Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Information Technology
Quiz 5: Cybersecurity, Compliance, and Business Continuity
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 161
True/False
Most information security incidents will occur because of users who do not follow secure computing practices and procedures.
Question 162
True/False
Time-to-exploitation is the elapsed time between when vulnerability in a software app or system is discovered and when it's exploited.
Question 163
True/False
When new vulnerabilities are found in operating systems, applications, or wired and wireless networks, vendors of those products release firewalls or downloads to fix the vulnerabilities.
Question 164
True/False
The typical name for a company's policy that informs users of their responsibilities regarding the use of computing resources and information, including acceptable and unacceptable actions, and consequences for noncompliance is the Terms of Service TOS) agreement.
Question 165
True/False
The "Payment Card Industry Data Security Standard PCI DSS)" created by Visa, MasterCard, American Express, and Discover is a set of voluntary security guidelines for retailers who accept Visa, MasterCard, American Express, and Discover credit cards.
Question 166
True/False
Intrusion Detection Systems IDS) are designed to detect and protect a network primarily from external threats.
Question 167
True/False
While security threats from e-mail viruses and malware have been declining for years as e-mail security has improved, threats from social networks and cloud computing have increased considerably in recent years.
Question 168
True/False
The director of the Federal Trade Commission FTC) bureau of consumer protection warned that the agency would bring enforcement action against small businesses that failed to transmit sensitive data.