Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Information Technology
Quiz 5: Cybersecurity, Compliance, and Business Continuity
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 101
True/False
Since mobile devices are smaller and less complex than high powered PCs, managing employee-owned mobile devices is relatively simple.
Question 102
True/False
Social engineering tactics are used by hackers and corporate spies to trick people into revealing login information or access codes.
Question 103
True/False
With the number of mobile apps hitting 1.3 million in mid-2012-compared to only 75,000 apps for PCs--managing employee-owned devices is more complex and expensive.
Question 104
True/False
One source of cybersecurity threats today are hacktivists, hacker-activists or hacking for a cause) who breach networks in an attempt to gain media attention.
Question 105
True/False
Your textbook lists 3 challenges associated with managing employee owned mobile devices used in the work place: 1) Increased costs of managing employee owned devices, 2) Employees using the devices for non-work related activity e.g. personal social media, texting, personal phone calls) and 3) Morale issues related to the fact that some employees will have better, more expensive devices than others.
Question 106
True/False
One way that hackers and corporate spies trick people into revealing login information or access codes is pretexting; use of an incentive to get a user to perform an insecure action. A common application of this practice involves offering a free app or video for clicking a link in a text message and voting for best video game. Clicking the link downloads malware.
Question 107
True/False
Organizations are subject to national and international regulations and standards that specify how data can or cannot be collected and stored, as well as how it must be made available in the event of an audit or legal action.
Question 108
True/False
A stealth network attack in which an unauthorized person gains access to a network and remains undetected for a long time is referred to as a Silent Sabotage attack.
Question 109
True/False
One way that hackers and corporate spies trick people into revealing login information or access codes is pretexting; using a story that convinces someone that it is okay to reveal secret information.
Question 110
True/False
One way that hackers and corporate spies trick people into revealing login information or access codes is baiting; use of an incentive to get a user to perform an insecure action. A common application of this practice involves offering a free app or video for clicking a link in a text message and voting for best video game. Clicking the link downloads malware.
Question 111
True/False
For many organizations, cloud technologies have worsened their exposure to security risks because they cannot enforce or verify their cloud providers' cybersecurity policies.
Question 112
True/False
Tactics used by hackers and corporate spies to trick people into revealing login information or access codes are referred to as "password crashing".
Question 113
True/False
Cyber threats will continue to emerge, evolve, and worsen over the next 10 years and beyond.
Question 114
True/False
A stealth network attack in which an unauthorized person gains access to a network and remains undetected for a long time is referred to as an Advanced Persistent Threat APT) attack.
Question 115
True/False
To reduce the threat of security breaches related to employee owned devices, data and ISs need to be protected from unauthorized access, including when an employee's device is lost or stolen, or an employee leaves the company.
Question 116
True/False
Cloud computing has simplified cybersecurity since most cloud based networks are more secure than private networks maintained by individual organizations.
Question 117
True/False
Critical infrastructure is defined as "systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters."
Question 118
True/False
Controls placed on employee-owned devices can infringe on personal privacy. For instance, organizations could know what sites were visited or movies were watched, what was done on sick days, what texts were sent/received, and all social media activities during work hours and off-hours.
Question 119
True/False
Cost savings associated with allowing employees to use their own mobile devices almost always outweigh any increased IT costs associated with IT personnel needed to manage new and existing mobile devices.