Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Information Technology
Quiz 5: Cybersecurity, Compliance, and Business Continuity
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 261
Short Answer
People who have their social security or credit card numbers stolen and used by thieves are frequently victims of _____________________.
Question 262
Short Answer
The _________________________ is an exercise that determines the impact of losing the support or availability of a resource.
Question 263
Short Answer
In cybersecurity terms, the function of a password together with a username is to _____________ a user's identity to verify that the person has the right to access a computer or network.
Question 264
Short Answer
Organizations that use the ____________________ model of network security develop strategic layers of protection against security breaches.
Question 265
Short Answer
The ability of an IS to continue to operate when a failure occurs, but usually for a limited time or at a reduced level is referred to as ____________________.
Question 266
Short Answer
Most information security incidents will occur because of users who do not follow secure computing _______________________.
Question 267
Short Answer
The supervision, monitoring, and control of the organization's IT assets is called __________________.
Question 268
Short Answer
IT professionals work hard to protect key characteristics of an asset from security breaches. One of these characteristics is ____________, or the property that data is accessible and modifiable when needed by those authorized to do so.
Question 269
Short Answer
IT professionals work hard to protect key characteristics of an asset from security breaches. One of these characteristics is ____________________, or the avoidance of unauthorized disclosure of information or data.
Question 270
Short Answer
Theft of data, inappropriate use of data e.g., manipulating inputs) and malicious damage to computer resources are all considered ________________ security threats.
Question 271
Short Answer
When it comes to reducing employee fraud, regulators look favorably on companies that can demonstrate good ______________________ and best practice operational risk management.
Question 272
Short Answer
______________________ identifies things like excessive hours worked, unusual transactions, copying of huge amounts of data and other unusual patterns of behavior, and uses them to alert IT managers to the possibility of internal fraud.
Question 273
Short Answer
Effective organizations develop an) _________________________ that informs users of their responsibilities regarding the use of computing resources and information, including acceptable and unacceptable actions, and consequences for noncompliance.
Question 274
Short Answer
While security threats from e-mail viruses and ______________ have been declining for years as e-mail security has improved, threats from social networks and cloud computing have increased considerably in recent years.