1) A(n) ________ is said to happen when an unauthorized person views, alters, or steals secured data. A) data breach B) asynchronous communication C) key escrow D) sequence flow 2) According...





1) A(n) ________ is said to happen when an unauthorized person views, alters, or steals secured data.



A) data breach



B) asynchronous communication



C) key escrow



D) sequence flow



2) According to the reports in Ponemon's
2014 Cost of Data Breach Study, the average costs per stolen record were the highest in the ________ industry.



A) transportation



B) advertising



C) automobile



D) healthcare



3) Which of the following is a direct cost of handling a data breach?



A) loss of reputation



B) abnormal customer turnover



C) legal fees and consultation



D) increased customer acquisition activities



4) Sam is a hacker who makes money by stealing and selling credit cards. He has targeted the employees of a local firm and is looking for details such as names, addresses, dates of birth, social security numbers, credit card numbers, or health records. In this case, Sam is looking for ________.



A) firewall security measures



B) business continuity plans



C) malware definitions



D) personally identifiable information



5) ________ refers to the process of placing a small charge on a credit card to ensure it is working.



A) Hoarding



B) Carding



C) Phishing



D) Credit card hijacking



6) According to the reports in Ponemon's
2014 Cost of Data Breach Study, organizations are more likely to lose larger amounts of data than smaller amounts of data.



7) Personally identifiable information includes a person's bank account numbers, personal identification numbers, email address, and social security numbers.



8) Stolen credit card information is validated through a process called carding.







May 15, 2022
SOLUTION.PDF

Get Answer To This Question

Submit New Assignment

Copy and Paste Your Assignment Here