Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Which of the following defines security protections required for credit or debit card transactions? Question 1 options: EMV Security Standard Payment Card Industry - Data

Which of the following defines security protections required for credit or debit card transactions?

Question 1 options:

EMV Security Standard
Payment Card Industry - Data Security Standard (PCI-DSS)
Federal Trade Commission's Red Flags Rule
Health Insurance Portability and Accountability Act (HIPPA) Security Rule

Question 2(4 points)

Accounting & Finance functions of a business include

Question 2 options:

bookkeeping
all answer choices are correct
sales or other financial transaction processing
budget preparation and monitoring

Question 3(4 points)

The Children's Online Privacy Protection Act

Question 3 options:

requires that hotels verify age before allowing access to the guest WiFi networks
requires that website operators use technologies that can identify and exclude children under the age of 8.
is not enforceable
requires that website operators allow parents to decide what information may be collected from a child under the age of 13.

Question 4(4 points)

Which type of email based attack would be used to target company executives?

Question 4 options:

cyber enabled fraud
whaling attack
malware attack
spear phishing attack

Question 5(4 points)

Leadership is shown when an individual

Question 5 options:

creates a plan for a business activity
creates a vision that establishes direction for a business activity
generates creative solutions to business problems
creates a budget for a business activity

Question 6(4 points)

The members of an IT Governance board are selected from:

Question 6 options:

IT Executives
IT support staff
Business leaders from the community
Company Executives and Members of the Board of Directors.

Question 7(4 points)

In the context of business decision making, the value of data lies in its

Question 7 options:

breadth
currency (the "age" of the data)
depth
utility

Question 8(4 points)

In the context of business records and decision making, the value of data depends upon which of the following characteristics?

Question 8 options:

integrity
redundancy
confidentiality
volatility

Question 9(4 points)

How can IT Security staff improve their communications with the company's executives and managers?

Question 9 options:

invite executives and managers to attend technology brown bag events
avoid the use of jargon -- use plain language to explain security requirements and technology concepts
hire interns with excellent writing skills to write memos and newsletter articles about security requirements and technologies
respect the time and/or length limits for security briefings presented to busy executives and managers.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Essentials Of Strategic Management

Authors: J. Hunger, Thomas Wheelen

5th Edition

0136006698, 9788120348615

More Books

Students also viewed these General Management questions