93%(107)100 out of 107 people found this document helpful
This preview shows page 11 - 12 out of 12 pages.
QUESTION 361.A ____________ would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a______________ is a combination of the likelihood that such a misconfiguration could happen, a hacker’s exploitation of it, and the impact if the event occurred.vulnerability, riskrisk, vulnerabilitythreat, riskrisk, threat2.50000 points QUESTION 371.In 2013, the national retailer Target Corporation suffered a major data breach that put the financial information of an estimated 40 million customers at risk. In 2009, the health care provider BlueCross BlueShield of Tennessee suffered a theft of hard drives when it reported 57 hard drives stolen. Both these cases resulted from a(n) ________________ failure.regulationsecurity policyintellectual propertycompliance2.50000 points QUESTION 381.In business, intellectual property (IP) is a term applied broadly to any company information that is thought to bring an advantage. Protecting IP through security policies starts with human resources (HR). Which of the following is a challenge concerning HR policies about IP?
2.50000 points QUESTION 391.The_____________________ principle states that it is important to consideryour users or partners when requiring information that could place their privacy rights at risk. Thus, the security of an information system should be balanced against the rights of customers, users, and other people affected by the system versus your rights as the owners and operators of these systems.Democracyleast privilegeseparation of dutyAdversary2.50000 points QUESTION 401.Which of the following standards is important to issue as new technologies develop considering that some issues diminish in importance while new ones continually appear?