Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else
Exam 1: Setting the Stage: Technology and the Modern Enterprise59 Questions
Exam 2: Strategy and Technology: Concepts and Frameworks for Understanding What Separates Winners From Losers78 Questions
Exam 3: Zara: Fast Fashion From Savvy Systems70 Questions
Exam 4: Netflix in Two Acts: the Making of an E-Commerce Giant and the Uncertain Future of Atoms to Bits94 Questions
Exam 5: Moores Law and More: Fast, Cheap Computing and What This Means for the Manager78 Questions
Exam 6: Disruptive Technologies: Understanding the Giant Killers and Considerations for Avoiding Extinction38 Questions
Exam 7: Amazoncom: an Empire Stretching From Cardboard Box to Kindle to Cloud93 Questions
Exam 8: Understanding Network Effects: Strategies for Competing in a Platform-Centric, Winner-Take-All World71 Questions
Exam 9: Social Media, Peer Production, and Web 20111 Questions
Exam 10: The Sharing Economy, Collaborative Consumption, and Creating More Efficient Markets Through Technology43 Questions
Exam 11: Facebook: a Billion-Plus Users, the High-Stakes Move to Mobile, and Big Business From the Social Graph103 Questions
Exam 12: Rent the Runway: Entrepreneurs Expanding an Industry52 Questions
Exam 13: Understanding Software: a Primer for Managers75 Questions
Exam 14: Software in Flux: Open Source, Cloud, Vittualized and App-Driven Shifts84 Questions
Exam 15: The Data Asset: Databases, Business Intelligence, Analytics, Big Data, and Competitive Advantage97 Questions
Exam 16: A Managers Guide to the Internet and Telecommunications82 Questions
Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else89 Questions
Exam 18: Google in Three Parts: Search, Online Advertising, and an Alphabet of Opportunity137 Questions
Select questions type
The phrase __________________ refers to security schemes that automatically send one-time use representations of a credit card that can be received and processed by banking and transaction firms at the time of payment. They are in use in ApplePay and Android Wallet.
Free
(Short Answer)
4.8/5
(32)
Correct Answer:
tokenization
Organized crime networks now have their own R&D labs and are engaged in sophisticated development efforts to piece together methods to thwart current security measures.
Free
(True/False)
4.8/5
(36)
Correct Answer:
True
The use of public wireless connections can increase a user's vulnerability to monitoring and compromise. ____________ software can be used to encrypt transmissions over public networks, making it more difficult for a user's PC to be penetrated.
Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
E
Technologies that measure and analyze human body characteristics for identification or authentication are known as _____.
(Multiple Choice)
4.9/5
(39)
The information systems of several firms have been compromised by insiders that can include contract employees, cleaning staff, and temporary staffers.
(True/False)
4.9/5
(24)
Which of the following are considered sources of information that can potentially be used by social engineers?
(Multiple Choice)
4.9/5
(44)
A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage is called a(n) _____.
(Multiple Choice)
4.8/5
(36)
The term _____ originally referred to a particularly skilled programmer.
(Multiple Choice)
4.8/5
(36)
Describe briefly a few of the physical threats posed by hackers to information security with examples for each.
(Essay)
4.7/5
(33)
According to research firm Gartner, the majority of loss-causing security incidents involve the handiwork of international cyber-criminal gangs.
(True/False)
4.8/5
(27)
Attacks that exhaust all possible password combinations in order to break into an account are called _____ attacks.
(Multiple Choice)
4.9/5
(42)
Because of Moore's Law, widely-used encryption programs currently employed by banks and ecommerce sites are now easily penetrated by brute-force attacks that can be employed by hackers using just a handful of simple desktop computers.
(True/False)
4.9/5
(35)
What are the steps to be taken with respect to firm employees in order to ensure organizational security?
(Essay)
4.9/5
(36)
Describe briefly how technology can be leveraged to offset the attempts of attackers to undermine information security.
(Essay)
4.7/5
(32)
Which of the following is a valid statement on information security?
(Multiple Choice)
4.9/5
(25)
Several surprising findings were revealed in the wake of the Target breach, providing a cautionary tale for all executives and security professionals. Which of the following was thought to have occurred during the Target security breach?
a. Target had security software, but the notification alerts from the software were ignored.
b. Target had properly installed and configured its security software, but hackers got in, anyway.
c. Credit card databases were on entirely separate systems, not connected to other parts of the firm's information system, but wireless networking allowed hackers to access anything reachable from a cell phone connection.
d. Target regularly monitored file names and matched them to file sizes and archival copies to ensure that software was not installed on their systems using the names of legitimate products, but hackers saved files with blank file names so they wouldn't be detected.
e. All of the above
(Short Answer)
4.8/5
(29)
Showing 1 - 20 of 89
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)