
CIS27B Quiz 2 Review
Authored by Kasey Nguyen
Computers
University
Used 11+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is a type of unintentional insider threats, who expose an organization sensitive information to a threat through carelessness?
imprudent insider threat
negligent insider threats
ignorant insider threats
accidental insider threats
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Determine the type of espionage when a Chief Information Officer (CIO) is paid to leak client data to a competing company.
government espionage
competitive espionage
criminal espionage
economic espionage
3.
MULTIPLE SELECT QUESTION
1 min • 2 pts
Determine the type of insider threats when an employee mistyped e-mail addresses and sent sensitive information to external recipients. Select all applied options.
accidental insider threats
unintentional insider threats
intentional insider threats
third-party insider threats
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Determine the type of insider threats when a staff member is collaborating with a branch manager to steal data from the organization for financial gains.
third-party insider threats
collaborative insider threats
collusive insider threats
inclusive insider threats
5.
MULTIPLE SELECT QUESTION
1 min • 2 pts
Determine the type of espionage when a US researcher leaked US government weapon design to Russia for financial gains. Select all applied options.
government espionage
economic espionage
international espionage
criminal espionage
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following options is true when an engineering contractor steals machinery designs from the company to leverage his new job negotiation?
third-party property theft
economic crime
financial crime
intellectual property theft
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Determine the type of cyber insider threats when a manager removes group permissions from various folders and deletes important files from the network drives before leaving the company.
unintentional cyber insider threat
intentional cyber insider threat
organizational cyber insider threats
hierarchic cyber insider threats
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?