Computer Incidents and Productivity

Computer Incidents and Productivity

Created by
@SuperbSilicon

Questions and Answers

What is a major reason why many problems arise in business environments?

Not verifying users' identities or authorization

What is a consequence of the shift from client-server to peer-to-peer environments?

Increased system complexity

What do companies need to do to keep up with the pace of technological change?

Perform an ongoing assessment of new security risks

What is a common problem faced by help desks in business environments?

<p>Sharing of login IDs and passwords</p> Signup and view all the answers

What is a major factor contributing to the prevalence of computer incidents?

<p>Higher computer user expectations</p> Signup and view all the answers

What is a characteristic of modern business environments?

<p>Moving towards e-commerce</p> Signup and view all the answers

What is the primary purpose of Step 2 in the security risk assessment process?

<p>To identify the loss events or risks</p> Signup and view all the answers

What is the primary goal of Step 5 in the security risk assessment process?

<p>To mitigate threats and reduce their impact</p> Signup and view all the answers

Why do organizations typically focus on threats with a high frequency and impact?

<p>Because they have a high frequency and impact</p> Signup and view all the answers

What is the primary purpose of assessing the frequency of events in Step 3?

<p>To determine the likelihood of each potential threat</p> Signup and view all the answers

What is the consequence of a threat that has a high impact on the organization?

<p>It could keep the organization from carrying out its mission for a lengthy period of time</p> Signup and view all the answers

What is an example of how to mitigate a threat, as mentioned in Step 5?

<p>Installing virus protection on all computers</p> Signup and view all the answers

What is the primary goal of implementing a multilayer process for managing security vulnerabilities?

<p>To identify and address security vulnerabilities</p> Signup and view all the answers

Which type of attack is characterized by a flood of traffic to a website or network in an attempt to overwhelm it?

<p>Distributed denial-of-service attack</p> Signup and view all the answers

What is the term for a person who uses their legitimate access to a computer system to cause harm or commit fraud?

<p>Malicious insider</p> Signup and view all the answers

Which of the following is a type of malware that disguises itself as a legitimate program?

<p>Trojan horse</p> Signup and view all the answers

What is the role of computer forensics in fighting computer crime?

<p>To analyze evidence in a court of law</p> Signup and view all the answers

Who is responsible for leading the effort to implement security measures in an organization?

<p>IT department</p> Signup and view all the answers

What is the primary function of an Intrusion Detection System (IDS)?

<p>To monitor system and network resources and notify security personnel of potential threats</p> Signup and view all the answers

What should be done to prevent attacks by malicious insiders?

<p>Delete computer accounts, login IDs, and passwords of departing employees and contractors</p> Signup and view all the answers

What is the main goal of the Department of Homeland Security (DHS)?

<p>To secure critical infrastructure and information systems</p> Signup and view all the answers

What should be prioritized when fixing vulnerabilities?

<p>High-impact vulnerabilities first</p> Signup and view all the answers

What is the purpose of an antivirus software?

<p>To scan for specific virus signatures</p> Signup and view all the answers

What is a security audit intended to evaluate?

<p>Whether an organization has a well-considered security policy in place</p> Signup and view all the answers

What is a major security concern for companies?

<p>Malicious insiders</p> Signup and view all the answers

What type of fraud involves adding extra money to an approved payment?

<p>Collusion fraud</p> Signup and view all the answers

What is a common way that frauds are discovered?

<p>Chance discovery</p> Signup and view all the answers

What is an example of a type of fraud involving bidding processes?

<p>Bid rigging</p> Signup and view all the answers

What is a consequence of collusion between an employee and an outsider?

<p>All of the above</p> Signup and view all the answers

What is a type of fraud that involves stealing company assets?

<p>Theft of assets</p> Signup and view all the answers

Use Quizgecko on...
Browser
Browser