Part 2 Flashcards

0
Q

Many business professionals want ____ to data from anywhere they work, on a variety of ____

A

access, devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Data ____ from Anywhere

A

Accessible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

To be ____, employees now request ____ to data and contact information on their laptops, desktops, home computers, and ____ devices

A

productive
access
mobile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Therefore, IT departments must now provide the ability to ____ data with numerous ____

A

sync, devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

And if the IT department can’t or won’t provide this ____, employees now have the power to ____

A

capability, take matters into their own hands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

______ can be accessed from both the home and office or anywhere there is an Internet connection.

A

online storage sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Though it might be possible to block access to some of these sites, it is ____

A

not possible to block access to them all.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This ability to easily transfer data ____makes securing an organization’s data that much more difficult.

A

outside the control of a company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Isn’t About _____

A

Hardware and Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Many businesses believe that if they purchase enough ____, they can create a ____

A

equipment, secure infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Firewalls, intrusion detection systems, antivirus programs, and two-factor authentication products are just some of the tools available to assist in protecting a network and its data. It is important to keep in mind that_____

A

no product or combination of products will create a secure organiza- tion by itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security is a ____; there is no tool that you can “____.”

A

process, set and forget

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

All security products are only ____

A

as secure as the people who configure and maintain them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The employees tasked with maintaining the security devices should be provided with enough time, ____, and equip- ment to properly support the products.

A

training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The Bad Guys Are Very ____

A

Sophisticated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

At one time the computer hacker was portrayed as a lone teenager with poor social skills who would break into systems, often for ____

A

nothing more than bragging rights.

16
Q

As ecommerce has evolved, however, so has ____

A

the profile of the hacker.

17
Q

Organized hacker groups have been formed to operate as ____.

A

businesses

18
Q

_____ companies that work much like real-world companies are starting to appear and are steadily growing, thanks to the profits they turn.

A

Cybercrime

19
Q

Now that organizations are being attacked by highly motivated and skilled groups of hackers, _____

A

creating a secure infrastructure is mandatory.

20
Q

Management Sees Security as a ____

A

Drain on the Bottom Line

21
Q

For most organizations, the cost of creating a strong security posture is seen as a ____, similar to pur- chasing insurance.

A

necessary evil

22
Q

Organizations don’t want to spend the money on it,but the risks of not making the purchase ____.

A

outweigh the costs

23
Q

The problem is exacerbated by the fact that IT professionals ____

A

speak a different language than management.

24
Q

IT professionals are generally focused on ____, period. Management is focused on ____.

A

technology, revenue

25
Q

Concepts such as profitability, asset depreciation, return on investment, realization, and total cost of ownership are the mainstays of management. These are ____ to most IT professionals.

A

alien concepts

26
Q

Realistically speaking, though it would be helpful if management would take steps to learn some fundamentals of information technology, IT professionals should _____

A

take the initiative and learn some fundamental business concepts.

27
Q

Learning these concepts is beneficial to the organization because the technical infrastructure can be implemented in a ____ manner, and they are beneficial from a ____ perspective for IT professionals.

A

cost-effective, career development

28
Q

Strong security can be used to gain a ____ in the marketplace.

A

competitive advantage

29
Q

Having secured systems that are accessible 24 hours a day, seven days a week means that an organization can reach and communicate with its clients and prospective clients more ____.

A

efficiently

30
Q

An organization that becomes recognized as a good custodian of client records and information can incorporate its security record as part of its ____.

A

branding

31
Q

This is no different than a car company being recognized for its safety record. In discussions of cars and safety, for example, ____ is always the first manufacturer mentioned

A

Volvo

32
Q

The goal of any discussion with management is to convince them that in the highly technical and interconnected world we live in, ____

A

having a secure network and infrastructure is a “nonnegotiable requirement of doing business.