False
Your textbook lists 3 challenges associated with managing employee owned mobile devices used in the work place: 1) Increased costs of managing employee owned devices, 2) Employees using the devices for non-work related activity e.g. personal social media, texting, personal phone calls) and 3) Morale issues related to the fact that some employees will have better, more expensive devices than others.
Question 106
True/False
One way that hackers and corporate spies trick people into revealing login information or access codes is pretexting; use of an incentive to get a user to perform an insecure action. A common application of this practice involves offering a free app or video for clicking a link in a text message and voting for best video game. Clicking the link downloads malware.
Question 107
True/False
Organizations are subject to national and international regulations and standards that specify how data can or cannot be collected and stored, as well as how it must be made available in the event of an audit or legal action.
Question 108
True/False
A stealth network attack in which an unauthorized person gains access to a network and remains undetected for a long time is referred to as a Silent Sabotage attack.
Question 109
True/False
One way that hackers and corporate spies trick people into revealing login information or access codes is pretexting; using a story that convinces someone that it is okay to reveal secret information.