Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Information Technology for Management
Quiz 5: Cybersecurity and Risk Management Technology
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 121
Short Answer
Indicators of fraud are called __________.
Question 122
Short Answer
In Cybersecurity terminology,a(n)__________is defined as something or someone that may result in harm to an asset.
Question 123
Short Answer
When it comes to reducing employee fraud,regulators look favorably on companies that can demonstrate good __________ and best practice operational risk management.
Question 124
Short Answer
In the United States,the Sarbanes-Oxley Act (SOX)requires businesses to protect PII,which stands for _______________.
Question 125
Short Answer
In Cybersecurity terminology,a(n)____________ is defined as the estimated cost,loss,or damage that can result from an exploited vulnerability.
Question 126
Short Answer
Access to top secret or highly secure networks associated with Homeland Security or national defense often use authentication methods based on a biological feature,such as a fingerprint or retina to identify a person.These methods are called ____________.
Question 127
Short Answer
_____________detection identifies things like excessive hours worked,unusual transactions,copying of huge amounts of data and other unusual patterns of behavior,and uses them to alert IT managers to the possibility of internal fraud.
Question 128
Short Answer
______________ are designed to monitor network traffic and identify threats that may have breached the networks initial defenses.
Question 129
Short Answer
A stealth network attack in which an unauthorized person gains access to a network and remains undetected for a long time is referred to as a(n)___________ attack.
Question 130
Short Answer
In Cybersecurity terminology,a(n)_____________ is defined as the probability of a threat exploiting a vulnerability and the resulting cost.
Question 131
Short Answer
In Cybersecurity terminology,a(n)__________ is defined as a weakness that threatens the confidentiality,integrity,or availability of an asset.
Question 132
Short Answer
In Cybersecurity terminology,a(n)__________ is defined as a tool or technique that takes advantage of a vulnerability.
Question 133
Short Answer
Malware infected computers can be organized into networks called ________.
Question 134
Short Answer
_______ are software programs that users download and install to fix a vulnerability.
Question 135
Short Answer
_________________ is a type of attack where a web site or network is bombarded with traffic to make it crash.
Question 136
Short Answer
_________ is a term referring to a variety of deceptive behaviors perpetrated by an organization's own employees or contractors.
Question 137
Short Answer
_____________ is the elapsed time between when vulnerability in a software app or system is discovered and when it's exploited.
Question 138
Short Answer
When sending sensitive email,James uses a program that transforms data into scrambled code to protect it from being understood by unauthorized users.James is using ___________ to protect his email communications.