Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Information Technology
Quiz 5: Cybersecurity, Compliance, and Business Continuity
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 281
Short Answer
Information system _________________ provide an additional layer of controls or safeguards. It is considered a deterrent to criminal actions, especially for insiders.
Question 282
Short Answer
An important element in any security system is the _________________ plan, also known as the disaster recovery plan.
Question 283
Essay
To protect their wireless network, organizations should use ___________________________ to identify rogue wireless devices and detect attack attempts and successful compromises.
Question 284
Essay
Network security involves three types of defenses, which are referred to as 1) __________ _______________ layer, 2) _____________ layer, and 3) ________________layer.
Question 285
Short Answer
The cybersecurity defense strategy and controls that should be used depend on what needs to be protected and the ___________________________.
Question 286
Short Answer
A defense strategy requires several controls. ________________ controls are established to protect the system regardless of the specific application.
Question 287
Short Answer
An estimated 93% of companies that suffer a significant ______________ often go out of business within five years.
Question 288
Short Answer
A defense strategy requires several controls. _________________ controls protect computer facilities and resources such as computers, data centers, software, manuals, and networks.
Question 289
Short Answer
According to your textbook, one ethical issue that can arise from cybersecurity practices is _________________ - sometimes ethical or legal regulations require employers to monitor network users in ways that some people feel is intrusive.
Question 290
Short Answer
According to your textbook, one ethical issue that can arise from cybersecurity practices is related to the principle of "respondeat superior" which holds employers liable for the __________________________ that occurs within the scope of their employment. However, because employees carry mobile devices that connect 24/7 to the work network, when does that liability begin and end?
Question 291
Short Answer
Symptoms of fraud that can be detected by _______________ controls include all of the following: missing documents, delayed bank deposits and employees who don't take vacations or work inordinate amounts of overtime.