Question: 46. How can a cyber-attack affect an individual? i) Identity theft ii) Impersonation iii) Abuse of trust iv) Blackmail Choose the correct combination. Select one:

46. How can a cyber-attack affect an individual?

i) Identity theft

ii) Impersonation

iii) Abuse of trust

iv) Blackmail

Choose the correct combination.

Select one:

a.ii, iii

b.ii, iii, iv

c.i ,ii , iii ,iv

d.i ,iii ,iv

47. What is a critical infrastructure?

Select one:

a. The use of electronic communication pretending to be a trusted entity such as a bank to gain personal information such as passwords or credit card details.

b. Intellectual property being leaked to sabotage or extort an organisation or individual.

c. The infrastructure that includes technical, legal, socio-economic and global political elements.

d. Those interconnected systems and networks, the destruction of which would have a serious impact on the health, safety, and security of citizens, governments or the economy.

48. What is the third major component of responding to information security events?

Select one:

a. Risk management

b. Business continuity

c. Crisis management

d. Enterprise security

49. What are the new risks associated with digital natives?

i) The use of social networking to share sensitive information with peers.

ii) Bring Your Own Device (BYOD) resulting in the sharing of sensitive data with a device outside the organisation's security architecture.

iii) Accessing organisational data from anywhere with an unencrypted Wi-Fi network.

iv) Using unknown Apps with security certification.

Choose the correct combination.

Select one:

a. i, ii, iii, iv

b. i, ii, iii

c. i, iii, iv

d. ii, iii, iv

50. Why is it important to have security metrics?

i) It provides an early warning of potential security hotspots, known as a lagging indicator.

ii) An information security incident may cause an organisation to fail to meet the requirements set by legislation.

iii) It demonstrates the organisation's stakeholders the effectiveness of the information security programme.

iv) They are linked to the risk register and business impact analysis.

Choose the correct combination.

Select one:

a. i, iii, iv

b. i, ii, iii

c. ii, iii, iv

d. i, ii, iii, iv

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!