Filters
Question type

Study Flashcards

The recent trend indicates that CEOs lose their jobs after data breaches.In theory,this should impact the "lack of management support" factor that increases the vulnerability of organizational information resources.

A) True
B) False

Correct Answer

verifed

verified

_________ is a remote attack requiring user action.


A) DoS
B) A logic bomb
C) A Trojan horse
D) Virus

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

Dumpster diving is always theft and is always illegal.

A) True
B) False

Correct Answer

verifed

verified

You are a nice person,so you hold the door open for the person running in behind you.Since you needed to use your ID badge to open the door,the person running in behind you is tailgating.

A) True
B) False

Correct Answer

verifed

verified

The ___ of an information resource is the harm,loss,or damage that can result if a threat compromises that resource.

Correct Answer

verifed

verified

A _________ is an official document that grants the holder exclusive rights on an invention or a process for a specified period of time.


A) copyright
B) patent
C) trade secret
D) trademark

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

A ___ is the probability that a threat will impact an information resource.

Correct Answer

verifed

verified

_________ is an attack by a programmer developing a system.


A) DoS
B) A phishing attack
C) A Trojan horse
D) Virus

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Biometrics is an example of something the user _________.


A) does
B) has
C) is
D) knows

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Why are employees the biggest threats to an organization? What can you do to protect your future company's assets?

Correct Answer

verifed

verified

We tend to be carele...

View Answer

_________ merchants rarely accept electronic transactions from another country.


A) African
B) American
C) Asian
D) European

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Most countries don't accept electronic transactions from _________ because of fraud concerns.


A) Africa
B) China
C) Europe
D) the US

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Typing in your password to access a system is an example of something the user _________.


A) does
B) has
C) is
D) knows

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Which of the following was NOT used in the cyberattack on Ukraine?


A) DoS
B) Spear-phishing
C) a logic bomb
D) a SCADA attack

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

If you limit your risk by implementing controls that minimize the impact of the threat,you have implemented a risk _________ strategy.


A) acceptance
B) avoidance
C) limitation
D) transference

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

Authentication occurs after authorization.

A) True
B) False

Correct Answer

verifed

verified

A ___ is a statutory grant that provides the creators or owners of intellectual property with ownership of the property for a designated period.

Correct Answer

verifed

verified

It took the Democratic National Committee _________ to respond to the FBI's discovery of hacking on their system.


A) 1 day
B) 7 days
C) 1 month
D) 7 months

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

You lose the company's USB with your sales spreadsheets on it.This is _________ and is an _________ mistake.


A) a human error; intentional
B) a human error; unintentional
C) social engineering; intentional
D) social engineering; unintentional

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Cybercrime is typically nonviolent but lucrative.

A) True
B) False

Correct Answer

verifed

verified

Showing 101 - 120 of 169

Related Exams

Show Answer