Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else
Exam 1: Setting the Stage: Technology and the Modern Enterprise59 Questions
Exam 2: Strategy and Technology: Concepts and Frameworks for Understanding What Separates Winners From Losers78 Questions
Exam 3: Zara: Fast Fashion From Savvy Systems70 Questions
Exam 4: Netflix in Two Acts: the Making of an E-Commerce Giant and the Uncertain Future of Atoms to Bits94 Questions
Exam 5: Moores Law and More: Fast, Cheap Computing and What This Means for the Manager78 Questions
Exam 6: Disruptive Technologies: Understanding the Giant Killers and Considerations for Avoiding Extinction38 Questions
Exam 7: Amazoncom: an Empire Stretching From Cardboard Box to Kindle to Cloud93 Questions
Exam 8: Understanding Network Effects: Strategies for Competing in a Platform-Centric, Winner-Take-All World71 Questions
Exam 9: Social Media, Peer Production, and Web 20111 Questions
Exam 10: The Sharing Economy, Collaborative Consumption, and Creating More Efficient Markets Through Technology43 Questions
Exam 11: Facebook: a Billion-Plus Users, the High-Stakes Move to Mobile, and Big Business From the Social Graph103 Questions
Exam 12: Rent the Runway: Entrepreneurs Expanding an Industry52 Questions
Exam 13: Understanding Software: a Primer for Managers75 Questions
Exam 14: Software in Flux: Open Source, Cloud, Vittualized and App-Driven Shifts84 Questions
Exam 15: The Data Asset: Databases, Business Intelligence, Analytics, Big Data, and Competitive Advantage97 Questions
Exam 16: A Managers Guide to the Internet and Telecommunications82 Questions
Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else89 Questions
Exam 18: Google in Three Parts: Search, Online Advertising, and an Alphabet of Opportunity137 Questions
Select questions type
Attacks that are so new that they have not been clearly identified, and so have not made it into security screening systems are called _____.
(Multiple Choice)
4.9/5
(40)
The virtual shutdown of websites by way of overloading them with seemingly legitimate requests sent simultaneously from thousands of machines is termed as _____ attacks.
(Short Answer)
4.8/5
(41)
What are some of the key managerial takeaways from the Target security breach?
(Essay)
5.0/5
(32)
Dumpster diving refers to physically trawling through trash to mine any valuable data or insights that can be stolen or used in a security attack.
(True/False)
4.7/5
(42)
Regularly updated software lowers a system's vulnerable attack surface.
(True/False)
4.8/5
(35)
Conforming to industry-standard guidelines and frameworks for organizational security ensures continued immunity from attacks on an organization's information.
(True/False)
4.8/5
(31)
One of the major problems with the Heartbleed bug in OpenSSL software is that:
(Multiple Choice)
4.8/5
(32)
Which of the following statements holds true for the term encryption?
(Multiple Choice)
4.8/5
(33)
Information security policies would be ineffective without _____ and _____.
(Multiple Choice)
4.7/5
(41)
Describe some of the factors at work that enabled the Target security breach to occur.
(Essay)
4.7/5
(32)
Sifting through trash in an effort to uncover valuable data or insights that can be stolen or used to launch a security attack is known as:
(Multiple Choice)
5.0/5
(31)
Cyber criminals who infiltrate systems and collect data for illegal resale are called _____.
(Multiple Choice)
4.7/5
(31)
In public-key encryption systems, the functions of the public and private keys are interchangeable.
(True/False)
4.9/5
(38)
_____ can be either software-based or deployed via ware, such as a recording "dongle" that is plugged in between a keyboard and a PC.
(Multiple Choice)
4.8/5
(30)
Almost all security breaches can be traced back to technology lapses personnel or procedural factors rarely factor in.
(True/False)
4.8/5
(39)
_____ are seemingly tempting, but bogus targets meant to draw hacking attempts.
(Short Answer)
4.8/5
(41)
A team working on organizational security should include representatives from general counsel, audit, public relations, and human resources, in addition to those from specialized security and broader technology and infrastructure functions.
(True/False)
4.9/5
(35)
The topic of U.S. government surveilance continues to be hotly debated, with strong opinions in favor of surveilance programs, as well as vocal protestations of government overreach. Briefly give the argument for and against U.S. government surveilance practices.
(Essay)
4.9/5
(35)
Which of the followings aspects of international law would enable a cyber-criminal operating across borders to evade prosecution?
(Multiple Choice)
4.7/5
(45)
_____ are systems that act as controls for network traffic, blocking unauthorized traffic while permitting acceptable use.
(Short Answer)
4.9/5
(30)
Showing 21 - 40 of 89
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)