Questions and Answers
What is a major reason why many problems arise in business environments?
Not verifying users' identities or authorization
What is a consequence of the shift from client-server to peer-to-peer environments?
Increased system complexity
What do companies need to do to keep up with the pace of technological change?
Perform an ongoing assessment of new security risks
What is a common problem faced by help desks in business environments?
Signup and view all the answers
What is a major factor contributing to the prevalence of computer incidents?
Signup and view all the answers
What is a characteristic of modern business environments?
Signup and view all the answers
What is the primary purpose of Step 2 in the security risk assessment process?
Signup and view all the answers
What is the primary goal of Step 5 in the security risk assessment process?
Signup and view all the answers
Why do organizations typically focus on threats with a high frequency and impact?
Signup and view all the answers
What is the primary purpose of assessing the frequency of events in Step 3?
Signup and view all the answers
What is the consequence of a threat that has a high impact on the organization?
Signup and view all the answers
What is an example of how to mitigate a threat, as mentioned in Step 5?
Signup and view all the answers
What is the primary goal of implementing a multilayer process for managing security vulnerabilities?
Signup and view all the answers
Which type of attack is characterized by a flood of traffic to a website or network in an attempt to overwhelm it?
Signup and view all the answers
What is the term for a person who uses their legitimate access to a computer system to cause harm or commit fraud?
Signup and view all the answers
Which of the following is a type of malware that disguises itself as a legitimate program?
Signup and view all the answers
What is the role of computer forensics in fighting computer crime?
Signup and view all the answers
Who is responsible for leading the effort to implement security measures in an organization?
Signup and view all the answers
What is the primary function of an Intrusion Detection System (IDS)?
Signup and view all the answers
What should be done to prevent attacks by malicious insiders?
Signup and view all the answers
What is the main goal of the Department of Homeland Security (DHS)?
Signup and view all the answers
What should be prioritized when fixing vulnerabilities?
Signup and view all the answers
What is the purpose of an antivirus software?
Signup and view all the answers
What is a security audit intended to evaluate?
Signup and view all the answers
What is a major security concern for companies?
Signup and view all the answers
What type of fraud involves adding extra money to an approved payment?
Signup and view all the answers
What is a common way that frauds are discovered?
Signup and view all the answers
What is an example of a type of fraud involving bidding processes?
Signup and view all the answers
What is a consequence of collusion between an employee and an outsider?
Signup and view all the answers
What is a type of fraud that involves stealing company assets?
Signup and view all the answers