What percentage of responding organizations in the 2011 Computer Security Institute survey experienced a computer security incident within the past year?

Correct answer: 46 percent

Explanation

This question tests the recall of a statistic about the prevalence of security incidents, highlighting that they are a common occurrence for organizations.

Other questions

Question 1

According to the opening case study, what was a primary security failure that led to the 2012 LinkedIn password breach?

Question 2

What is the term for the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems?

Question 3

What distinguishes a computer worm from a computer virus?

Question 4

What is the term for a software program that appears to be benign but then does something other than expected, often introducing malicious code?

Question 5

According to Symantec's 2012 report, how many new and unique threats from malicious software were detected in 2011?

Question 6

What is the primary purpose of a Denial-of-Service (DoS) attack?

Question 7

Which U.S. law, passed after the Enron and WorldCom scandals, imposes responsibility on companies and their management to safeguard the accuracy and integrity of financial information?

Question 8

What is the scientific collection, examination, authentication, preservation, and analysis of data from computer storage media for use as evidence in a court of law called?

Question 9

In the context of information systems controls, what is the primary function of general controls?

Question 10

Based on the sample risk assessment for an online order processing system in Table 8.5, which risk has the highest expected annual loss?

Question 11

What defines acceptable uses of a firm's information resources and computing equipment, including computers, wireless devices, and the Internet?

Question 12

What is the primary function of a firewall in a corporate network?

Question 13

Which technology for securing wireless networks replaces the older WEP standard with stronger security using longer, dynamically changing keys?

Question 14

What is the process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and intended receiver?

Question 15

What is a key difference between symmetric key encryption and public key encryption?

Question 16

What is the primary purpose of a digital certificate in a Public Key Infrastructure (PKI)?

Question 17

What is the primary goal of fault-tolerant computer systems?

Question 18

According to the Ponemon Institute's study mentioned on page 333, what was the approximate cost per compromised customer record for data breaches in the U.S. in 2011?

Question 19

What is the practice of tricking employees into revealing their passwords by pretending to be legitimate members of the company in need of information called?

Question 20

The Stuxnet worm, a primary example of cyberwarfare discussed in the chapter, was specifically designed to target what type of system?

Question 21

What does a business continuity plan focus on?

Question 22

What type of biometric authentication involves technology that is now being equipped in many PC laptops and mobile devices?

Question 23

What is the primary vulnerability of systems that are constantly connected to the Internet via cable modem or DSL?

Question 24

In 2011, the second annual Cost of Cyber Crime Study by the Ponemon Institute found the median annualized cost of cyber crime for organizations was what amount?

Question 25

What kind of systems contain redundant hardware, software, and power supply components to provide continuous, uninterrupted service?

Question 26

The MWEB Business case study illustrates a security breach that occurred because hackers gained access to what system?

Question 27

What is the primary cause of software vulnerability according to the textbook?

Question 28

What term is used for small pieces of software created by vendors to repair flaws in their programs without disturbing the proper operation of the software?

Question 29

According to the case study on Information Security Threats in Europe, what is a botnet?

Question 30

What type of firewall technology examines the application content of packets and uses a proxy server to handle communication between internal and external users?

Question 31

The Grum botnet, once the world's third-largest, was reportedly responsible for what percentage of worldwide spam traffic before it was shut down in 2012?

Question 32

Which of the following is an example of a general control?

Question 33

What is a 'hot site' in the context of disaster recovery planning?

Question 34

The median annualized cost of cyber crime for the organizations in the 2011 Ponemon Institute study was:

Question 35

What type of malware did Symantec identify as having 351 browser vulnerabilities in 2011?

Question 36

Which of these is NOT a principal source of poor system performance?

Question 37

What is the primary function of an intrusion detection system?

Question 39

What is the most common type of attack experienced by organizations, according to the 2011 Computer Security Institute survey?

Question 40

Which law outlines medical security and privacy rules and procedures for simplifying the administration of health care billing?

Question 41

The chapter discusses a new networking approach where control functions are managed by a central program, separate from the network devices. What is this approach called?

Question 42

What is the purpose of a MIS audit?

Question 43

How many days did the e-mail disruption for BlackBerry users last in October 2011?

Question 44

What is the primary method used by the Zeus Trojan to steal financial and personal data?

Question 45

What is the term for a wireless network that pretends to be a trustworthy Wi-Fi connection to capture users' passwords or credit card numbers?

Question 46

What is the primary security concern with cloud computing discussed in the chapter?

Question 47

In the context of the MWEB Business case study, how many attacks does MWEB claim to repel daily?

Question 48

What kind of information systems control is a software control?

Question 49

What is the primary function of deep packet inspection (DPI)?

Question 50

In the Sony data breach of April 2011, how many users had their personal information, including credit and bank account numbers, compromised?