IT Risk Management: Natural Disasters and Human Error
18 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of espionage is illegal?

  • Industrial espionage (correct)
  • Competitive intelligence
  • Shoulder surfing
  • Legal surveillance
  • Where can instances of shoulder surfing occur?

  • Only in computer terminals and desks
  • At ATM machines and public phones
  • Only on bus and subway
  • Anywhere a person accesses confidential information (correct)
  • What is the primary goal of hackers?

  • To gain access to information illegally (correct)
  • To solve mysteries and save the day
  • To glamorize themselves in fictional accounts
  • To create computer software
  • What type of threat is considered among the most dangerous?

    <p>Forces of Nature</p> Signup and view all the answers

    What is the difference between competitive intelligence and industrial espionage?

    <p>Competitive intelligence is legal, while industrial espionage is illegal</p> Signup and view all the answers

    What is the primary method used by hackers to gain access to information?

    <p>Using skill, guile, or fraud to bypass controls</p> Signup and view all the answers

    What type of event can disrupt the storage, transmission, and use of information?

    <p>Natural disasters</p> Signup and view all the answers

    What is the primary goal of an attacker in information extortion?

    <p>To demand compensation for the return of stolen data</p> Signup and view all the answers

    What is a common consequence of employee mistakes?

    <p>Revelation of classified data</p> Signup and view all the answers

    What type of threat can make an organization more vulnerable to losses when other threats lead to attacks?

    <p>Missing or inadequate policy planning</p> Signup and view all the answers

    What is a common type of data breach?

    <p>Credit card number theft</p> Signup and view all the answers

    What is a major threat to an organization's data?

    <p>Employee mistakes</p> Signup and view all the answers

    What is a potential security risk associated with shortcuts left by programmers in software codes?

    <p>Trap doors</p> Signup and view all the answers

    What is a consequence of using outdated infrastructure in technology?

    <p>Loss of data integrity</p> Signup and view all the answers

    What is a characteristic of intermittent errors in equipment?

    <p>They only periodically manifest themselves</p> Signup and view all the answers

    Why is it essential for management to analyze the technology currently in use?

    <p>To prevent technology from becoming obsolete</p> Signup and view all the answers

    What is a consequence of not resolving all bugs in software codes before publication?

    <p>New bugs are revealed</p> Signup and view all the answers

    What should management do when technology becomes obsolete?

    <p>Take immediate action</p> Signup and view all the answers

    More Like This

    Incident Response Plan Essentials
    24 questions
    Continuidad y Cumplimiento en TI
    10 questions
    IT Risk Management Class #6
    37 questions
    IT Risk Management Class #7
    37 questions
    Use Quizgecko on...
    Browser
    Browser