Question
Which of the following defines security protections required for credit or debit card transactions? Question 1 options: EMV Security Standard Payment Card Industry - Data
Which of the following defines security protections required for credit or debit card transactions?
Question 1 options:
EMV Security Standard | |
Payment Card Industry - Data Security Standard (PCI-DSS) | |
Federal Trade Commission's Red Flags Rule | |
Health Insurance Portability and Accountability Act (HIPPA) Security Rule | |
Question 2(4 points)
Accounting & Finance functions of a business include
Question 2 options:
bookkeeping | |
all answer choices are correct | |
sales or other financial transaction processing | |
budget preparation and monitoring | |
Question 3(4 points)
The Children's Online Privacy Protection Act
Question 3 options:
requires that hotels verify age before allowing access to the guest WiFi networks | |
requires that website operators use technologies that can identify and exclude children under the age of 8. | |
is not enforceable | |
requires that website operators allow parents to decide what information may be collected from a child under the age of 13. | |
Question 4(4 points)
Which type of email based attack would be used to target company executives?
Question 4 options:
cyber enabled fraud | |
whaling attack | |
malware attack | |
spear phishing attack | |
Question 5(4 points)
Leadership is shown when an individual
Question 5 options:
creates a plan for a business activity | |
creates a vision that establishes direction for a business activity | |
generates creative solutions to business problems | |
creates a budget for a business activity | |
Question 6(4 points)
The members of an IT Governance board are selected from:
Question 6 options:
IT Executives | |
IT support staff | |
Business leaders from the community | |
Company Executives and Members of the Board of Directors. | |
Question 7(4 points)
In the context of business decision making, the value of data lies in its
Question 7 options:
breadth | |
currency (the "age" of the data) | |
depth | |
utility | |
Question 8(4 points)
In the context of business records and decision making, the value of data depends upon which of the following characteristics?
Question 8 options:
integrity | |
redundancy | |
confidentiality | |
volatility | |
Question 9(4 points)
How can IT Security staff improve their communications with the company's executives and managers?
Question 9 options:
invite executives and managers to attend technology brown bag events | |
avoid the use of jargon -- use plain language to explain security requirements and technology concepts | |
hire interns with excellent writing skills to write memos and newsletter articles about security requirements and technologies | |
respect the time and/or length limits for security briefings presented to busy executives and managers. | |
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started