Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Information Technology for Management
Quiz 5: Cybersecurity and Risk Management
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 121
Short Answer
One source of cybersecurity threats today are _____________,who hack for their own causes and attempt to gain media attention.
Question 122
Short Answer
_____________ is the elapsed time between when vulnerability in a software app or system is discovered and when it's exploited.
Question 123
Short Answer
Malware infected computers can be organized into networks called ________.
Question 124
Short Answer
A stealth network attack in which an unauthorized person gains access to a network and remains undetected for a long time is referred to as a(n)___________ attack.
Question 125
Short Answer
When sending sensitive email,James uses a program that transforms data into scrambled code to protect it from being understood by unauthorized users.James is using ___________ to protect his email communications.
Question 126
Short Answer
In Cybersecurity terminology,a(n)__________ is defined as a weakness that threatens the confidentiality,integrity,or availability of an asset.
Question 127
Short Answer
_________________ is a type of attack where a web site or network is bombarded with traffic to make it crash.
Question 128
Short Answer
_________ is a term referring to a variety of deceptive behaviors perpetrated by an organization's own employees or contractors.
Question 129
Short Answer
In Cybersecurity terminology,a(n)_____________ is defined as the probability of a threat exploiting a vulnerability
Question 130
Short Answer
The practice of people bringing and using their own mobile devices for work purposes is called _________.
Question 131
Short Answer
In Cybersecurity terminology,a(n)__________ is defined as a tool or technique that takes advantage of a vulnerability.
Question 132
Short Answer
Access to top secret or highly secure networks associated with Homeland Security or national defense often use authentication methods based on a biological feature,such as a fingerprint or retina to identify a person.These methods are called ____________.
Question 133
Short Answer
In Cybersecurity terminology,a(n)____________ is defined as the estimated cost,loss,or damage that can result from an exploited vulnerability.
Question 134
Short Answer
In the United States,the Sarbanes-Oxley Act (SOX),Gramm-Leach-Bliley Act (GLB),Federal Information Security Management Act (FISMA),and USA Patriot Act all require businesses to protect PII,which stands for _______________.