Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else
Exam 1: Setting the Stage: Technology and the Modern Enterprise59 Questions
Exam 2: Strategy and Technology: Concepts and Frameworks for Understanding What Separates Winners From Losers78 Questions
Exam 3: Zara: Fast Fashion From Savvy Systems70 Questions
Exam 4: Netflix in Two Acts: the Making of an E-Commerce Giant and the Uncertain Future of Atoms to Bits94 Questions
Exam 5: Moores Law and More: Fast, Cheap Computing and What This Means for the Manager78 Questions
Exam 6: Disruptive Technologies: Understanding the Giant Killers and Considerations for Avoiding Extinction38 Questions
Exam 7: Amazoncom: an Empire Stretching From Cardboard Box to Kindle to Cloud93 Questions
Exam 8: Understanding Network Effects: Strategies for Competing in a Platform-Centric, Winner-Take-All World71 Questions
Exam 9: Social Media, Peer Production, and Web 20111 Questions
Exam 10: The Sharing Economy, Collaborative Consumption, and Creating More Efficient Markets Through Technology43 Questions
Exam 11: Facebook: a Billion-Plus Users, the High-Stakes Move to Mobile, and Big Business From the Social Graph103 Questions
Exam 12: Rent the Runway: Entrepreneurs Expanding an Industry52 Questions
Exam 13: Understanding Software: a Primer for Managers75 Questions
Exam 14: Software in Flux: Open Source, Cloud, Vittualized and App-Driven Shifts84 Questions
Exam 15: The Data Asset: Databases, Business Intelligence, Analytics, Big Data, and Competitive Advantage97 Questions
Exam 16: A Managers Guide to the Internet and Telecommunications82 Questions
Exam 17: Information Security: Barbarians at the Gateway and Just About Everywhere Else89 Questions
Exam 18: Google in Three Parts: Search, Online Advertising, and an Alphabet of Opportunity137 Questions
Select questions type
Social networking sites such as Facebook and LinkedIn form valuable sources of vital information that can be used to craft a scam by con artists.
(True/False)
4.8/5
(28)
The _____ technique zeros in on a sloppy programming practice where software developers don't validate user input.
(Short Answer)
4.8/5
(32)
A system that monitors network use for potential hacking attempts and takes preventative action to block, isolate, or identify attempted infiltration, and raise further alarms to warn security personnel is known as a(n):
(Multiple Choice)
4.9/5
(34)
Online backup services are considered a poor choice for end-users, since this only increases the liklihood that an individual's data will be hacked.
(True/False)
4.8/5
(35)
The term ISO 27000 refers to a series of standards representing the set of best practices for implementing, maintaining and improving organizational security.
(True/False)
4.9/5
(40)
What type of tool enforces access privileges and helps verify that systems are not being accessed by the unauthorized, or in suspicious ways?
(Multiple Choice)
4.7/5
(30)
Systems that deny the entry or exit of specific IP addresses, products, Internet domains, and other communication restrictions are said to employ a(n):
(Multiple Choice)
4.8/5
(38)
It's bad when a firm's e-mail and password file is stolen however the impact is minimized because user passwords set up for one system cannot be used on others.
(True/False)
4.9/5
(31)
_____ are scrambled character images used to thwart things like automated account setup or ticket buying.
(Short Answer)
4.8/5
(26)
Many U.S. technology firms believe that U.S. government surveillance techniques put them at a disadvantage relative to foreign firms because:
(Multiple Choice)
4.7/5
(34)
One of the reasons one should be careful about clicking on any URL in an e-mail is that hackers can easily embed a redirection in e-mail links, reroutiing a user to an alternate online destination.
(True/False)
4.8/5
(33)
Hackers might infiltrate computer systems to enlist ware for subsequent illegal acts.
(True/False)
4.8/5
(32)
_____ are highly restrictive programs that permit communication only with approved entities and/or in an approved manner.
(Short Answer)
4.9/5
(42)
Which of the following types of infiltration techniques does one open up to by posting sensitive personal information and details about one's workplace on social networking sites?
(Multiple Choice)
4.8/5
(39)
Computer systems are often infected with malware by means of exploits that sneak in masquerading as something they are not. These exploits are called:
(Multiple Choice)
4.9/5
(28)
Worms require an executable (a running program) to spread, attaching to other executables.
(True/False)
4.9/5
(23)
Multiple administrators jointly controlling key systems are an unnecessary burden that adds to the complexity of managing security in an organization.
(True/False)
4.8/5
(31)
Challenge questions offered by Web sites to automate password distribution and resets are formidable in protecting the privacy of email accounts.
(True/False)
4.9/5
(27)
What is the key takeaway from the Heartland breach?
a. Even widely-used open source software is vulnerable.
b. Compliance does not equal security and firms that have passed multiple compliance audits may still remain vulnerable.
c. SSL public-key encrpytion can be hacked.
d. GitHub is a horrible place to store widely-used code.
e. Firms that fail to employ ISO 27000 will remain vulnerable.
(Short Answer)
4.9/5
(25)
Showing 41 - 60 of 89
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)