IT Risk Management: Natural Disasters and Human Error
18 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of espionage is illegal?

  • Industrial espionage (correct)
  • Competitive intelligence
  • Shoulder surfing
  • Legal surveillance

Where can instances of shoulder surfing occur?

  • Only in computer terminals and desks
  • At ATM machines and public phones
  • Only on bus and subway
  • Anywhere a person accesses confidential information (correct)

What is the primary goal of hackers?

  • To gain access to information illegally (correct)
  • To solve mysteries and save the day
  • To glamorize themselves in fictional accounts
  • To create computer software

What type of threat is considered among the most dangerous?

<p>Forces of Nature (C)</p> Signup and view all the answers

What is the difference between competitive intelligence and industrial espionage?

<p>Competitive intelligence is legal, while industrial espionage is illegal (D)</p> Signup and view all the answers

What is the primary method used by hackers to gain access to information?

<p>Using skill, guile, or fraud to bypass controls (A)</p> Signup and view all the answers

What type of event can disrupt the storage, transmission, and use of information?

<p>Natural disasters (D)</p> Signup and view all the answers

What is the primary goal of an attacker in information extortion?

<p>To demand compensation for the return of stolen data (C)</p> Signup and view all the answers

What is a common consequence of employee mistakes?

<p>Revelation of classified data (B)</p> Signup and view all the answers

What type of threat can make an organization more vulnerable to losses when other threats lead to attacks?

<p>Missing or inadequate policy planning (C)</p> Signup and view all the answers

What is a common type of data breach?

<p>Credit card number theft (C)</p> Signup and view all the answers

What is a major threat to an organization's data?

<p>Employee mistakes (A)</p> Signup and view all the answers

What is a potential security risk associated with shortcuts left by programmers in software codes?

<p>Trap doors (D)</p> Signup and view all the answers

What is a consequence of using outdated infrastructure in technology?

<p>Loss of data integrity (A)</p> Signup and view all the answers

What is a characteristic of intermittent errors in equipment?

<p>They only periodically manifest themselves (A)</p> Signup and view all the answers

Why is it essential for management to analyze the technology currently in use?

<p>To prevent technology from becoming obsolete (C)</p> Signup and view all the answers

What is a consequence of not resolving all bugs in software codes before publication?

<p>New bugs are revealed (C)</p> Signup and view all the answers

What should management do when technology becomes obsolete?

<p>Take immediate action (D)</p> Signup and view all the answers

More Like This

Continuidad y Cumplimiento en TI
10 questions
IT Risk Management Class #6
37 questions
IT Risk Management Class #7
37 questions
IT Risk Management Quiz
13 questions
Use Quizgecko on...
Browser
Browser