Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Information Technology
Quiz 5: Cybersecurity, Compliance, and Business Continuity
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 221
True/False
According to your textbook, one ethical issue that can arise from cybersecurity practices is related to the principle of "respondeat superior" which holds employers liable for the misconduct of their employees that occurs within the scope of their employment. However, because employees carry mobile devices that connect 24/7 to the work network, when does that liability begin and end?
Question 222
True/False
When conducting a risk management analysis, each of the following factors is used to calculate expected loss: 1) probability of an attack, 2) probability of attack being successful and 3) estimated loss that will occur if attack is successful.
Question 223
Short Answer
The increasing practice of people bringing and using their own mobile devices in the workplace is called ______________.
Question 224
Short Answer
The fact that many smart phones and other personal mobile devices do not have anti-malware or encryption apps can create ________________ problems for organizations.
Question 225
Short Answer
Organizations are subject to national and international regulations and standards that specify how data can or cannot be collected and stored, as well as how it must be made available in the event of ____________________.
Question 226
Short Answer
Controls placed on employee-owned devices can infringe on ____________. For instance, organizations could know what sites were visited or movies were watched, what was done on sick days, what texts were sent/received, and all social media activities during work hours and off-hours.
Question 227
Short Answer
Forrester Research, Inc. estimates that a majority of companies had begun allowing employees to use their own ________________ for some aspects of their work by 2012.
Question 228
Short Answer
For many organizations, ____________ technologies have worsened their exposure to security risks because they cannot enforce or verify their ___________ providers' cybersecurity policies. Same word in both spaces)